Print Email Facebook Twitter Sphinx: Locating Malicious Nodes in CorporateDistributed Hash Tables Title Sphinx: Locating Malicious Nodes in CorporateDistributed Hash Tables Author Versluis, Y. Faculty Electrical Engineering, Mathematics and Computer Science Department Parellel and Distributed Systems Group Date 2009-04-29 Abstract Nowadays structured overlay networks are used in controlled environments like company wide area networks. Even though these structured overlay networks are usually closed, there is still the risk that one or more nodes get compromised by attackers. When these networks provide business critical services, serious harm can be done by a compromised node. Because these networks are company controlled, properties like available bandwidth and latency times are much better known than in a general wide area network like the Internet. This knowledge can be used to create a system where malicious nodes in the network can be detected and located in a relatively short period of time and with little overhead. This thesis describes the design and implementation of the Sphinx protocol that provides this functionality. We show that it is possible to detect and locate malicious nodes in a distributed hash table in a short period of time, with little overhead, and with high sensitivity. We are able to detect and locate the nodes that cause latency deviations, dropping of messages, mis-routing of messages, and changing of the message payload. Subject DHT To reference this document use: http://resolver.tudelft.nl/uuid:8ada167f-1e9d-4406-aaf7-ff0ada0ed7d3 Part of collection Student theses Document type master thesis Rights (c) 2009 Versluis, Y. Files PDF final_sphinx.pdf 559.94 KB Close viewer /islandora/object/uuid:8ada167f-1e9d-4406-aaf7-ff0ada0ed7d3/datastream/OBJ/view