Exploiting the Security Weaknesses of the Gnutella Protocol

作者: Demetrios Zeinalipour-Yazti

DOI:

关键词:

摘要: Peer-to-Peer (P2P) le-sharing systems such as Gnutella, Morpheus and Freenet have recently attracted a lot of interest from the internet community because they realized distributed infrastructure for sharing les. Such shifted Web's Client-Server model paradigm into Client-Client model. The tremendous success has proven that purely search are feasible may change way we interact on Internet. Beside several advantages been uncovered by P2P systems, robustness, scalability high fault tolerance various other questions issues arise in context Security. Many protocols bundled along with an adequate amount security mechanisms but proprietary which makes their analysis dicult. Gnutella Protocol hand is open protocol, doesn't highlight sake its simplicity. Most weaknesses could be avoided if protocol was taking account Peers misbehave. In this paper provide overview Specication, describe show how can turned Distributed Denial Service Attacks, User's Privacy Violation IP Harvesting. We present experimental attacks performed Network. nally evaluate these suggest some cases improvements protocol.

参考文章(4)
R.T. Fielding, G. Kaiser, The Apache HTTP Server Project IEEE Internet Computing. ,vol. 1, pp. 88- 90 ,(1997) , 10.1109/4236.612229
Hector Garcia-Molina, Beverly Yang, Comparing Hybrid Peer-to-Peer Systems very large data bases. pp. 561- 570 ,(2001)
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan, Chord Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '01. ,vol. 31, pp. 149- 160 ,(2001) , 10.1145/383059.383071