Investigation of Effects of Spoofing Attacks in P2P Online Social Networks

被引:0
|
作者
de Asis Lopez-Fuentes, Francisco [1 ]
Balleza-Gallegos, Salvador [1 ]
机构
[1] Univ Autonoma Metropolitana Cuajimalpa, Dept Informat Technol, Mexico City, DF, Mexico
关键词
peer-to-peer networks; spoofing attack; online-social networks;
D O I
10.1109/WAINA.2016.124
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Online social networks (OSN) have become very popular during the last years. Every day millions of people generate and consume a huge amount information via these type of networks, which are useful to find former classmate or to improve our interaction with friends. Most popular online social networks are based on centralized servers, which are responsible for the management and storage all information. Although online social networks introduce several benefits, these networks still face many challenges such as central control, privacy or security. P2P infrastructures have emerged as an alternative platform to deploy decentralized online social networks. However, decentralized distributed systems are vulnerable to security attacks from malicious peers. In this work, we evaluate P2P infrastructures against spoofing attack. In particular, we simulate and evaluate hybrid and distributed P2P architectures.
引用
收藏
页码:199 / 203
页数:5
相关论文
共 50 条
  • [1] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks
    de Asis Lopez-Fuentes, Francisco
    Balleza-Gallegos, Salvador
    [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
  • [2] The Impact of Routing Attacks on Pastry-Based P2P Online Social Networks
    Eichert, Felix A.
    Monhof, Markus
    Graffi, Kalman
    [J]. EURO-PAR 2014: PARALLEL PROCESSING WORKSHOPS, PT I, 2014, 8805 : 347 - 358
  • [3] Availability in P2P based Online Social Networks
    Shahriar, Nashid
    Chowdhury, Shihabur Rahman
    Ahmed, Reaz
    Sharmin, Mahfuza
    Boutaba, Raouf
    Mathieu, Bertrand
    [J]. PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 29 - 37
  • [4] Collaborative Privacy Management in P2P Online Social Networks
    Zahak, Matin
    Alizadeh, Mahdi
    Abbaspour, Maghsoud
    [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 64 - 72
  • [5] ID mapping attacks in P2P networks
    Cerri, D
    Ghioni, A
    Paraboschi, S
    Tiraboschi, S
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
  • [6] Limiting sybil attacks in structured P2P networks
    Rowaihy, Hosam
    Enck, William
    McDaniel, Patrick
    La Porta, Thomas
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 2596 - +
  • [7] Evaluating P2P Networks against Eclipse Attacks
    de Asis Lopez-Fuentes, Francisco
    Eugui-De-Alba, Inaki
    Ortiz-Ruiz, Otoniel M.
    [J]. 2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 61 - 68
  • [8] SPROUT: P2P routing with social networks
    Marti, S
    Ganesan, P
    Garcia-Molina, H
    [J]. CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2004 WORKSHOPS, PROCEEDINGS, 2004, 3268 : 425 - 435
  • [9] Pollution Attacks Identification in Structured P2P Overlay Networks
    Trifa, Zied
    Hajlaoui, Jalel Eddine
    Khemakhem, Maher
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
  • [10] Ensuring β-Availability in P2P Social Networks
    Shahriar, Nashid
    Chowdhury, Shihabur Rahman
    Sharmin, Mahfuza
    Ahmed, Reaz
    Boutaba, Raouf
    Mathieu, Bertrand
    [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 150 - 155