Abdelouahab, M. and Hassan, H.R. and Bouabdallah, A. and Achemlal, M. and Laniepce, S. (2008) TCA: Topology change attack in Peer-to-peer networks. In: UNSPECIFIED, APR 09, 2008, Singapore, SINGAPORE.
|The full text of this publication is not available from this repository. (Contact us about this Publication)|
Peer-to-peer systems are overlay applications in which every computer or node has a client and server role. Some of these systems use servers to locate resources over the network but not to transfer data. Efficient operator services (ADSL) and the drop in hardware cost have felt to extensive Internet spread to public consumers. Nowadays, file sharing is the most Popular and used P2P application over Internet. Because of this, P2P systems are receiving considerable research attention. It is crucial to identify and characterise both Vulnerabilities and attacks related to this application, in order to prevent their negative impacts. In this paper, we present a new attack: The Topology Change (TCA) attack over the eDonkey network. Further, we investigate and study scenarios, and techniques used to accomplish TC Attack. Efficient deployment of such an attack may have a dangerous impact on the overlay network, especially regarding the underlying network infrastructure.
|Item Type:||Conference or workshop item (Paper)|
|Subjects:||Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,|
|Divisions:||Faculties > Science Technology and Medical Studies > School of Computing > Security Group|
|Depositing User:||Mark Wheadon|
|Date Deposited:||29 Mar 2010 12:09|
|Last Modified:||13 Jun 2012 11:10|
|Resource URI:||http://kar.kent.ac.uk/id/eprint/23967 (The current URI for this page, for reference purposes)|
- Depositors only (login required):