Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science 2015
DOI: 10.2991/lemcs-15.2015.260
|View full text |Cite
|
Sign up to set email alerts
|

Model the P2P Attack in Computer Networks

Abstract: Abstract-To analyze the distributed attack actions in computer networks, different models are discussed. Firstly, the Hybrid P2P, Pure P2P and S uper P2P structures of attack are presented. The, the broadcast mechanisms of every structure are introduced. The attack methods mainly focus on the index poisoning and routing table poisoning on the general nodes and access point. By the presented model, high attack flexibility, no single point of failure, high freedom may be achieved. It is difficult to cluster, ide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 2 publications
0
0
0
Order By: Relevance
“…In this regard, it is important for seeds to remain in the system after they have downloaded the file to increase the capacity of the system. P2P networks can be divided into three categories: unstructured P2P, structured P2P, and hybrid P2P networks [3][4][5]. An unstructured P2P network does not tell the exact location of the data, so it looks for the requested data in its network.…”
Section: Introductionmentioning
confidence: 99%
“…In this regard, it is important for seeds to remain in the system after they have downloaded the file to increase the capacity of the system. P2P networks can be divided into three categories: unstructured P2P, structured P2P, and hybrid P2P networks [3][4][5]. An unstructured P2P network does not tell the exact location of the data, so it looks for the requested data in its network.…”
Section: Introductionmentioning
confidence: 99%