Security
Attacks
Poisoning attacks
e.g: providing files whose contents are different from the description.
Polluting attacks
e.g: inserting "bad" chunks/packets into an otherwise valid file on the network.
Freeloaders
e.g: Users or software that make use of the network without contributing resources to it.
Insertion of viruses to carried data
e.g: downloaded or carried files may be infected with viruses or other malware.
Malware in the peer-to-peer network software itself
e.g: distributed software may contain spyware.
Denial of service attacks
Attacks may make the network run very slowly or break completely.
Filtering
Network operators may attempt to prevent peer-to-peer network data from being carried.
Identity attacks
e.g: tracking down the users of the network and harassing or legally attacking them.
Spamming
e.g: sending unsolicited information across the network, not necessarily as a denial of service attack.
Countermeasures
Most attacks can be defeated or controlled by careful design of the peer-to-peer network and through the use of encryption.
However, almost any network will fail when the majority of its peers are trying to damage it.
Anonymity
Some peer-to-peer protocols (such as Freenet) attempt to hide the identity of network users by passing all traffic through intermediate nodes.
Encryption
Some peer-to-peer networks encrypt the traffic flows between peers.
Make it harder for an ISP to detect that peer-to-peer technology is being used (as some artificially limit bandwidth).
Hide the contents of the file from eavesdroppers.
Impede efforts towards law enforcement or censorship of certain kinds of material.
Authenticate users and prevent man-in-the-middle attacks on protocols.
Aid in maintaining anonymity.
Last updated