Shared more. Cited more. Safe forever.
    • advanced search
    • submit works
    • about
    • help
    • contact us
    • login
    View Item 
    •   MOspace Home
    • University of Missouri-Columbia
    • Office of Undergraduate Research (MU)
    • Undergraduate Research and Creative Achievements Forum (MU)
    • 2008 Summer Undergraduate Research and Creative Achievements Forum (MU)
    • View Item
    •   MOspace Home
    • University of Missouri-Columbia
    • Office of Undergraduate Research (MU)
    • Undergraduate Research and Creative Achievements Forum (MU)
    • 2008 Summer Undergraduate Research and Creative Achievements Forum (MU)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.
    advanced searchsubmit worksabouthelpcontact us

    Browse

    All of MOspaceCommunities & CollectionsDate IssuedAuthor/ContributorTitleIdentifierThesis DepartmentThesis AdvisorThesis SemesterThis CollectionDate IssuedAuthor/ContributorTitleIdentifierThesis DepartmentThesis AdvisorThesis Semester

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular AuthorsStatistics by Referrer

    Peer-to-peer networking: A security analysis

    Concepcion, Andres
    Zeng, Wenjun, 1967-
    View/Open
    [PDF] PeerToPeerNetworkingSecurity.pdf (17.11Kb)
    Date
    2008
    Contributor
    University of Missouri-Columbia. Office of Undergraduate Research
    Format
    Presentation
    Metadata
    [+] Show full item record
    Abstract
    Peer-to-peer (p2p) networks have developed as an alternative to the typical client-server model of networking which has a single point of entry, a server connected to all of the users on the network, with the server handling all of the work. In a p2p network there is no central server. Instead, all of the users in the system are equal, distributing the resources amongst themselves. When creating a p2p network there are many things that have to be considered in order to minimize the effect that a malicious user can have on the entirety of the network. I will analyze the security issues of p2p networking by first examining the possible attacks on a general p2p network. File sharing is one application of a p2p system and file sharing clients are numerous and vary considerably,I compared 3 popular clients, eMule, LimeWire and BitTorrent. I used these clients as a basis for examining the security issues outlined in this paper. Outlining the security features of these file sharing clients will come in 2 ways; outlining the general structure of the network and examining the way requests for files are handled within the network. Outlining the structure of the network will look into how node Ids are assigned and how nodes and files are stored in the network. Examining the structure of file requests will show how well each of these clients distribute files and search for them. With all the p2p file sharing networks being created and used today, this will hopefully provide a good background on what needs to be considered in order to create a p2p network that is more secure.
    URI
    http://hdl.handle.net/10355/1746
    Part of
    2008 Summer Undergraduate Research and Creative Achievements Forum (MU)
    Collections
    • 2008 Summer Undergraduate Research and Creative Achievements Forum (MU)

    Send Feedback
    hosted by University of Missouri Library Systems
     

     


    Send Feedback
    hosted by University of Missouri Library Systems