A Survey of P2P Network Security

نویسنده

  • Logan Washbourne
چکیده

This paper presents a review of peer-to-peer network security. Popular for sharing of multimedia files, these networks carry risks and vulnerabilities relating to data integrity, spyware, adware, and unwanted files. Further attacks include those of forgery, pollution, repudiation, membership and Eclipse attacks, neighbor selection attacks, Sybil, DoS, and omission attacks. We review some protection mechanisms that have been devised. Introduction Most information transferred on the internet utilizes a server/client communication protocol, where one high performance machine services the requests of multiple lower performance machines. These lower performance machines have identities that the server can recognize, allowing a safe transaction to occur [1]. Unlike server/client networks, peer-to-peer (P2P) networks consist of nodes, or users, who behave like both server and client, able to simultaneously request information and provide information to other nodes. P2P nodes have aptly been dubbed Servents, taking half of the word server and half of the word client [1]. Not only can nodes within a P2P network both send and receive data, they can also share resources such as processing power, storage, peripherals, and network capacity [1]. P2P networks became popular after the emergence of Napster, an early application that allowed users to share music with other users. It utilized a hybrid P2P network where there was a central server that allowed users to search for music and then multiple users would contribute percentages of the file being searched for [2]. The P2P model is convenient because of its classical ability to search for files throughout the network, using a semi-centralized server; however, as it will be shown, any form of centralized node grouping can leave the whole network vulnerable to attacks. Along with hybrid P2P networks there are also “pure” P2P networks, which do not have any centralized nodes, and all file transfers happen between users. Streaming P2P services suffer additional attacks such as data pollution that affects QoS, or data outage by the use of Eclipse, Sybil and neighbor selection attacks. This is done by attacking the routing substrate of the P2P network which is based normally on distributed hash tables [3]. The study of P2P networks is of particular interest because in many ways, in the absence of centralized control, they mimic and even amplify social behavior. The same issues that confront information integrity in knowledge networks [4],[5] show up in P2P networks. The use of random sequences for authentication protocols and discovering intruders [6]-[12] is important for the protection of social interaction. This paper presents an overview of P2P network models and considers security issues as well as applications. History of P2P Networking Peer-to-peer networking essentially started with the ARPANET, which began as a venture, through DARPA, to network together computers that were under contract with them in 1966. Larry Roberts successfully connected computers at UCLA, SRI, UCSB, and UoU, in 1969 utilizing

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Taxonomy of Structured P2P Overlay Networks Security Attacks

The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...

متن کامل

An Exaustive Survey of Trust Models in P2p Network

Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...

متن کامل

An exhaustive survey of trust models in p2p network

Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing tr...

متن کامل

GGRA: a grouped gossip-based reputation aggregation algorithm

An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...

متن کامل

A Survey of Peer-to-Peer Security Issues

Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1504.01358  شماره 

صفحات  -

تاریخ انتشار 2015