[en] Distributed Hash Table (DHT) protocols, such as Kademlia, provide a decentralized key-value lookup which is nowadays integrated into a wide variety of applications, such as Ethereum, InterPlanetary File System (IPFS), and BitTorrent. However, many security issues in DHT protocols have not been solved yet. DHT networks are typically evaluated using mathematical models or simulations, often abstracting away from artefacts that can be relevant for security and/or performance. Experiments capturing these artefacts are typically run with too few nodes.
In this paper, we provide Locust, a novel highly concurrent DHT experimentation framework written in Elixir, which is designed for security evaluations. This framework allows running experiments with a full DHT implementation and around 4,000 nodes on a single machine including an adjustable churn rate; thus yielding a favourable trade-off between the number of analysed nodes and being realistic. We evaluate our framework in terms of memory consumption, processing power, and network traffic.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
Adamsky, Florian; Hof University of Applied Sciences
KAISER, Daniel ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PI Engel
Steglich, Michael; Hof University of Applied Sciences
ENGEL, Thomas ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations
Date de publication/diffusion :
novembre 2020
Nom de la manifestation :
ICCNS 2020: 10th International Conference on Communication and Network Security
Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, and Muttukrishnan Rajarajan. 2015. P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. In 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, Washington, D. C. https://www. usenix. org/conference/woot15/workshop-program/presentation/p2p-file-sharing-hell-exploiting-bittorrent
Shabir Ali, Anurag Sewak, Mayank Pandey, and Neeraj Tyagi. 2017. Simulation of p2p overlays over manets: impediments and proposed solution. In 2017 9th International Conference on Communication Systems and Networks (COMSNETS). IEEE, 338-345.
Michele Amoretti, MatteoAgosti, and Francesco Zanichelli. 2009. DEUS: a discrete event universal simulator. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques. 1-9.
Joe Armstrong. 2013. Programming Erlang: Software for a Concurrent World (Pragmatic Programmers). Pragmatic Bookshelf.
Anirban Basu, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman, and Vijay K Gurbani. 2013. The state of peer-to-peer network simulators. ACM Computing Surveys (CSUR) 45, 4 (2013), 1-25.
Ingmar Baumgart, Bernhard Heep, and Stephan Krause. 2007. OverSim: A flexible overlay network simulation framework. In 2007 IEEE global internet symposium. IEEE, 79-84.
Ingmar Baumgart, Bernhard Heep, and Stephan Krause. 2009. OverSim: A scalable and flexible overlay framework for simulation and real network applications. In 2009 IEEE Ninth International Conference on Peer-to-Peer Computing. IEEE, 87-88.
Alan Brown and Mario Kolberg. 2006. Tools for Peer-to-Peer Network Simulation. Technical Report. IRTF. https://tools. ietf. org/html/draft-irtf-p2prg-coresimulators-00
Henri Casanova, Arnaud Legrand, and Martin Quinson. 2008. Simgrid: A generic framework for large-scale distributed experiments. In Tenth International Conference on Computer Modeling and Simulation (uksim 2008). IEEE, 126-131.
Juliusz Chroboczek. 2016. BEP 0032: BitTorrent DHT Extensions for IPv6. Technical Report. BitTorrent, Inc. http://bittorrent. org/beps/bep_0032. html
John R. Douceur. 2002. The Sybil Attack. In IPTPS. 251-260. https://doi. org/10. 1007/3-540-45748-8_24
Ericsson AB. 2020. Erlang Efficiency Guide: Profiling. http://erlang. org/doc/efficiency_guide/profiling. html
Ericsson AB. 2020. memsup. http://erlang. org/doc/man/memsup. html
Pedro Garciá, Carles Pairot, Rubén Mondéjar, Jordi Pujol, Helio Tejedor, and Robert Rallo. 2004. Planetsim: A new overlay network simulation framework. In International Workshop on Software Engineering and Middleware. Springer, 123-136.
Vijay Gurbani, Anirban Basu, Simon Fleming, Thomas Schmidt, Matthias Wählisch, and Mario Kolberg. 2011. Peer-to-peer simulation frameworks: a survey. Technical Report. IRTF. https://tools. ietf. org/html/draft-irtf-p2prg-simulationsurvey-00
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D. C., 129-144. https://www. usenix. org/conference/usenixsecurity15/technical-sessions/presentation/heilman
Andrew Loewenstern. 2008. BEP 0005: DHT protocol. Technical Report. BitTorrent, Inc. http://bittorrent. org/beps/bep_0005. html
Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2018. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. (2018), 15.
Petar Maymounkov and David Mazières. 2002. Kademlia: A Peer-to-peer Information System Based on the XOR Metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. 53-65.
Alberto Montresor and Márk Jelasity. 2009. PeerSim: A scalable P2P simulator. In 2009 IEEE Ninth International Conference on Peer-to-Peer Computing. IEEE, 99-100.
Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, and Apu Kapadia. 2012. Cachet: a decentralized architecture for privacy preserving social networking with caching. In Proceedings of the 8th international conference on Emerging networking experiments and technologies. ACM, 337-348.
Vasileios Pappas, Daniel Massey, Andreas Terzis, and Lixia Zhang. 2006. A comparative study of the DNS design with DHT-based alternatives. In INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. IEEE, 1-13.
Nick Savers. 2019. Ethereum/devp2p: Discovery Overview. https://github. com/ethereum/devp2p/wiki/Discovery-Overview
Dominik Stingl, Christian Gross, Julius Rückert, Leonhard Nobach, Aleksandra Kovacevic, and Ralf Steinmetz. 2011. Peerfactsim. kom: A simulation framework for peer-to-peer systems. In 2011 International Conference on High Performance Computing & Simulation. IEEE, 577-584.
Tor Metrics. 2019. Relay Search with flag: authority. https://metrics. Torproject. org/rs. html#search/flag: authority
Liang Wang and Jussi Kangasharju. 2012. Real-World Sybil Attacks in BitTorrent Mainline DHT. In Proceedings of the IEEE Global Communication Conference (GlobeCom)2012. https://doi. org/10. 1109/GLOCOM. 2012. 6503215
Liang Wang and Jussi Kangasharju. 2013. Measuring large-scale distributed systems: case of BitTorrent Mainline DHT. In Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing. IEEE, 1-10. https://doi. org/10. 1109/P2P. 2013. 6688697