Super Node Selection For Efficient Patch Distribution in P2P Networks
Super Node Selection For Efficient Patch Distribution in P2P Networks
Super Node Selection For Efficient Patch Distribution in P2P Networks
Outline
Computer worms
A computer worm is a malicious program that selfpropagates across a network by exploiting security
flaws in widely used services [15].
P2P worms
Worms, which use P2P topological information or,
vulnerabilities of P2P software for propagation are known
as P2P worms.
P2P worms spread faster than normal worms since;
They do not need to scan for IP address, because next targets are
readily available as P2P neighbor information.
Rich node connectivity of P2P network makes any node can be
reached from any other node within few hops (i.e. average
distance any two hosts in P2P network is short[13]).
Outline
Outline
Other Approaches
How to retain the privacy when distributing the security patches
through P2P networks [5].
Using benign worms to clean malicious worms [13], [17].
Benign worms are not malicious they propagate as ordinary worms
but they are designed to clean malicious worms.
Not ethical since benign worms access hosts without proper
permission
Benign worm introduce significant network traffic when propagation.
The Problem
Select a set of super-peers from the unstructured P2P overlay
network, in distributed manner, to implement an efficient and
scalable patch distribution mechanism.
These selected super-peers must be;
Outline
Super-peer selection
Super-peer selection involves selecting subset of nodes
from the P2P network to serve a special role .
Lo et al. [6] specified factors which needs to be fulfilled by
super-peers in P2P networks.
Distribution factors.
Access
Dispersal
Proportion
Load Balance
P2P factors.
Heterogeneity
Adaptability to churn
Security
Outline
Protocol initiation
Any peer who is not satisfied with current super-peers can initiate
the protocol if it is capable of performing as a super-peer.
It can flood a advertisement message through the network, to
notify other peers about its capability to perform as a super-peer
Objectives
Contains
THANK YOU !
References
[[1]
Liang Xie; Sencun Zhu, "A Feasibility Study on Defending Against Ultra-Fast Topological Worms,"
in Peer-to-Peer Computing, 2007. P2P 2007. Seventh IEEE International Conference on, Washington, Sept.
2007, pp. 61-70.
[2]
Christos Gkantsidis, Thomas Karagiannis, Pablo Rodriguez, and Milan Vojnovic, "Planet scale
software updates," in Proc. of ACM SIGCOMM 06, Pisa, Italy, August 2006.
[3]
Eng Keong Lua; Crowcroft, J.; Pias, M.; Sharma, R.; Lim, S, "A survey and comparison of peer-topeer network schemes," in Communications Surveys & Tutorials, IEEE, Second Quarter 2005, pp. 72-93.
[4]
Shakkottai, S. ; Srikant, R., "Peer to Peer Networks for Defense Against Internet Worms," in
Selected Areas in Communications, IEEE Journal on, vol. 3, December 2007, pp. 1745,1752.
[5]
Di Wu; Cong Tang; Dhungel, P.; Saxena, N.; Ross, K.W., "On the Privacy of Peer-Assisted
Distribution of Security Patches," in Peer-to-Peer Computing (P2P), 2010 IEEE Tenth International Conference
on, Aug. 2010, pp. 1,10.
[6]
Lo, V.; Dayi Zhou; Yuhong Liu; GauthierDickey, C.; Jun Li, "Scalable Supernode Selection in Peerto-peer Overlay Networks," in Hot Topics in Peer-to-Peer Systems, 2005. HOT-P2P 2005. Second
International Workshop on , July 2005, pp. 18,25.
[7]
Seung Chul Han; Xia, Y., "Optimal leader election scheme for peer-to-peer applications," in
Networking, 2007. ICN '07. Sixth International Conference on, April 2007.
References
[8]
Xie, Liang, Song, Hui and Zhu, Suncun, "On The Effectiveness of Internal Patching Against FileSharing Worms," in Applied Cryptography and Network Security.: Springer Berlin Heidelberg, 2008, pp. 120.
