Vulnerabilities of P2P Systems and a Critical look at Their Solutions

Author: Marling Engle
email:  mengle[_at_]kent.edu, homepage: http://www.cs.kent.edu/~mengle/

Prepared for Prof. Javed I. Khan
Department of Computer Science, Kent State University
Date: April 2006

Abstract: With the advent of Peer-to-Peer (P2P) systems, came effective load balancing, distributed services and applications, as well as logical addressing and routing. However, to fully utilize the potential of this technology, the network must be expanded to include untrusted nodes in a potentially unknown environment (such as the Internet). These untrusted nodes may be faulty, malicious, and act together to commit as much damage to the P2P network as possible. In this survey, I will be discussing the vulnerabilities of these P2P systems, and taking a look at some of their solutions.

Full Text Techical Report [pdf]
Other Survey's on Internetwork-based Applications
Back to Javed I. Khan's Home Page