Threat Analysis for Peer-to-Peer Overlay Networks
draft-mao-p2psip-threat-analysis-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Yinian Mao , Vidya Narayanan , Ashwin Swaminathan | ||
Last updated | 2009-03-04 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document provides a threat analysis for peer-to-peer networks, where the system relies on each individual peer to route message, store data, and provide services. The threats against P2P network include those that target individual peers, those that target routing protocol, those that target identity management, and those that target stored data. Focusing on distributed hash table based P2P network, we first establish a threat model and perform a triage of various assets in a P2P system. We then describe each individual threat in details, including threat description, impact of attack, and possible mitigations. The threats and mitigations are discussed under the context of feasibility and practicality, with the ultimate goal of achieving better understanding of the threats for secure P2P system design.
Authors
Yinian Mao
Vidya Narayanan
Ashwin Swaminathan
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)