Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science

Model the P2P Attack in Computer Networks

Authors
Wei Wang, Wenhong Zhao
Corresponding Author
Wei Wang
Available Online July 2015.
DOI
10.2991/lemcs-15.2015.260How to use a DOI?
Keywords
P2P attack; Attack model; Network throughput; Network security; Attack structure
Abstract

To analyze the distributed attack actions in computer networks, different models are discussed. Firstly, the Hybrid P2P, Pure P2P and Super P2P structures of attack are presented. The, the broadcast mechanisms of every structure are introduced. The attack methods mainly focus on the index poisoning and routing table poisoning on the general nodes and access point. By the presented model, high attack flexibility, no single point of failure, high freedom may be achieved. It is difficult to cluster, identify the attack traffic and trace the attacker. So, security researchers of computer networks should catch the attention of P2P attacks.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
Series
Advances in Intelligent Systems Research
Publication Date
July 2015
ISBN
10.2991/lemcs-15.2015.260
ISSN
1951-6851
DOI
10.2991/lemcs-15.2015.260How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Wei Wang
AU  - Wenhong Zhao
PY  - 2015/07
DA  - 2015/07
TI  - Model the P2P Attack in Computer Networks
BT  - Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science
PB  - Atlantis Press
SP  - 1303
EP  - 1307
SN  - 1951-6851
UR  - https://doi.org/10.2991/lemcs-15.2015.260
DO  - 10.2991/lemcs-15.2015.260
ID  - Wang2015/07
ER  -