Peer-to-Peer Systems as Attack Platform for Distributed Denial-of-Service
نویسندگان
چکیده
Distributed Denial-of-Service attacks are an effective means to make a service unavailable, mask other attack activities and generally degrade or disrupt network functionality. The key characteristic is that analysis of and defence against this attack type is difficult because of the high number of attacking hosts and large amount of attack traffic that can be generated. The emerging Peer-to-Peer filesharing systems have characteristics that turn them into an attractive infrastructure that can be used as attack platform. Attackers that can compromise a P2P system can expect benefits such as a large number of participants, easy hiding of attack control traffic and good, global distribution of participating hosts. This gives attackers high flexibility and at the same time a smal risk of being identified. This paper explains these characteristics in detail and concludes that further research into this threat and into possible countermeasures is urgently needed.
منابع مشابه
Peer-to-peer platforms for high-quality web services: the case for load-balanced clustered peer-to-peer systems
This chapter presents a clustered peer-to-peer system as a resource organization structure for webservice hosting platforms where service quality such as response time and service availability are provided with assurance. The peer-to-peer organization allows integration of autonomous resources into a single platform in a scalable manner. In clustered peer-to-peer systems, nodes are organized in...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملOn Mitigating Scaling Issues of a Peer-to-Peer Electronic Cash System
The year 2009 marked the launch of peer-to-peer electronic cash systems. These systems have proven to be resistant to attack. However, concerns about a potential denial-of-service attack (DoS attack) have prompted artificial limits on the transactions that such a system will process. We will explore the need for these limits. We introduce economic mitigation which may be more intuitive for end ...
متن کاملA Testbed-based Analysis of the Incorrect Lookup Routing Attack on the Pastry DHT
Distributed Hashtables (DHT), with Pastry [2] as a prominent representative, are one of the most recent peer-to-peer (P2P) architectures. DHTs scale well to the network size due to a small routing table and a hierarchical routing scheme. In Pastry, the number of routing entries scales logarithmically with respect to the number of participating nodes, because each node maintains route entries to...
متن کاملA Distributed Denial-of-Service(DDoS) Attack using BitTorrent Peer-to-Peer(P2P) Network
Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002