Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Content availability, pollution and poisoning in file sharing peer-to-peer networks
Proceedings of the 6th ACM conference on Electronic commerce
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Exploiting P2P systems for DDoS attacks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Understanding churn in peer-to-peer networks
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
A Taxonomy of Information Security for Service-Centric Systems
EUROMICRO '07 Proceedings of the 33rd EUROMICRO Conference on Software Engineering and Advanced Applications
Identity theft protection in structured overlays
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Internet infrastructure security: a taxonomy
IEEE Network: The Magazine of Global Internetworking
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Hi-index | 0.00 |
With the wide deployment of P2P networks, the attacks against them have been attracting more and more attention. However, studies on security problems in P2P network mainly focus on individual attack. We still lack systemic analysis of attacks in P2P network. Understanding the taxonomy and the relationships between attacks will help to build the security mechanism and effectively organize the defense system. In this paper, we pursue an in-depth study on existing security problems in P2P networks. Taxonomy of P2P attacks is proposed. Then relationships between attacks are analyzed. Finally, based on the taxonomy, characters of DOS/DDOS attacks in P2P network is illustrated.