About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Information Security and Digital Forensics. First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers

Research Article

Detecting Sybils in Peer-to-Peer File Replication Systems

Download(Requires a free EAI acccount)
584 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-11530-1_14,
        author={K. Haribabu and Chittaranjan Hota and Saravana},
        title={Detecting Sybils in Peer-to-Peer File Replication Systems},
        proceedings={Information Security and Digital Forensics. First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers},
        proceedings_a={ISDF},
        year={2012},
        month={5},
        keywords={Peer-to-Peer Overlay Networks Sybil Detection Replication},
        doi={10.1007/978-3-642-11530-1_14}
    }
    
  • K. Haribabu
    Chittaranjan Hota
    Saravana
    Year: 2012
    Detecting Sybils in Peer-to-Peer File Replication Systems
    ISDF
    Springer
    DOI: 10.1007/978-3-642-11530-1_14
K. Haribabu1,*, Chittaranjan Hota2,*, Saravana1,*
  • 1: Birla Institute of Technology and Science, Pilani
  • 2: Birla Institute of Technology and Science
*Contact email: Khari@bits-pilani.ac.in, hota@bits-hyderabad.ac.in, saravana87@gmail.com

Abstract

The test of a peer-to-peer file sharing network is how efficiently the objects are discovered and retrieved. One of the most important factors that contribute towards this is optimal replication of the objects across the network. One of the security threats to replication model is Sybil attack. In this paper we propose an approach that aims at detecting sybil identities in peer-to-peer file sharing networks. The sybils can corrupt, hide or destroy the replicas in file sharing network. This approach makes use of the fact that sybil doesn’t scale its storage to the factor of its identities. The approach safeguards the availability and accessibility of objects in a peer-to-peer network from sybil attack. Experimental evaluations have shown that our approach works very efficiently in detecting sybils. More than 50% of the sybils were detected in first few seconds of the simulation and loss or damage of objects is reduced to less than .0001%.

Keywords
Peer-to-Peer Overlay Networks Sybil Detection Replication
Published
2012-05-25
http://dx.doi.org/10.1007/978-3-642-11530-1_14
Copyright © 2009–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL