Filters








9,408 Hits in 10.4 sec

Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks

Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenjia Guo, Liyong Tang, Zhong Chen
2008 2008 Eighth International Conference on Peer-to-Peer Computing  
Poisoning attacks in the Peer-to-Peer (P2P) content sharing service have become a serious security problem on the global Internet due to the features of P2P systems such as self-organization, self-maintenance  ...  To provide the mechanisms of availability and scalability, a content provider publishes the information of his shared contents to a group of content maintainers self-organized in a security overlay, so  ...  Acknowledgment We would like to thank our shepherd, Aleksandra Kovacevic, as well as the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/p2p.2008.31 dblp:conf/p2p/ChenLCGTC08 fatcat:r5jodhyrfrh67ldrbtxxtmgq3q

Attacks And Counter Measures In Bst Overlay Structure Of Peer-To-Peer System

Guruprasad Khataniar, Hitesh Tahbildar, Prakriti Prava Das
2013 Zenodo  
We also provide different security techniques that can be applied against these attacks.  ...  Here we present four such possible attacks namely index poisoning attack, eclipse attack, pollution attack and syn flooding attack. The functionality of BST is affected by these attacks.  ...  The other peers cannot get services from the victim node as the fooled peers have already occupied the connections. BST can also suffer from index poisoning attack.  ... 
doi:10.5281/zenodo.1081316 fatcat:mnmgm3n6gnel3ac2c7g4hcjjwy

Survey on the Present State-of-the-Art of P2P Networks, Their Security Issues and Counter Measures

Gera Jaideep, Bhanu Prakash Battula
2016 International Journal of Applied Engineering Research  
Peer-to-Peer (P2P) networks are quite different from traditional client-server networks. In P2P systems, all nodes are equal or peers and they can either act as client or server.  ...  Nevertheless, the P2P networks throw security challenges as the nodes are vulnerable to various attacks. In this paper we review the P2P networks, their security issues and counter measures.  ...  Introduction Peer-to-peer (P2P) network is different from traditional computer network. In traditional networks one or more servers are dedicated to provide services to clients [10] .  ... 
doi:10.37622/ijaer/11.1.2016.616-620 fatcat:pm4tben3bvc2zaeifnnajzpur4

A Study of Index Poisoning in Peer-To-Peer File Sharing Systems

Quan Yuan, Aaron Little, Maggie Kabore, Youssouf Kabore
2014 International Journal on Cybernetics & Informatics  
In order to protect the users from these attacks it is important to find solutions to eliminate or mitigate the effects of index poisoning attacks.  ...  One of the leading sources of disruptions in the P2P file sharing systems is the index poisoning attacks.  ...  The Online Social Trust model (OST) [6] is another reactive prevention method intending to secure P2P exchanges and to prevent attacks like index poisoning, as well as to address internet security as  ... 
doi:10.5121/ijci.2014.3602 fatcat:pntdbft54jhrtkatvh24sy2osq

Pollution Measurement in Bittorent

G. N., Deepika Sainani, Urmil Malik
2016 International Journal of Computer Applications  
.However, these reasons for significant rise of P2P network also makes the P2P networks vulnerable to various pollution attacks such as denial of service attack, content poisoning, collusion sybil etc  ...  Since the invent of Napster an earlier version of peer-to-peer [P2P] network , P2P has emerged as the most significant technique for sharing content across the network[1].The traffic volume exchanged among  ...  Uncooperative Peer Attack For its evaluation following indices are considered: 1) ACST: Average Connection Sharing Time-a genuine peer spends to download data from uncooperative peer. 2) ADF: Average Download  ... 
doi:10.5120/ijca2016911351 fatcat:hslgijclk5cjnarikede6fg2za

Taxonomy Of Structured P2P Overlay Networks Security Attacks

Zied Trifa, Maher Khemakhem
2012 Zenodo  
The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users.  ...  Moreover, we observed that most of the existing systems such as Content Addressable Network (CAN), Chord, Pastry, Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability which lead to disrupt  ...  In this way, attacker corrupts the content of shared file, rendering it unusable, and forwards the corrupted file to other peers.  ... 
doi:10.5281/zenodo.1070391 fatcat:tz5ep2ljurcdhin7aoaaeu33lq

When KAD Meets BitTorrent - Building a Stronger P2P Network

Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor
2011 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum  
We investigate the security threats and show that the current BitTorrent Mainline DHT is much more vulnerable to attacks than KAD.  ...  Related work demonstrates that BitTorrent's Mainline DHT is exposed to several identified security issues. In parallel, the KAD DHT has been the core of intense research and was improved over years.  ...  This feature protects the routing table from a full poisoning (8 Sybils per bucket), but not from a partial poisoning (1 Sybil per bucket).  ... 
doi:10.1109/ipdps.2011.318 dblp:conf/ipps/TimpanaroCCF11 fatcat:txwq42psw5fqfmam4wkhk7vad4

