Skip to main content
Article thumbnail
Location of Repository

Attrition Defenses for a Peer-to-Peer Digital Preservation System

By T.J. Giuli, Petros Maniatis, David S. H. Rosenthal, Mema Roussopoulos and Mary Barker

Abstract

In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even from powerful adversaries are less effective than simple network-level attacks, and that network-level attacks must be intense, wide-spread, and prolonged to impair the system.

Topics: CF Repositories, IC Storage, CD Migration, BG Storage, AA General Resources
Year: 2004
DOI identifier: 10.1145/1047915.1047917
OAI identifier: oai:eprints.erpanet.org:72
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://eprints.erpanet.org/72/ (external link)
  • Suggested articles

    Citations

    1. (1984). A Fast File System for UNIX. doi
    2. (2003). A Framework for Classifying Denial of Service Attacks. doi
    3. (2002). A Survey of Peer-to-Peer Security Issues. doi
    4. (2003). Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks.
    5. (2003). Active Internet Traffic Filtering: Real-time Response to Denial ofService Attacks.
    6. (2002). An Analysis of Internet Content Delivery Systems. doi
    7. (2003). Archiving Electronic Journals.
    8. (2000). Automated Response Using System-Call Delays.
    9. (2004). Byzantine Fault Tolerance in Long-Lived Systems. doi
    10. (1998). Byzantine Quorum Systems. doi
    11. Cd-r’s binnen twee jaar onleesbaar.
    12. (2002). Controlling high bandwidth aggregates in the network. doi
    13. (2003). Denial of Service via Algorithmic Complexity Attacks.
    14. (1993). Denial of Service. doi
    15. (2004). Handling churn in a DHT.
    16. (2001). Hashbased IP Traceback. doi
    17. (2002). Hashcash - a denial of service counter measure,
    18. (2004). Impeding Attrition Attacks on P2P Systems. doi
    19. (2001). Inferring Internet Denial-of-Service Activity. doi
    20. (2003). Low-Rate TCPTargeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants). doi
    21. (2003). Moderately Hard, Memory-bound Functions. doi
    22. (2002). Narses: A Scalable, Flow-Based Network Simulator.
    23. (2000). OceanStore: An Architecture for Global-Scale Persistent Storage. doi
    24. (2003). On MemoryBound Functions for Fighting Spam. In
    25. (2004). Online Scholarly Journals: How Many?
    26. (2000). Permanent Web Publishing. doi
    27. (1999). Practical Byzantine Fault Tolerance. doi
    28. (2000). Practical Network Support for IP Traceback. In doi
    29. (2003). Preserving Peer Replicas By Rate-Limited Sampled Voting. In doi
    30. (1992). Pricing via Processing. In
    31. (2002). Query-Flood DoS Attacks in Gnutella. doi
    32. (2004). Robust Incentive Techniques for Peer-to-Peer Networks. doi
    33. (2003). Samsara: Honor Among Thieves in Peer-to-Peer Storage. doi
    34. (2002). Secure Overlay Services. doi
    35. (2002). Secure Routing for Structured Peer-toPeer Overlay Networks. doi
    36. (2002). Session-Based Admission Control: A Mechanism for Peak Load Management of Commercial Web Sites. doi
    37. Take Control of your Inbox.
    38. (2002). The Sybil Attack. doi
    39. (1994). The Synchronization of Periodic Routing Messages. doi
    40. (2002). Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. doi
    41. Uncheatable Distributed Computations. doi
    42. (2001). Using Client Puzzles to Protect TLS.
    43. (2004). Using Hard Disks For Digital Preservation. doi

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.