P2P E-Mail
نویسندگان
چکیده
E-mail is a mission-critical communication function for virtually all institutions, including corporations, universities, militaries, and families. Given the paramount importance of e-mail in modern society, it is disturbing how vulnerable the e-mail user can be to attacks and failures. Indeed, modern e-mail employs a server-centric design, in the user is critically dependent on its mail server, which receives, stores, and provides access to the user’s inbox. If this mail server is down – due to, for example, inadvertant faults, disasters, physical attacks or cyber attacks – the user can neither receive nor access its messages. Many mail service providers including Hotmail, YahooMail, and Critical Path have patched the dependability problem by creating mail-server clusters. The cluster is not only responsible for receiving, storing and delivering many users’ messages, but it also replicates messages across the different servers in the cluster. Thus, if one of the mail servers becomes unavailable, the cluster can continue to receive, store, and deliver messages. However, this patch only provides a marginal improvement in dependability, as it does not address scenarios in which the entire cluster is taken out, such as when the cluster is behind an access link that is severed for flooded with denial-of-service traffic, or when the building housing the cluster is physically bombed.
منابع مشابه
A Novel P2P VoD Streaming Technique Integrating Localization and Congestion Awareness Strategies
The concept of the “future Internet” has evolved amongst researchers recently to relieve the tremendous pressure on the current Internet infrastructure to support the heterogeneous networking technologies, mobile devices, increased population of users, and also the high user requirements for real-time services and applications. Peer-to-Peer (P2P) Video on Demand (VoD) streaming technologies are...
متن کاملManaging Linguistic Data Summaries in Advanced P2P Applications
As the amount of stored data increases, data localization techniques become no longer sufficient in P2P systems. A practical approach is to rely on compact database summaries rather than raw database records, whose access is costly in large P2P systems. In this chapter, we describe a solution for managing linguistic data summaries in advanced P2P applications which are dealing with semantically...
متن کاملSecure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her mail server. In this paper we present a peer-to-peer (P2P) email architecture that eliminates the need to rely on a single server and boosts the resilience of email against any kinds of attacks. Our architecture also p...
متن کاملEfficient search based on content similarity over self-organizing P2P networks
The advent of the World Wide Web has made an enormous amount of information available to everyone and the widespread use of digital equipment enables end-users (peers) to produce their own digital content. This vast amount of information requires scalable data management systems. Peer-to-peer (P2P) systems have so far been well established in several application areas, with file-sharing being t...
متن کاملAnalysis of Peer-to-Peer Botnet Attacks and Defenses
A “botnet” is a network of computers that are compromised and controlled by an attacker (botmaster). Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Due to the distributive nature of P2P networks, ...
متن کاملSorcery: Overcoming deceptive votes in P2P content sharing systems
Deceptive voting behaviors of malicious users are known as the main reason of causing content pollution in Peer-to-Peer (P2P) content sharing systems. Due to the nature of P2P overlay network such as self-organization and anonymity, the existing methods on identifying deceptive votes are not effective, especially for collusive attackers. This paper presents Sorcery, a novel active challenge-res...
متن کامل