Sunday, January 6, 2019

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction

arXiv:1810.05447

Date: 2018-10-12

Author(s): Saar Tochner, Aviv Zohar

Link to Paper

Abstract

A major limitation of open P2P networks is the lack of strong identities. This allows any agent to attack the system by creating multiple false personas, thereby disrupting the overlay network's connectivity and sabotaging its operation. In this paper, we explore practical ways to defend P2P networks from such attacks. To do so, we employ a game theoretic approach to the management of each peer's list of known nodes and to the overlay construction mechanisms that utilize this list. We consider the interaction between defender and attacker agents as a zero-sum game. We show that the cost of attacks can be driven up substantially if the defender utilizes available information about peers it chooses to connect to, such as their IP address. In addition to theoretical analysis of the underlying game, we apply our approach to the Bitcoin P2P network and derive effective strategies that guarantee a high safety level against attacks.

References

  1. Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: Routing attacks on cryptocurrencies. arXiv preprint arXiv:1605.07524 (2016)

  2. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)

  3. Douceur, J.R.: The sybil attack. In: Peer-to-peer Systems, pp. 251–260. Springer (2002)

  4. Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., Smeraldi, F.: Game theory meets information security management. In: IFIP International Information Security Conference. pp. 15–29. Springer (2014)

  5. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on bitcoins peer-to-peer network (2015)

  6. Jiang, H., Shao, X.: Detecting p2p botnets by discovering flow dependency in c&c traffic. P2P Networking and Applications 7(4), 320–331 (2014)

  7. Jung, H.M., Hwang, I.S., Moon, J.K., Park, H.S.: A security monitoring method for malicious P2P event detection. Peer-to-Peer Networking and Applications 9(3), 498–507 (2016)

  8. Manshaei, M.H., Zhu, Q., Alpcan, T., Bac¸sar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45(3), 25 (2013)

  9. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Consulted 1(2012) (2008)

  10. Norberg, A.: transport protocol. BitTorrent Extension Protocol (2009)

  11. Pita, J., Jain, M., Marecki, J., Ord´o˜nez, F., Portway, C., Tambe, M., Western, C., Paruchuri, P., Kraus, S.: Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of AAMAS. pp. 125–132. International Foundation for Autonomous Agents and Multiagent Systems (2008)

  12. Singh, A., et al.: Eclipse attacks on overlay networks: Threats and defenses. In: In IEEE INFOCOM. Citeseer (2006)

  13. Urdaneta, G., Pierre, G., Steen, M.V.: A survey of dht security techniques. ACM Computing Surveys (CSUR) 43(2), 8 (2011)

  14. Xinhui, H., Xianquan, X., ZHANG, J., LIU, B., ZHANG, Y.: Sybil defenses in dht networks based on social relationships. Journal of Tsinghua University (Science and Technology) 54(1), 1–7 (2015)

  15. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Computer Communication Review 36(4), 267–278 (2006)

  16. Zhang, R., Zhang, J., Chen, Y., Qin, N., Liu, B., Zhang, Y.: Making eclipse attacks computationally infeasible in large-scale dhts. In: Performance Computing and Communications Conference (IPCCC), 2011 IEEE 30th International. pp. 1–8. IEEE (2011)

  17. Zhu, Q., Basar, T.: Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. IEEE control systems 35(1), 46–65 (2015)


No comments:

Post a Comment