[9]
A. S. Tanenbaum and M. V. Steen, Distributed systems: principles and paradigms, 2nd ed., 2006.
[10]
L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S. Chien., "A first look at peer-to-peer
worms: threats and defenses," in Proceedings of the 4th International Conference on Peer-to-Peer Systems.
Ithaca, NY: Springer-Verlag, 2005, pp. 24-35.
[11]
Li Xiong; Ling Liu, "PeerTrust: supporting reputation-based trust for peer-to-peer electronic
communities," in Knowledge and Data Engineering, IEEE Transactions on, July 2004, pp. 843,857.
[12]
S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, "The Eigentrust Algorithm for Reputation
Management in P2P Networks," in Proceedings of the 12th International Conference on World Wide Web.
Budapest, Hungary: ACM, 2003, pp. 640651.
[13]
T. Chen, X. Zhang, H. Li, X. Li, Y. Wu, "Fast quarantining of proactive worms in unstructured P2P
networks," J. Netw. Comput. Appl., vol. 34, no. 5, pp. 1648-1659, September 2011.
[14]
M. VojnoviC, A. Ganesh, "On the Effectiveness of Automatic Patching," in Proceedings of the 2005
ACM Workshop on Rapid Malcode. Fairfax, VA, USA: ACM, 2005, pp. 41-50.
[15]
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in
Proceedings of the 2003 ACM Workshop on Rapid Malcode. Washington, DC, USA: ACM, 2003, pp. 11-18.
References
[16]
G. Chen and Robert S. Gray, "Simulating Non-Scanning Worms on Peer-to-Peer Networks," in
Proceedings of the 1st International Conference on Scalable Information Systems. Hong Kong: ACM, 2006,
pp. 29-41.
[17]
Chunfu Jia, Xin Liu, Zhichao Hu, Guoyou Liu, Zhi Wang, "Defending P2P Networks against
Malicious Worms Based on Benign Worms," in Advances in Electric and Electronics.: Springer Berlin
Heidelberg, 2012, vol. 155, pp. 653-660.
[18]
Liu Xin, Xin Zhaojun and Shi Leyi, "Automatic Patching Based on Social Computing in P2P
Network," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference
on, Sept, 2013, pp. 471-478.
[19]
Beverly Yang, B. and Garcia-Molina, H, "Designing a Super-Peer Network," in 19th International
Conference on Data Engineering, 2003. Proceedings, IEEE, 2003, pp. 49-60.
[20]
Yu Jin; Yan Liu; Hongwu Zhao, "Trust-based supernode selection in peer-to-peer systems," in
Future Computer and Communication (ICFCC), 2010 2nd International Conference on, May 2010, pp. 285289.
[21]
Doval, D.; O'Mahony, D., "Overlay networks: A scalable alternative for P2P," in Internet Computing,
IEEE, 2003, pp. 79,82.
References
[22]
Dan S. Wallach, "A survey of peer-to-peer security issues," in Proceedings of the 2002 Mext-NSFJSPS International Conference on Software Security: Theories and Systems. Tokyo, Japan: Springer-Verlag,
2003, pp. 42-57.
[23]
Stutzbach, D.; Rejaie, R.; Sen, S, "Characterizing Unstructured Overlay Topologies in Modern P2P
File-Sharing Systems," in Networking, IEEE/ACM Transactions on, April 2008, pp. 267,280.
[24]
Stoica, I.; Morris, R.; Liben-Nowell, D.; Karger, D.R.; Kaashoek, M.F.; Dabek, F.; Balakrishnan, H.,
"Chord: a scalable peer-to-peer lookup protocol for Internet applications," in Networking, IEEE/ACM
Transactions on, Feb 2003, pp. 17,32.
Trust Calculation
Any peer in the network calculates the trust or the reputation of
other peers, it has dealt with.
Upon completion of a transition, peers can rate each other, and
this rating value will be either -1 or +1; where -1 is being an
unsatisfied transition and +1 being a successful satisfied transition.