Title
Detection and Defense of Identity Attacks in P2P Network
Abstract
Opening property of P2P network allows nodes to freely join P2P network and to create identity at no cost. Utilizing the loopholes, malicious nodes can create a number of identities in a short time, which will exhaust the identifiers resources and damage the operation of P2P network. The paper proposes a conundrum verification scheme which enables the node to join P2P network and creates identity more difficult. Moreover, it also puts forward a detection and elimination scheme, which can help P2P network to detect identity attackers promptly and eliminate them. Simulation experiments demonstrate that with the combination of the two schemes, P2P network can prevent identity attack effectively.
Year
DOI
Venue
2009
10.1007/978-3-642-04843-2_53
ISICA
Keywords
Field
DocType
short time,elimination scheme,p2p network,simulation experiment,identity attacker,conundrum verification scheme,identifiers resource,malicious node,identity attacks,identity attack,intrusion detection,network security,p2p
Identifier,Computer security,Computer science,Network security,Intrusion detection system
Conference
Volume
ISSN
Citations 
5821
0302-9743
3
PageRank 
References 
Authors
0.40
6
1
Name
Order
Citations
PageRank
Chuiwei Lu1123.03