Abstract

Overlay networks are virtual networks, which exist on top of the current Inter net architecture, and are used in support of peer-to-peer (P2P) applications. The virtualization provides overlays with the ability to create large, scalable, decentral ized networks with efficient routing. Many implementations of overlay networks have come out of academic research. Each provides a unique structure and routing configuration, aimed at increasing the overall network efficiency for a particular ap plication. However, they are all threatened by a similar set of severe vulnerabilities.

I explore some of these security deficiencies of overlay network designs and pro pose a new overlay network security framework Phyllo. This framework aims to mitigate all of the targeted security problems across a majority of the current overlay implementations, while only requiring minimal design changes. In order to demonstrate the validity of Phyllo, it was implemented on top of the Pastry overlay architecture. The performance and security metrics of the network with the pro posed framework are evaluated against those of the original in order to demonstrate the feasibility of Phyllo.

Library of Congress Subject Headings

Peer-to-peer architecture (Computer networks)--Security measures

Publication Date

2005

Document Type

Thesis

Student Type

Graduate

Degree Name

Computer Science (MS)

Department, Program, or Center

Computer Science (GCCIS)

Advisor

Not identified

Comments

TK5105.525 .H44 2005

Campus

RIT – Main Campus

Share

COinS