turning p2p networks into ddos engines: a survey

نویسندگان

hamid farhadi

school of science and eng., sharif university of technology (international campus), kish, iran behzad akbari

department of electrical and computer eng., tarbiat modares university, tehran, iran shahab rajaee

school of science and eng., sharif university of technology (international campus), kish, iran mohammad farahani

school of science and eng., sharif university of technology (international campus), kish, iran

چکیده

recently, peer-to-peer (p2p) networks contribute to a large fraction of the internet backbone traffic. consequently, misusing such networks for malicious purposes is a potential side effect. in this review article, we investigate different techniques of misusing p2p overlay networks to launch large-scale next-generation distributed denial of service (ddos) attacks. in particular, we investigate representative systems of the structured (overnet), unstructured (gnutella) and hybrid (bittorrent) p2p overlay networks. real world experiments indicate the high performance, difficulty in detection and tracking, and the low cost of launching such attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Resilience against DDoS Attack in Unstructured P2P Networks

In unstructured peer-to-peer (P2P) systems such as Gnutella, a general routing search algorithm is used to blindly flood a query through network among peers. But unfortunately, malicious nodes could easily make use of the search approach launching distributed denial of service (DDoS) attack which aims at the whole network. In order to alleviate or minimize the bad effect due to behavior of mali...

متن کامل

Turning statistical physics models into materials design engines.

Despite the success statistical physics has enjoyed at predicting the properties of materials for given parameters, the inverse problem, identifying which material parameters produce given, desired properties, is only beginning to be addressed. Recently, several methods have emerged across disciplines that draw upon optimization and simulation to create computer programs that tailor material re...

متن کامل

Turning Bureaucracies into Process Networks

Even though the process approach to organization design gains increased popularity, there is still a lack of methodologies for managing the migration process from functional, hierarchical organizations to process networks. While current change management approaches, such as BPR, often emphasize an organizational redesign “from scratch”, i.e. a total disregard of the current structure, combined ...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Antisocial Networks: Turning a Social Network into a Botnet

Antisocial Networks are distributed systems based on social networking Web sites that can be exploited by attackers, and directed to carry out network attacks. Malicious users are able to take control of the visitors of social sites by remotely manipulating their browsers through legitimate Web control functionality such as image-loading HTML tags, JavaScript instructions, etc. In this paper we...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of computer and robotics

جلد ۳، شماره ۲، صفحات ۸۳-۹۳

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023