A Survey of Peer-to-Peer Network Security Issues
James Li
Abstract
In recent years, peer-to-peer (P2P) networks have soared in popularity in the form of file sharing applications.
With this popularity comes security implications and vulnerabilities.
In this paper, we examining the framework on which most P2P networks are built,
and from this, we examine how attacks on P2P networks leverage the very essence of the networks itself: decentralization of resources and of control.
Additionally, we look at the privacy and usage attacks that arise in P2P networks as well as approaches that can be used address some of these issues.
Table of Contents
- 1. Introduction
- 2. Background of P2P Networks
- 2.1 Applications of P2P Networks
- 2.2 Centralized Directory
- 2.3 Query Flooding
- 2.4 Distributed Hash Table
- 3. Attacks on P2P Networks
- 3.1 Distributed Denial-of-Service
- 3.2 Poisoning the Network
- 3.3 Privacy and Identity
- 3.4 Fairness in Sharing
- 3.5 Blocking of P2P Traffic
- 4. Securing P2P Networks
- 4.1 Encrypting P2P Traffic
- 4.1 Anonymous P2P
- 5. Summary
- 6. References
- 7. List of Acronyms
Back to Raj Jain's Home Page
View the complete report online
Shift-click to download the paper in Adobe Acrobat format