Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

What’s Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass

  • Conference paper
  • First Online:

Abstract

InterPlanetary File System (IPFS) is one of the most promising decentralized off-chain storage mechanisms, particularly relevant for blockchains, aiming to store the content forever, thus it is crucial to understand its composition, deduce actor intent and investigate its operation and impact. Beyond the network functionality that IPFS offers, assessing the quality of nodes, i.e. analysing and categorising node software and data, is essential to mitigate possible risks and exploitation of IPFS. To this end, in this work we took three daily snapshots of IPFS nodes within a month and analysed each node (by IP address) individually, using threat intelligence feeds. The above enabled us to quantify the number of potentially malicious and/or abused nodes. The outcomes lead us to consider using a filter to isolate malicious nodes from the network, an approach we implemented as a prototype and used for assessment of effectiveness.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 13727
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
JPY 17159
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

References

  1. Althouse, J.: Easily Identify Malicious Servers on the Internet with JARM (2020).https://engineering.salesforce.com/easily-identify-malicious-servers-on-the-internet-with-jarm-e095edac525a

  2. Balduf, L., Henningsen, S., Florian, M., Rust, S., Scheuermann, B.: Monitoring data requests in decentralized data storage systems: a case study of IPFS. In: 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pp. 658–668. IEEE (2022)

    Google Scholar 

  3. Benet, J.: Ipfs-content addressed, versioned, p2p file system. arXiv preprintarXiv:1407.3561 (2014)

  4. Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM13(7), 422–426 (1970)

    Article  Google Scholar 

  5. Casino, F., Politou, E., Alepis, E., Patsakis, C.: Immutability and decentralized storage: an analysis of emerging threats. IEEE Access8, 4737–4744 (2019)

    Article  Google Scholar 

  6. Cook, A.V., Bechtel, M., Anderson, S., Novak, D.R., Nodi, N., Parekh, J.: The spatial web and web 3.0: what business leaders should know about the next era of computing. Deloitte Insights (2020)

    Google Scholar 

  7. Henningsen, S., Florian, M., Rust, S., Scheuermann, B.: Mapping the interplanetary filesystem. In: 2020 IFIP Networking Conference (Networking), pp. 289–297 (2020)

    Google Scholar 

  8. Karapapas, C., Pittaras, I., Fotiou, N., Polyzos, G.C.: Ransomware as a service using smart contracts and IPFS. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–5. IEEE (2020)

    Google Scholar 

  9. Labs, P.: Libp2p (2021).https://libp2p.io/

  10. Mamun, A.A., Hasan, S.R., Bhuiyan, M.S., Kaiser, M.S., Yousuf, M.A.: Secure and transparent KYC for banking system using IPFS and blockchain Technology. In: 2020 IEEE Region 10 Symposium (TENSYMP), pp. 348–351 (2020).https://doi.org/10.1109/TENSYMP50017.2020.9230987

  11. Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002).https://doi.org/10.1007/3-540-45748-8_5

    Chapter  Google Scholar 

  12. Murray, A., Kim, D., Combs, J.: The promise of a decentralized internet: what is web 3.0 and how can firms prepare? Business Horizons (2022)

    Google Scholar 

  13. Patsakis, C., Casino, F.: Hydras and IPFS: a decentralised playground for malware. Int. J. Inf. Secur.18(6), 787–799 (2019)

    Article  Google Scholar 

  14. Pripoae, S.: Looking Into the Eye of the Interplanetary Storm (2020).https://www.bitdefender.com/files/News/CaseStudies/study/376/Bitdefender-Whitepaper-IPStorm.pdf

  15. De la Rocha, A., Dias, D., Psaras, Y.: Accelerating content routing with bitswap: a multi-path file transfer protocol in IPFS and Filecoin (2021)

    Google Scholar 

  16. Trautwein, D., et al: Design and evaluation of IPFS: a storage layer for the decentralized web. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp. 739–752 (2022)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Dennis Trautwein for his insightful comments. This work was supported in part by the European Commission under the Horizon Europe Programme, as part of the project LAZARUS (https://lazarus-he.eu/, Grant Agreement no. 101070303) and the Horizon 2020 Programme, as part of the project HEROES (https://heroes-fct.eu/, Grant Agreement no. 101021801) and was also supported in part by the Research Center of the Athens University of Economics and Business.

The content of this article does not reflect the official opinion of the European Union. Responsibility for the information and views expressed therein lies entirely with the authors.

Author information

Authors and Affiliations

  1. Athens University of Economics and Business, Athens, Greece

    Christos Karapapas & George C. Polyzos

  2. University of Piraeus, Piraeus, Greece

    Constantinos Patsakis

  3. Athena Research Center, Marousi, Greece

    Constantinos Patsakis

Authors
  1. Christos Karapapas

    You can also search for this author inPubMed Google Scholar

  2. George C. Polyzos

    You can also search for this author inPubMed Google Scholar

  3. Constantinos Patsakis

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toChristos Karapapas.

Editor information

Editors and Affiliations

  1. Poznan Supercomputing and Networking Center, Poznań, Poland

    Norbert Meyer

  2. Poznań University of Technology, Poznań, Poland

    Anna Grocholewska-Czuryło

Rights and permissions

Copyright information

© 2024 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Karapapas, C., Polyzos, G.C., Patsakis, C. (2024). What’s Inside a Node? Malicious IPFS Nodes Under the Magnifying Glass. In: Meyer, N., Grocholewska-Czuryło, A. (eds) ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Springer, Cham. https://doi.org/10.1007/978-3-031-56326-3_11

Download citation

Publish with us

Societies and partnerships

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 13727
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
JPY 17159
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp