Detection and Defense of Identity Attacks in P2P Network

  • Authors:
  • Chuiwei Lu

  • Affiliations:
  • Computer School, HuangShi Institute of Technology, HuangShi, China 435003

  • Venue:
  • ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Opening property of P2P network allows nodes to freely join P2P network and to create identity at no cost. Utilizing the loopholes, malicious nodes can create a number of identities in a short time, which will exhaust the identifiers resources and damage the operation of P2P network. The paper proposes a conundrum verification scheme which enables the node to join P2P network and creates identity more difficult. Moreover, it also puts forward a detection and elimination scheme, which can help P2P network to detect identity attackers promptly and eliminate them. Simulation experiments demonstrate that with the combination of the two schemes, P2P network can prevent identity attack effectively.