skip to main content
10.1145/2935764.2935783acmconferencesArticle/Chapter ViewAbstractPublication PagesspaaConference Proceedingsconference-collections
research-article

Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration

Published:11 July 2016Publication History

ABSTRACT

We present three robust overlay networks: First, we present a network that organizes the nodes into an expander and is resistant to even massive adversarial churn. Second, we develop a network based on the hypercube that maintains connectivity under adversarial DoS-attacks. For the DoS-attacks we use the notion of a Ω(log log n)-late adversary which only has access to topological information that is at least Ω(log log n) rounds old. Finally, we develop a network that combines both churn- and DoS-resistance. The networks gain their robustness through constant network reconfiguration, i.e., the topology of the networks changes constantly. Our reconfiguration algorithms are based on node sampling primitives for expanders and hypercubes that allow each node to sample a logarithmic number of nodes uniformly at random in O(log log n) communication rounds. These primitives are specific to overlay networks and their optimal runtime represents an exponential improvement over known techniques. Our results have a wide range of applications, for example in the area of scalable and robust peer-to-peer systems.

References

  1. I. Abraham, B. Awerbuch, Y. Azar, Y. Bartal, D. Malkhi, and E. Pavlov. A generic scheme for building overlay networks in adversarial scenarios. In Proc. of IPDPS, page 40, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Aspnes and U. Wieder. The expansion and mixing time of skip graphs with applications. Distributed Computing, 21(6):385--393, 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Augustine, G. Pandurangan, P. Robinson, S. Roche, and E. Upfal. Enabling robust and efficient distributed computation in dynamic peer-to-peer networks. In Proc. of FOCS, pages 350--369, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Awerbuch and C. Scheideler. A denial-of-service resistant DHT. In Proc. of DISC, pages 33--47, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Awerbuch and C. Scheideler. Towards scalable and robust overlay networks. In Proc. of IPTPS, 2007.Google ScholarGoogle Scholar
  6. A. Berns, S. Ghosh, and S. V. Pemmaraju. Building self-stabilizing overlay networks with the transitive closure framework. TCS, 512, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Cooper, M. Dyer, and A. J. Handley. The flip markov chain and a randomising p2p protocol. In Proc. of PODC, pages 141--150, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Dingledine, N. Mathewson, and P. Syverson. Tor: the second-generation onion router. In Proc. SSYM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. R. Douceur. The sybil attack. In Proc. of IPTPS, pages 251--260, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Eikel and C. Scheideler. IRIS: a robust information system against insider dos-attacks. In Proc. of SPAA, pages 119--129, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Eikel, C. Scheideler, and A. Setzer. RoBuSt: A crash-failure-resistant distributed storage system. In Proc. of OPODIS, pages 107--122, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  12. T. Feder, A. Guetz, M. Mihail, and A. Saberi. A local switch markov chain on given degree graphs with application in connectivity of peer-to-peer networks. In Proc. of FOCS, pages 69--76, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Feigenbaum, A. Johnson, and P. Syverson. Preventing active timing attacks in low-latency anonymous communication. In Prof. of PETS, pages 166--183, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Foreback, A. Koutsopoulos, M. Nesterenko, C. Scheideler, and T. Strothmann. On stabilizing departures in overlay networks. In Proc. of SSS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Friedman. A Proof of Alon's Second Eigenvalue Conjecture and Related Problems, volume 195 of Memoirs of the AMS. 2008.Google ScholarGoogle Scholar
  16. T. P. Hayes, J. Saia, and A. Trehan. The forgiving graph: a distributed data structure for low stretch under adversarial attack. In Proc. of PODC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Jacob, A. W. Richa, C. Scheideler, S. Schmid, and H. Taubig. A distributed polylogarithmic time algorithm for self-stabilizing skip graphs. In Proc. of PODC, pages 131--140, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Jacobs and G. Pandurangan. Stochastic analysis of a churn-tolerant structured peer-to-peer scheme. Peer-to-Peer Networking and Applications, 6(1), 2013.Google ScholarGoogle Scholar
  19. J. JaJa. An Introduction to Parallel Algorithms. Addison Wesley, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. In Proc. of the ACM SIGCOMM, pages 61--72, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. F. Kuhn, S. Schmid, and R. Wattenhofer. A self-repairing peer-to-peer system resilient to dynamic adversarial churn. In Proc. of IPTPS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Law and K.-Y. Siu. Distributed construction of random expander networks. In Proc. of INFOCOM, volume 3, pages 2133--2143 vol.3, March 2003.Google ScholarGoogle ScholarCross RefCross Ref
  23. L. Lovasz. Random walks on graphs: A survey, 1993.Google ScholarGoogle Scholar
  24. P. Mahlmann and C. Schindelhauer. Distributed random digraph transformations for peer-to-peer networks. In Proc. of SPAA, pages 308--317, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. Nanongkai, A. D. Sarma, and G. Pandurangan. A tight unconditional lower bound on distributed randomwalk computation. In Proc. of PODC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. M. Naor and U. Wieder. Novel architectures for P2P applications: the continuous-discrete approach. In Proc. of SPAA, pages 50--59, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. G. Pandurangan, P. Robinson, and A. Trehan. Dex: Self-healing expanders. In Proc. of IPDPS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. Ranade. How to emulate shared memory. Journal of Computer and System Sciences, 42(3):307--326, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Saia and A. Trehan. Picking up the pieces: Self-healing in reconfigurable networks. In Proc. of IPDPS, pages 1--12, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  30. A. D. Sarma, D. Nanongkai, and G. Pandurangan. Fast distributed random walks. In Proc. of PODC, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. D. Sarma, D. Nanongkai, G. Pandurangan, and P. Tetali. Distributed random walks. Journal of the ACM, 60:2:1--2:31, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Singh, T. Ngan, P. Druschel, and D. S. Wallach. Eclipse attacks on overlay networks: Threats and defenses. In Proc. of the INFOCOM, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  33. K. Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Fujii, and A. Takahara. THUP: A P2P network robust to churn and DoS attack based on bimodal degree distribution. IEEE Journal on Selected Areas of Communication, 31(9):247--256, 2013.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SPAA '16: Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures
        July 2016
        492 pages
        ISBN:9781450342100
        DOI:10.1145/2935764

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 July 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate447of1,461submissions,31%

        Upcoming Conference

        SPAA '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader