Skip to main content

Threat Analysis for Peer-to-Peer Overlay Networks
draft-mao-p2psip-threat-analysis-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Yinian Mao , Vidya Narayanan , Ashwin Swaminathan
Last updated 2009-03-04
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document provides a threat analysis for peer-to-peer networks, where the system relies on each individual peer to route message, store data, and provide services. The threats against P2P network include those that target individual peers, those that target routing protocol, those that target identity management, and those that target stored data. Focusing on distributed hash table based P2P network, we first establish a threat model and perform a triage of various assets in a P2P system. We then describe each individual threat in details, including threat description, impact of attack, and possible mitigations. The threats and mitigations are discussed under the context of feasibility and practicality, with the ultimate goal of achieving better understanding of the threats for secure P2P system design.

Authors

Yinian Mao
Vidya Narayanan
Ashwin Swaminathan

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)