Copyright Protection in Peer To Peer Network

Siraj Ul Muneera S, Yoga Lakshmi M, Dr. Ashwini K
2017 International Journal of Engineering Research and Applications  
In this work, we propose a solution to ensure copy right violation in P2P systems. Our framework includes DRM, pollution attack, index poisoning, water marking and fingerprinting.  ...  In particular, P2P file sharing is recognized as a killer application for the P2P technology, and several P2P file sharing systems have been used by many users from the late 90"s to the present, including  ...  Pollution attack is aimed to prevent users from conducting an illegal sharing of copyrighted contents in Fast-track (a P2P file sharing system).  ... 
doi:10.9790/9622-0705013340 fatcat:hueexn7vvbhcflja7piu3kmdde

Collusive Piracy Prevention in P2P Content Delivery Networks

Xiaosong Lou, Kai Hwang
2009 IEEE transactions on computers  
We propose a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing.  ...  We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts.  ...  These assurances ensure that our PAP protocol is secured from common attacks as explained below.  ... 
doi:10.1109/tc.2009.26 fatcat:hjrci3k2jnh27gk3ab2qasjmyy

Monitoring and Controlling Content Access in KAD

T. Cholez, I. Chrisment, O. Festor
2010 2010 IEEE International Conference on Communications  
For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest  ...  We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files.  ...  Besides, by advertising attractive fake files which appear to be shared by many sources, HAMACK can assess peers' interest for a particular content from the initial content publication or search to the  ... 
doi:10.1109/icc.2010.5502179 dblp:conf/icc/CholezCF10 fatcat:ldzkfs3hurcgdlszzrkqrwg4di

Authority System to Prevent Privacy Protection in Peer-to-Peer Network System

S. Uvaraj
2013 American Journal of Networks and Communications  
We proposed a proactive content poisoning scheme to stop colluders and pirates from alleged copyright infringements in P2P file sharing.  ...  We developed a new peer authorization protocol (PAP) to distinguish pirates from legitimate clients. Detected pirates will receive poisoned chunks in their repeated attempts.  ...  Secure File Indexing In a P2P file-sharing network, a file index is used to map a file ID to a peer endpoint address.  ... 
doi:10.11648/j.ajnc.20130203.13 fatcat:iw7cjny5sve4vb5wvextoxkhlm

Peer-to-peer overlays for real-time communication: security issues and solutions

Dhruv Chopra, Henning Schulzrinne, Enrico Marocco, Emil Ivov
2009 IEEE Communications Surveys and Tutorials  
Other P2P specific security problems that we present here include attacks on the routing of queries, targeted denial of service attacks and attacks on data integrity. Manuscript received ; revised .  ...  INTRODUCTION P EER TO PEER (P2P) overlays have become quite popular with the advent of file-sharing applications such as Napster [1], KaZaa [2] and Bittorrent [3].  ...  index and to the user's device directly Integrity Attackers may want to share corrupted files in place of popular content, e.g. to discourage users from acquiring copyrighted material; constitute  ... 
doi:10.1109/surv.2009.090102 fatcat:am2yxffjdzddrpy7bmbrnj6ta4

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Michele Amoretti
2010 Recent Patents on Computer Science  
In this paper we propose a categorization for the peer-to-peer overlay schemes and a survey of the most popular ones, comparing each other with respect to effectiveness and security.  ...  Consistency concerns how old the acquired data (resource descriptions or shared content) are with respect to the actual available resources.  ...  When a peer goes to search for a resource, it would receive bogus location information from a poisoned index, either from a central directory or from another peer.  ... 
doi:10.2174/1874479610902030195 fatcat:aiqdocqnffdhvetgzssktiqnja

A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security

Michele Amoretti
2009 Recent Patents on Computer Science  
In this paper we propose a categorization for the peer-to-peer overlay schemes and a survey of the most popular ones, comparing each other with respect to effectiveness and security.  ...  Consistency concerns how old the acquired data (resource descriptions or shared content) are with respect to the actual available resources.  ...  When a peer goes to search for a resource, it would receive bogus location information from a poisoned index, either from a central directory or from another peer.  ... 
doi:10.2174/2213275910902030195 fatcat:mcqbamtd25acnmxbem4q77c5ze

An identity-based approach to secure P2P applications with Likir

Luca Maria Aiello, Marco Milanesio, Giancarlo Ruffo, Rossano Schifanella
2011 Peer-to-Peer Networking and Applications  
Our purpose is to focus on three main goals: (1) providing security services and a secure overlay infrastructure against the vast majority of security threats on P2P systems, (2) dynamically creating a  ...  Structured overlay networks are highly susceptible to attacks aimed at subverting their structure or functionalities.  ...  We would like to thank the anonymous reviewers for their precious suggestions, that have been useful to improve the paper.  ... 
doi:10.1007/s12083-010-0099-6 fatcat:cbqcxbckirbhpot63hm2fuzy24
« Previous Showing results 1 — 15 out of 9,408 results