Model the P2P Attack in Computer Networks
Authors
Wei Wang, Wenhong Zhao
Corresponding Author
Wei Wang
Available Online July 2015.
- DOI
- 10.2991/lemcs-15.2015.260How to use a DOI?
- Keywords
- P2P attack; Attack model; Network throughput; Network security; Attack structure
- Abstract
To analyze the distributed attack actions in computer networks, different models are discussed. Firstly, the Hybrid P2P, Pure P2P and Super P2P structures of attack are presented. The, the broadcast mechanisms of every structure are introduced. The attack methods mainly focus on the index poisoning and routing table poisoning on the general nodes and access point. By the presented model, high attack flexibility, no single point of failure, high freedom may be achieved. It is difficult to cluster, identify the attack traffic and trace the attacker. So, security researchers of computer networks should catch the attention of P2P attacks.
- Copyright
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Wei Wang AU - Wenhong Zhao PY - 2015/07 DA - 2015/07 TI - Model the P2P Attack in Computer Networks BT - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science PB - Atlantis Press SP - 1303 EP - 1307 SN - 1951-6851 UR - https://doi.org/10.2991/lemcs-15.2015.260 DO - 10.2991/lemcs-15.2015.260 ID - Wang2015/07 ER -