CFP last date
20 December 2024
Reseach Article

Analysis of Attacks and Security Issues on the Peer-to-Peer Networks

by Khalied Shredeh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 2
Year of Publication: 2016
Authors: Khalied Shredeh
10.5120/ijca2016908728

Khalied Shredeh . Analysis of Attacks and Security Issues on the Peer-to-Peer Networks. International Journal of Computer Applications. 138, 2 ( March 2016), 18-23. DOI=10.5120/ijca2016908728

@article{ 10.5120/ijca2016908728,
author = { Khalied Shredeh },
title = { Analysis of Attacks and Security Issues on the Peer-to-Peer Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 2 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number2/24351-2016908728/ },
doi = { 10.5120/ijca2016908728 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:38:36.210334+05:30
%A Khalied Shredeh
%T Analysis of Attacks and Security Issues on the Peer-to-Peer Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 2
%P 18-23
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Here in this paper we will review p2p network security issues, which is the subject of serious consideration should be given to him a full and carefully examine the condition of a people here will p2p system structures and attacks that may occur to p2p networks, as well as the potential for these attacks antibiotics and we will review the security issues that are in the routing Home p2p protocols and we will solve the major problems that occur in the exchange of files and applications on the network p2p process .

References
  1. Prashant Dewan and Partha Dasgupta “P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 22, NO. 7, JULY 2010
  2. Gheorghe, G., Lo Cigno, R., Montresor, A. Security and privacy issues in P2P streaming systems: a survey. Peer-to-Peer Netw. Appl. 4: 75-91, 2011. .
  3. Hyojin Park, Jinhong Yang, Juyoung Park, Shin Gak Kang, Jun Kyun Choi “A Survey on Peer-to-Peer Overlay Network Scheme” Feb. 17-20, 2008 ICACT 2008
  4. J.Schäfer K. Malinka P. Hanáček “Peer-to-Peer Networks Security” IEEE 2008
  5. Xiaowen Yue, Xiaofeng Qiu, Yang Ji, Chunhong Zhang “P2P Attack Taxonomy and relationship Analysis” Feb. 15-18, 20091CACT 2009
  6. Kun, Huang; Lu, Wang, Research of Trust Model Based on Peer-to-Peer Network Security. 2013 International Conference on Information Technology and Applications (ITA), Nov. 2013
  7. Rice, D.O., A Proposal for the Security of Peer-to-Peer (P2P) Networks: a pricing model inspired by the theory of complex networks. 41st Annual Conference on Information Sciences and Systems, 2007. CISS '07., 2007.
  8. Zink, T.; Waldvogel, M., BitTorrent traffic obfuscation: A chase towards semantic traffic identification. 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.126-137, 2012.
  9. Nakamoto, Satoshi, Bitcoin: A peer-to-peer electronic cash system, 2009. 2012. [Online]. Available: http://www.bitcoin.org/ bitcoin.pdf
  10. Chan-Tin, E., Chen, T., Kak, S. A comprehensive security model for networking applications. MobiPST, Munich, July 30- Aug 2, 2012.
  11. Naoum Naoumov and Keith Ross. Exploiting P2P Systems for Dos attacks. Proceeding of the First International Conference on Scalable Information Systems. June – 2006.
  12. Wallach, D.S. (2002) A Survey of Peer-to-Peer Security Issues. International Symposium on Software Security Tokyo, Japan..
  13. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structuredpeer-to-peer overlay networks. In: Proc. OSDI 2002, Boston, Massachusetts (2002) To appear.
  14. Sit, E., Morris, R.: Security considerations for peer-to-peer distributed hash tables. In: Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), Cambridge, Massachusetts (2002)
  15. Riidiger Schollmeier “A Definition of Peer-to-Peer Networking for the Classification of Peer-to-Peer Architectures and Applications” IEEE, 2002
  16. Hyojin Park, Jinhong Yang, Juyoung Park, Shin Gak Kang, Jun Kyun Choi “A Survey on Peer-to-Peer Overlay Network Scheme” Feb. 17-20, 2008 ICACT 2008 .
  17. Man Qi “P2P Network-Targeted DDoS Attacks” IEEE 2009
  18. Atul Singh, Miguel Castro, Peter Druschel and Antony Rowstron. Defending Against EclipseAttacks on Overlay Networks ACM. In Proc. of the 11th European SIGOPS Workshop, Leuven, Belgium, September 2004.
  19. Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenjia Guo, Liyong Tang, Zhong Chen “Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks” Eighth International Conference on Peer-to-Peer Computing (P2P'08) IEEE 2008
Index Terms

Computer Science
Information Sciences

Keywords

P2P Network security issues attacks on p2p network DoS attack poisoning attack