Abstract: The survey and classification of the different security attacks in structured peer-to-peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this research, we attempt to provide taxonomy of structured P2P overlay networks security attacks. Which ensures the existing network are still a way from the security and their safe working. We have specially focused on the way these attacks can arise at each level of the network. Moreover, We observed that most of the existing systems such as Content Addressable Network (CAN), Chord , Pastry, Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability which lead to disrupt and corrupt their functioning. The idea of this survey was conceived when we were considering how to secure structured P2P overlay networks from security attacks without a central coordination. We are convinced that knowing how systems have failed can help us to build systems that resist to failure. This paper provides an overview of different categories of hierarchical P2P systems and took a major security attacks threatening the function of structured P2P overlay networks. We classified these attacks into two main groups: general network attacks and specific structured P2P network attacks. Both networks are secured but General network are less secured as compared to Specified structured network because of their decentralized nature. For this various Security goals are discussed which provide services how to secure the network at different level. At each level attack is detected and solved at same time by this the data can be secured and safely used. This paper provides a way to handle that problem before it harms to the network. By this the data is made secured from the hacking. I hope that this survey constitutes a good help for security of the network and who’s want to work on this area of research. In light of this study we can affirm that existing structure P2P can be safely utilized and secured from attack.
Keywords: P2P, Structured P2P overlay network, security, CAN, classification.
Title: Sybil Attack
Author: Neelam Yadav, Heena Mehta
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals