Peer-to-Peer Systems as Attack Platform for Distributed Denial-of-Service

نویسندگان

  • Arno Wagner
  • Bernhard Plattner
چکیده

Distributed Denial-of-Service attacks are an effective means to make a service unavailable, mask other attack activities and generally degrade or disrupt network functionality. The key characteristic is that analysis of and defence against this attack type is difficult because of the high number of attacking hosts and large amount of attack traffic that can be generated. The emerging Peer-to-Peer filesharing systems have characteristics that turn them into an attractive infrastructure that can be used as attack platform. Attackers that can compromise a P2P system can expect benefits such as a large number of participants, easy hiding of attack control traffic and good, global distribution of participating hosts. This gives attackers high flexibility and at the same time a smal risk of being identified. This paper explains these characteristics in detail and concludes that further research into this threat and into possible countermeasures is urgently needed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Peer-to-peer platforms for high-quality web services: the case for load-balanced clustered peer-to-peer systems

This chapter presents a clustered peer-to-peer system as a resource organization structure for webservice hosting platforms where service quality such as response time and service availability are provided with assurance. The peer-to-peer organization allows integration of autonomous resources into a single platform in a scalable manner. In clustered peer-to-peer systems, nodes are organized in...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

On Mitigating Scaling Issues of a Peer-to-Peer Electronic Cash System

The year 2009 marked the launch of peer-to-peer electronic cash systems. These systems have proven to be resistant to attack. However, concerns about a potential denial-of-service attack (DoS attack) have prompted artificial limits on the transactions that such a system will process. We will explore the need for these limits. We introduce economic mitigation which may be more intuitive for end ...

متن کامل

A Testbed-based Analysis of the Incorrect Lookup Routing Attack on the Pastry DHT

Distributed Hashtables (DHT), with Pastry [2] as a prominent representative, are one of the most recent peer-to-peer (P2P) architectures. DHTs scale well to the network size due to a small routing table and a hierarchical routing scheme. In Pastry, the number of routing entries scales logarithmically with respect to the number of participating nodes, because each node maintains route entries to...

متن کامل

A Distributed Denial-of-Service(DDoS) Attack using BitTorrent Peer-to-Peer(P2P) Network

Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002