Proceedings of the 9th ACM Conference on Computer and Communications Security 2002
DOI: 10.1145/586110.586136
|View full text |Cite
|
Sign up to set email alerts
|

Query-flood DoS attacks in gnutella

Abstract: We describe a simple but effective traffic model that can be used to understand the effects of denial-of-service (DoS) attacks based on query floods in Gnutella networks. We run simulations based on the model to analyze how different choices of network topology and application level load balancing policies can minimize the effect of these types of DoS attacks. In addition, we also study how damage caused by query floods is distributed throughout the network, and how application-level policies can localize the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(22 citation statements)
references
References 23 publications
(18 reference statements)
0
22
0
Order By: Relevance
“…Many researchers have considered the prevention of IP spoofing and/or packet flooding attacks at the network layer [48,51,35,66,37] as well as request flooding attacks at the application layer [22,41,65]. In addition to flooding-based attacks, some previous work has also considered the exploitation of application-layer semantics for Web servers [62].…”
Section: Background and State Of The Artmentioning
confidence: 99%
See 1 more Smart Citation
“…Many researchers have considered the prevention of IP spoofing and/or packet flooding attacks at the network layer [48,51,35,66,37] as well as request flooding attacks at the application layer [22,41,65]. In addition to flooding-based attacks, some previous work has also considered the exploitation of application-layer semantics for Web servers [62].…”
Section: Background and State Of The Artmentioning
confidence: 99%
“…Daswani and Garcia-Molina examined the effects of different overlay network topologies and load balancing strategies on the prevention of application-layer DoS attacks that flood the Gnutella protocol with queries [22]. Their study was one of the first to focus on denial-of-service attacks in peer-to-peer systems at the application layer.…”
Section: Application-layermentioning
confidence: 99%
“…A malicious peer can initiate an application-layer Denial of Service (DoS) attack using the Notify messages. However, almost every message type in P2P protocol (Query, QueryHit, Push, Ping, and Pong) can be exploited in order to launch denial of service attacks [27][28][29][30]. Some proposals exist in the literature aiming to counter the application-layer DoS attacks [30][31][32].…”
Section: Fake Queryhit Messagesmentioning
confidence: 99%
“…One scheme can be based on the comparison of the number of Notify messages routed by each controlled peer. If a monitoring peer detects a big difference among the number of Notify messages routed by its controlled peers, it can begin to filter (delete/drop) Notify messages coming from that controlled peers (similar to what is proposed in [30]). Since the danger of DoS attack exists for all P2P protocol messages, we think that the precautions taken for other P2P messages can be applied for Notify message as well.…”
Section: Fake Queryhit Messagesmentioning
confidence: 99%
“…However, the use of P2P file-sharing software can raise serious security issues [3,6,13,19], as often sensitive personal information can be at risk due to improper usage by users. At the same time, file-sharing technology is largely user controlled, which is sometimes beneficial but hard to regulate.…”
Section: Introductionmentioning
confidence: 99%