ID: cond-mat/0408248

Self-Repairing Peer-to-Peer Networks

August 11, 2004

View on ArXiv
Gabor Csardi, Maxwell Young, Jennifer Sager, Peter Haga
Condensed Matter
Disordered Systems and Neura...

In this paper we study the resilience of peer-to-peer networks to preferential attacks. We define a network model and experiment with three di erent simple repairing algorithms, out of which the so called 2nd neighbor rewiring algorithm is found to be e ective and plausible for keeping a large connected component in the network, in spite of the continuous attacks. While our motivation comes from peer-to-peer file sharing networks, we believe that our results are more general and applicable in a wide range of networks. All this work was done as a student project in the Complex Systems Summer School 2004, organized by the Santa Fe Institute in Santa Fe, NM, USA.

Similar papers 1

Comprehensive Analysis on the Vulnerability and Efficiency of P2P Networks under Static Failures and Targeted Attacks

March 10, 2013

90% Match
Farshad Safaei, Hamidreza Sotoodeh
Networking and Internet Arch...

Peer to peer systems are the networks consisting of a group of nodes possible to be as wide as the Internet. These networks are required of evaluation mechanisms and distributed control and configurations, so each peer will be able to communicate with other peers. Resilience to faults, failures and attacks, are the main requirements of most communication systems and networks today. Thus, since P2P networks can be individually used as an infrastructure and an alternative for m...

Find SimilarView on arXiv

An Anti-attack Model Based on Complex Network Theory in P2P networks

August 29, 2011

90% Match
Hao Peng, Songnian Lu, Dandan Zhao, ... , Li Jianhua
Networking and Internet Arch...
Data Analysis, Statistics an...

Complex network theory is a useful way to study many real systems. In this paper, an anti-attack model based on complex network theory is introduced. The mechanism of this model is based on dynamic compensation process and reverse percolation process in P2P networks. The main purpose of the paper is: (i) a dynamic compensation process can turn an attacked P2P network into a power-law (PL) network with exponential cutoff; (ii) a local healing process can restore the maximum de...

Find SimilarView on arXiv

Algorithms for Self-Healing Networks

May 21, 2013

89% Match
Amitabh Trehan
Data Structures and Algorith...
Distributed, Parallel, and C...
Networking and Internet Arch...

Many modern networks are \emph{reconfigurable}, in the sense that the topology of the network can be changed by the nodes in the network. For example, peer-to-peer, wireless and ad-hoc networks are reconfigurable. More generally, many social networks, such as a company's organizational chart; infrastructure networks, such as an airline's transportation network; and biological networks, such as the human brain, are also reconfigurable. Modern reconfigurable networks have a com...

Find SimilarView on arXiv

On the Topology Maintenance of Dynamic P2P Overlays through Self-Healing Local Interactions

May 16, 2014

88% Match
Stefano Ferretti
Networking and Internet Arch...
Distributed, Parallel, and C...

This paper deals with the use of self-organizing protocols to improve the reliability of dynamic Peer-to-Peer (P2P) overlay networks. We present two approaches, that employ local knowledge of the 2nd neighborhood of nodes. The first scheme is a simple protocol requiring interactions among nodes and their direct neighbors. The second scheme extends this approach by resorting to the Edge Clustering Coefficient (ECC), a local measure that allows to identify those edges that conn...

Find SimilarView on arXiv

Self-Healing Protocols for Connectivity Maintenance in Unstructured Overlays

June 15, 2015

88% Match
Stefano Ferretti
Distributed, Parallel, and C...

In this paper, we discuss on the use of self-organizing protocols to improve the reliability of dynamic Peer-to-Peer (P2P) overlay networks. Two similar approaches are studied, which are based on local knowledge of the nodes' 2nd neighborhood. The first scheme is a simple protocol requiring interactions among nodes and their direct neighbors. The second scheme adds a check on the Edge Clustering Coefficient (ECC), a local measure that allows determining edges connecting diffe...

Find SimilarView on arXiv

Error and attack tolerance of complex networks

August 3, 2000

88% Match
Reka University of Notre Dame Albert, Hawoong University of Notre Dame Jeong, Albert-Laszlo University of Notre Dame Barabasi
Disordered Systems and Neura...
Statistical Mechanics

Many complex systems, such as communication networks, display a surprising degree of robustness: while key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. In this paper we demonstrate that error tolerance is not shared by all redundant systems, but it is ...

Find SimilarView on arXiv

Algebraic Connectivity Control and Maintenance in Multi-Agent Networks under Attack

June 26, 2024

88% Match
Wenjie Zhao, Diego Deplano, Zhiwu Li, ... , Franceschelli Mauro
Systems and Control
Systems and Control
Optimization and Control

This paper studies the problem of increasing the connectivity of an ad-hoc peer-to-peer network subject to cyber-attacks targeting the agents in the network. The adopted strategy involves the design of local interaction rules for the agents to locally modify the graph topology by adding and removing links with neighbors. Two distributed protocols are presented to boost the algebraic connectivity of the network graph beyond $k-2\sqrt{k-1}$ where $k\in \mathbb{N}$ is a free des...

Find SimilarView on arXiv

Bypass rewiring and robustness of complex networks

June 30, 2016

88% Match
Junsang Park, Sang Geun Hahn
Data Analysis, Statistics an...
Physics and Society

A concept of bypass rewiring is introduced and random bypass rewiring is analytically and numerically investigated with simulations. Our results show that bypass rewiring makes networks robust against removal of nodes including random failures and attacks. In particular, random bypass rewiring connects all nodes except the removed nodes on an even degree infinite network and makes the percolation threshold 0 for arbitrary occupation probabilities. In our example, the even deg...

Find SimilarView on arXiv

Picking up the Pieces: Self-Healing in Reconfigurable Networks

January 24, 2008

88% Match
Jared Saia, Amitabh Trehan
Data Structures and Algorith...
Distributed, Parallel, and C...
Networking and Internet Arch...

We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity in these networks, even in the presence of repeated adversarial node deletion, by carefully adding edges after each attack. We present a new algorithm, DASH, that provably ensures that: 1) the network stays connected even if an adversary deletes up to all nodes in the network; and 2) no node ever in...

Find SimilarView on arXiv

Resilience of Social Networks Under Different Attack Strategies

October 31, 2014

88% Match
Mohammad Ayub Latif, Muhammad Naveed, Faraz Zaidi
Social and Information Netwo...
Physics and Society

Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two set...

Find SimilarView on arXiv