Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization

Currently, great efforts on network security are being made to concern software protection and prevention of loopholes, rather than the network topology. In this paper, we present a detailed and in-depth study on the response of peer-to-peer (P2P) networks subject to attacks, and investigate how to improve their attack survivability with a viewpoint of topological properties. We first, by extensive simulations, examine the attack vulnerability of P2P networks and find that these networks are extremely robust to random attacks whereas highly vulnerable under intentional targeted attacks. Based on these findings, we then develop a novel framework better characterizing the immunization of Gnutella-like P2P networks by taking into account the cost of curing infected peers. Finally, we propose a unique defense policy against intentional attacks and verify its performance merits via comprehensive experiments.

[1]  Lada A. Adamic,et al.  Power-Law Distribution of the World Wide Web , 2000, Science.

[2]  Beom Jun Kim,et al.  Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[4]  A. Barabasi,et al.  Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[6]  Hai Jin,et al.  Efficient Immunization Algorithm for Peer-to-Peer Networks , 2004, International Conference on Computational Science.

[7]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[8]  Albert-László Barabási,et al.  Internet: Diameter of the World-Wide Web , 1999, Nature.

[9]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[10]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[11]  Michalis Faloutsos,et al.  On power-law relationships of the Internet topology , 1999, SIGCOMM '99.

[12]  Stephen Gilmore,et al.  Evaluating the Performance of Skeleton-Based High Level Parallel Programs , 2004, International Conference on Computational Science.