Research on Security of P2P Technology

Article Preview

Abstract:

This paper introduces P2P applications and its definition. Although this technology has the promising capability of anti-destruction and privacy protection, it still has quite a few intrinsic faults. In this paper, three popular methods of network attack against P2P: Sybil attack, Eclipse attack and DDOS attack. The differences among the three kinds of attack have been pointed out. At last, the defensive measures against the attacks have been introduced.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2826-2829

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Maymounkov P, Mazieres D. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric[C]/the First International Workshop on Peer-to-Peer Systems(IPTPS'02).

DOI: 10.1007/3-540-45748-8_5

Google Scholar

[2] Awerbuch B, Scheideler C. Towards a scalable and robust DHT [C]/Proceedings of the 18th Annual ACM Symposium on Parallelism in Algorithms and Architecture. New York, USA: association for Computing Machinery(2006).

DOI: 10.1145/1148109.1148163

Google Scholar

[3] HU Ling-ling, YANG Shou-bao, WANG Jing, Defense Mechanism for Sybil Attack in P2P Network, Computer Engineering, 35(15): 121-123 (2009).

Google Scholar

[4] Maccari L, Rosi M, Fantacci R, et al. Avoiding eclipse attacks on Kad/Kademila: An identity based approach[C]/Proceedings of the IEEE International Conference on communications. Riscataway, USA: IEEE Press (2009).

DOI: 10.1109/icc.2009.5198772

Google Scholar

[5] Yu Jie, Fang Cheng-fnag, Lu Li-ming, et al. A Lightweight Mechanism to Mitigate Application Layer DDOS Attacks[c]/The 4th International ICST Conference on Scalable Information Systems(INFOSCALE'09). Hong Kong,June (2009).

DOI: 10.1007/978-3-642-10485-5_13

Google Scholar