ID Mapping Attacks in P2P Networks

Davide Cerri, Alessandro Ghioni, Stefano Paraboschi, Simone Tiraboschi
2005 IEEE Global Telecommunications Conference (GLOBECOM 2005), St. Louis, Missouri, USA, 28 novembre – 2 dicembre 2005Sommario:
Current P2P (overlay) networks have been designed with a focus on the construction of efficient mechanisms for the storage and retrieval of information among a community of participating nodes, with limited attention to the protection from malicious behaviours. The paper analyzes the attacks that can be realized on the choice of identifiers by the nodes and proposes adequate countermeasures. The paper uses as a reference the Kademlia protocol, but most of the results are immediately applicable to every DHT network.

È possibile scaricare l’articolo (in inglese). Attenzione: questo materiale è sotto copyright IEEE, si veda la nota qui sotto. È inoltre disponibile la presentazione fatta alla conferenza.

©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Questo sito usa Akismet per ridurre lo spam. Scopri come i tuoi dati vengono elaborati.