Essay: Survey Report on the State Of The Art P2P Computing Technology

Essay: Survey Report on the State Of The Art P2P Computing Technology
14/04/2011 Comments Off on Essay: Survey Report on the State Of The Art P2P Computing Technology Academic Papers on Information Technology,Sample Academic Papers admin

Sample Essay

Introduction

Wallach (2003, pp. 253) describes P2P networks as a mechanism for user to share file without the need for centralized servers. He describes the capability of P2P networks as a scalable and fault-tolerant mechanism which is able to locate nodes anywhere on a network without maintaining much routing state information which allows it to be used for a variety of applications such as multicast system, web caches and anonymous communication systems. However, as with other type of networks they also have advantages and disadvantages. Johnson, McGuire and Willey (2008) have identified the evolution in P2P networks as a growing security threat. With the growing number of already tremendous amount of users, P2P networks not only present several security issues but also challenges related to data routing on distributed networks. In this report we will review literature related to security issues found in P2P networks as well as the routing solutions proposed for transportation of data and requests on P2P networks.

Literature Review of Security Issues

Buford, Yu and Lua (2008) state in their book that the security attacks on P2P systems can be classified on the basis of various criteria. It has listed some of the criteria used for classified as functional target, communication mechanism, propagation mechanism, effect on victims and impact.

Theft

Buford, Yu and Lua (2008) have also mentioned that one of the most common types of attack is Theft, which is the leaking of information and inadvertent disclosure to access confidential information. Another type of security threat is the unsecured nature of information travelling through the P2P which can be intercepted and read by attacker. They have mentioned that cryptographic solutions offer the most effective way to secure many information security issues on P2P networks.  They have defined encryption as disguising in such as way that the content cannot be revealed without proper decryption key.

Distributed Denial of Service Attack

Kohli and Ganugula (2007) identify another threat to P2P security as Distributed Denial of Service Attack (DDoS). Leveraging the large user base and lack of authentication, any attacker can use P2P networks to launch as DDoS attack on any machine on the internet regardless of the fact that it is a part of P2P network or not. P2P networks use a mapping of file hashes and location called indexes. In their paper, they have identified two ways; an attacker can exploit a P2P sharing network in two ways to attack a victim, using these indexes – with index poisoning and with routing table poisoning.  In an index poisoning attack, the attacker places a false index record in a large number of victims. This record indicates that a popular file is being hosted by the victim. Any request to download such file would result in large amount of traffic being generated, which would prevent legitimate users to connect to the victim. In a routing table attack, the attacker makes a large number of peers to believe that the victim is their neighbour, by sending false node announcement messages. Therefore, whenever a peer receives a maintenance message or search query, it may select to forward the message to the victim. If the routing table is poisoned for a large number of peers, the victims receives a large number of maintenance messages and search queries which saturate its connection.

Please go to the order form to order essays, research papers, term papers, thesis, dissertation, case study, assignments on this essay topic.

Related Essays, Research Papers, Term Papers, Thesis, Dissertation, Case Study, Assignments entries.

...

Tags
About The Academic Paper