2023
DOI: 10.3390/app13074625
|View full text |Cite
|
Sign up to set email alerts
|

Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions

Abstract: Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, this communication model also has a clear disadvantage: it has a multitude of vulnerabilities and security threats. The nature of the P2P philosophy itself means that there is no centralized server responsible for uploading, storing, and verifying the authenticity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 49 publications
0
2
0
Order By: Relevance
“…Many of these behaviors echo the characteristics found in the KDD-99 dataset, indicating that foundational threat vectors remain deeply embedded in contemporary attack patterns. Furthermore, the mechanisms employed by computer worms are still pivotal in elucidating the propagation dynamics of infections in current computational models [43][44][45][46].…”
Section: Attack Datasetmentioning
confidence: 99%
“…Many of these behaviors echo the characteristics found in the KDD-99 dataset, indicating that foundational threat vectors remain deeply embedded in contemporary attack patterns. Furthermore, the mechanisms employed by computer worms are still pivotal in elucidating the propagation dynamics of infections in current computational models [43][44][45][46].…”
Section: Attack Datasetmentioning
confidence: 99%
“…Using a testbed comprised of Mininet-Wi-Fi and a Ryu Controller, Wi-Fi over SDN and its functionality and scalability were investigated. [23] introduces a mathematical model for P2P networks to study the effect of two different attacks on these systems. In [24], an algorithm that improves compression efficiency by combining CAS map and MAC to remove header bits of CAS map-based compression algorithms is proposed.…”
Section: The Present Issuementioning
confidence: 99%