Notes - MIECT
Redes E Sistemas Autónomos
Notes - MIECT
Redes E Sistemas Autónomos
  • Redes e Sistemas Autónomos
  • Peer-to-Peer Systems and Networks
    • Content Distribution Networks
    • Peer-to-peer networks
      • Types
    • Structured vs Unstructured
    • Fully Decentralized Information System
    • FastTrack/KaZaA
    • OpenNAP/Napster
    • BitTorrent
  • InterPlanetary File System (IPFS)
    • IPFS
      • Bitswap
    • Connecting an IPFS node to the P2P network
    • Searching in DHTs (Structured)
    • File Search
    • Security
  • Ad-Hoc Networks
    • Mobile Ad-hoc networks
    • Application Scenarios
    • Routing
      • AODV - Ad Hoc On-Demand Distance Vector Routing
      • OLSR - Optimized Link State Routing Protocol
      • LAR – Location Aided Routing
      • Batman
    • IP Address Assignment
  • Self-organized systems: Data, learning and decisions
    • Use Cases and Data
    • Machine Learning
      • Supervised Learning
      • Neural Networks
      • Reinforcement Learning
      • Unsupervised Learning: K-means
    • Learning
  • Vehicular Networks
    • Vehicular Ad Hoc Networks
    • How do they work?
    • SPAT: Signal Phase And Timing
    • MAP: MAP
    • Manoeuvre Coordination Message (MCM)
    • Communication Technologies
  • QoS and Security
    • TCP- and UDP-based applications
      • TCP-Cubic
    • QUIC
    • TCP-Vegas
    • Classification of Transport protocols
    • Exploiting Buffering Capabilities
    • QoS in UDP: trade-offs
    • Transmission Quality (Batman v.3)
    • QoS-OLSR
    • Security
      • Key Management
      • RSA (Rivest-Shamir-Adleman) Key
      • Key Management in ad-hoc networks
      • Self-organized public key management (SOPKM)
      • Self-securing ad-hoc wireless networks (SSAWN)
Powered by GitBook
On this page
  • Attacks
  • Poisoning attacks
  • Polluting attacks
  • Freeloaders
  • Insertion of viruses to carried data
  • Malware in the peer-to-peer network software itself
  • Denial of service attacks
  • Filtering
  • Identity attacks
  • Spamming
  • Countermeasures
  • Anonymity
  • Encryption
  1. InterPlanetary File System (IPFS)

Security

Attacks

Poisoning attacks

  • e.g: providing files whose contents are different from the description.

Polluting attacks

  • e.g: inserting "bad" chunks/packets into an otherwise valid file on the network.

Freeloaders

  • e.g: Users or software that make use of the network without contributing resources to it.

Insertion of viruses to carried data

  • e.g: downloaded or carried files may be infected with viruses or other malware.

Malware in the peer-to-peer network software itself

  • e.g: distributed software may contain spyware.

Denial of service attacks

  • Attacks may make the network run very slowly or break completely.

Filtering

  • Network operators may attempt to prevent peer-to-peer network data from being carried.

Identity attacks

  • e.g: tracking down the users of the network and harassing or legally attacking them.

Spamming

  • e.g: sending unsolicited information across the network, not necessarily as a denial of service attack.

Countermeasures

Most attacks can be defeated or controlled by careful design of the peer-to-peer network and through the use of encryption.

  • However, almost any network will fail when the majority of its peers are trying to damage it.

Anonymity

  • Some peer-to-peer protocols (such as Freenet) attempt to hide the identity of network users by passing all traffic through intermediate nodes.

Encryption

  • Some peer-to-peer networks encrypt the traffic flows between peers.

    • Make it harder for an ISP to detect that peer-to-peer technology is being used (as some artificially limit bandwidth).

    • Hide the contents of the file from eavesdroppers.

    • Impede efforts towards law enforcement or censorship of certain kinds of material.

    • Authenticate users and prevent man-in-the-middle attacks on protocols.

    • Aid in maintaining anonymity.

PreviousFile SearchNextMobile Ad-hoc networks

Last updated 2 years ago