Sybil - A tricky facsimile.

Autor: Garg, Kapil, Agarwal, Ankit, Gaikwad, Mayur, Nanwani, Shruti, Inamdar, Vahid
Zdroj: 2012 IEEE International Conference on Engineering Education: Innovative Practices & Future Trends (AICERA); 1/ 1/2012, p1-3, 3p
Abstrakt: Security and data integrity are the two primary pillars of a first-rate network. Attack is defined as an assault on the safety that derives from an intellectual peril that is an intentional attempt to elude security services and breach the security of the system. Nowadays, the new kind of network that is rising in popularity is the Peer-to-Peer networks. It is a self-sufficient network in which all the peers have equal rights and are equally persuasive in the system. However, the Peer-to-Peer (P2P) systems are highly susceptible to network encroachment. One of the most harmful attacks is known as the Sybil attack. A node falsely claims multiple identities and can control a considerable or an entire P2P system. The paper presents an insight about the Sybil attacks, their various kinds and proposes a number of techniques to shield against them. [ABSTRACT FROM PUBLISHER]
Databáze: Complementary Index