Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

You searched for id:"oai:tuprints.ulb.tu-darmstadt.de:7812". One record found.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Technische Universität Darmstadt

1. Ismail, Hatem. Analyzing and Mitigating Security Threats in P2P Systems.

Degree: PhD, Dependable Embedded Systems & Software, 2018, Technische Universität Darmstadt

Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (e.g., file sharing, streaming multimedia, storage, VoIP) especially as the decentralized P2P paradigm inherently fosters scalability and robustness. The growing application-oriented services also result in the evolu- tion of P2P systems spanning diverse data dissemination techniques, peer roles and topological structures. On the flip side, while decentralization and scalability are attractive, and common for all P2P systems, these design features also increase the P2P network’s exposure to a variety of security threats that can result in the degradation of services. In this thesis, we illustrate a set of important P2P attack types and subsequently develop approaches to secure P2P networks from these progressive and evolving attacks. Covering a comprehensive progression of P2P systems of increasing complexity (i.e., structured, unstructured and streaming), we evaluate the corresponding feasibility of conducting attacks and the resultant impact onto them. Subsequently, we investigate the progressive steps of detection, mitigation and sanitization potential to restore the requisite P2P functionality. Depending on the targeted P2P network model, we propose countermeasures that (a) are effective against a specific attack type and its possible variants, (b) are light-weight in execution, (c) are fully decentralized, i.e., do not depend on central entities, and (d) allow for both reactive and proactive mitigation. Our theoretical analysis and simulations demonstrate that our proposed attack detection/mitigation mechanisms can reach up to 90-100% detection accu- racy while inducing low overhead of 5-10% even when operating under severe attack scenarios. Advisors/Committee Members: Suri, Neeraj (advisor), Khelil, Abdelmajid (advisor).

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ismail, H. (2018). Analyzing and Mitigating Security Threats in P2P Systems. (Doctoral Dissertation). Technische Universität Darmstadt. Retrieved from http://tuprints.ulb.tu-darmstadt.de/7812/

Chicago Manual of Style (16th Edition):

Ismail, Hatem. “Analyzing and Mitigating Security Threats in P2P Systems.” 2018. Doctoral Dissertation, Technische Universität Darmstadt. Accessed November 20, 2018. http://tuprints.ulb.tu-darmstadt.de/7812/.

MLA Handbook (7th Edition):

Ismail, Hatem. “Analyzing and Mitigating Security Threats in P2P Systems.” 2018. Web. 20 Nov 2018.

Vancouver:

Ismail H. Analyzing and Mitigating Security Threats in P2P Systems. [Internet] [Doctoral dissertation]. Technische Universität Darmstadt; 2018. [cited 2018 Nov 20]. Available from: http://tuprints.ulb.tu-darmstadt.de/7812/.

Council of Science Editors:

Ismail H. Analyzing and Mitigating Security Threats in P2P Systems. [Doctoral Dissertation]. Technische Universität Darmstadt; 2018. Available from: http://tuprints.ulb.tu-darmstadt.de/7812/

.