Prepared for Prof. Javed I. Khan Department of Computer Science, Kent State University Date: April 2006
Abstract: With the advent of Peer-to-Peer (P2P) systems, came
effective load balancing, distributed services and applications, as
well as logical addressing and routing. However, to fully utilize the
potential of this technology, the network must be expanded to include
untrusted nodes in a potentially unknown environment (such as the
Internet). These untrusted nodes may be faulty, malicious, and act
together to commit as much damage to the P2P network as possible. In
this survey, I will be discussing the vulnerabilities of these P2P
systems, and taking a look at some of their solutions.
Full
Text Techical Report [pdf] Other
Survey's on Internetwork-based Applications Back to Javed I. Khan's Home
Page