, Maher Khemakhem Taxonomy of Structured P 2 P Overlay Networks Security Attacks
نویسنده
چکیده
The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreover, we observed that most of the existing systems such as Content Addressable Network (CAN), Chord, Pastry, Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability which lead to disrupt and corrupt their functioning. We hope that our survey constitutes a good help for who’s working on this area of research. Keywords—P2P, Structured P2P Overlay Networks, DHT, Security, classification
منابع مشابه
Taxonomy of Structured P2P Overlay Networks Security Attacks
The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, we attempt to provide a taxonomy of structured P2P overlay networks security attacks. We have specially focused on the way these attacks can arise at each level of the network. Moreove...
متن کاملSybil Nodes as a Mitigation Strategy Against Sybil Attack
Sybil attack is considered one of the most damaged attack that menace structured p2p overlay networks. It’s the most sophisticated node active, used for a variety of illicit activities. A key requirement for these activities is the ability of such malicious user to generate a huge number of node identifiers and possibly choose some of them in order to disrupt availability and integrity in such ...
متن کاملEffects of Churn on Structured P2P Overlay Networks
As structured p2p systems becomes largely deployed, the size of the network becomes large enough that any kind of churn has a significant influence on the performance of such overlay. In structured p2p systems, peers create interactive link with other peers called neighbours that both depend on and influence each other. While peers trust each other’s to delivers services, the network effects ex...
متن کاملThe Zenith attack: vulnerabilities and countermeasures
In this paper we identify and define Zenith attacks, a new class of attacks on content-distribution systems, which seek to expose the popularity (i.e. access frequency) of individual items of content. As the access pattern to most real-world content exhibits Zipf-like characteristics [2], there is a small set of dominating items which account for the majority of accesses. Identifying such items...
متن کاملTaxonomy of Security Attacks in Sensor Networks and Countermeasures
Ad-hoc sensor networks have become common over the past few years and the domain of their application is increasing widely. However, the security of these networks poses a great challenge due to the fact that they consist of tiny wireless devices which have limited hardware and energy resources. In addition, these networks are generally deployed and then left unattended. These facts coupled tog...
متن کامل