Provided by: Technische Universität Darmstadt
Peer-To-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence, the authors propose heuristics for Chord, Pastry and Kademlia to assess the protocols' LEA susceptibility based on their topology characteristics and overlay routing mechanisms. As a result, their method can be used for P2P protocol parameter tuning in order to substantially mitigate LEAs. They present evaluations highlighting LEA's impact on contemporary P2P protocols.