Abstract | ||
---|---|---|
Opening property of P2P network allows nodes to freely join P2P network and to create identity at no cost. Utilizing the loopholes, malicious nodes can create a number of identities in a short time, which will exhaust the identifiers resources and damage the operation of P2P network. The paper proposes a conundrum verification scheme which enables the node to join P2P network and creates identity more difficult. Moreover, it also puts forward a detection and elimination scheme, which can help P2P network to detect identity attackers promptly and eliminate them. Simulation experiments demonstrate that with the combination of the two schemes, P2P network can prevent identity attack effectively. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-04843-2_53 | ISICA |
Keywords | Field | DocType |
short time,elimination scheme,p2p network,simulation experiment,identity attacker,conundrum verification scheme,identifiers resource,malicious node,identity attacks,identity attack,intrusion detection,network security,p2p | Identifier,Computer security,Computer science,Network security,Intrusion detection system | Conference |
Volume | ISSN | Citations |
5821 | 0302-9743 | 3 |
PageRank | References | Authors |
0.40 | 6 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chuiwei Lu | 1 | 12 | 3.03 |