Attack vulnerability of peer-to-peer networks and cost-effective immunization

Xinli Huang, Fanyuan Ma, Yin Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Currently, great efforts on network security are being made to concern software protection and prevention of loopholes, rather than the network topology. In this paper, we present a detailed and in-depth study on the response of peer-to-peer (P2P) networks subject to attacks, and investigate how to improve their attack survivability with a viewpoint of topological properties. We first, by extensive simulations, examine the attack vulnerability of P2P networks and find that these networks are extremely robust to random attacks whereas highly vulnerable under intentional targeted attacks. Based on these findings, we then develop a novel framework better characterizing the immunization of Gnutella-like P2P networks by taking into account the cost of curing infected peers. Finally, we propose a unique defense policy against intentional attacks and verify its performance merits via comprehensive experiments.

Original languageEnglish
Title of host publicationParallel and Distributed Processing and Applications - ISPA 2005 Workshops - ISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Proceedings
PublisherSpringer Verlag
Pages45-53
Number of pages9
ISBN (Print)3540297707, 9783540297703
DOIs
StatePublished - 2005
Externally publishedYes
EventISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA - Nanjing, China
Duration: 2 Nov 20055 Nov 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3759 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA
Country/TerritoryChina
CityNanjing
Period2/11/055/11/05

Fingerprint

Dive into the research topics of 'Attack vulnerability of peer-to-peer networks and cost-effective immunization'. Together they form a unique fingerprint.

Cite this