Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.7.1447

Risk Analysis on Vulnerabilities and Threats for Domestic P2P Service Environments  

Shin, Weon (동명대학교 정보보호학과)
Rhee, Kyung-Hyune (부경대학교 IT융합응용공학과)
Abstract
Recently P2P is the most popular network service on Internet and is applied various areas such as streaming, file sharing and software distribution, but there are many security threats depending on vulnerabilities by P2P network environments. Conceptually P2P network is a overlay network based on Internet, and it has security concerns of itself as well as those of Internet environments. In this paper, we analyze the vulnerabilities and threats for domestic P2P services through various experiments and describe their risk analysis. We expect that this work contributes to new domestic P2P services in consideration of service qualities and security vulnerabilities.
Keywords
P2P; Overlay network; Vulnerability; Threat; Risk analysis;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Sameh El-Ansary and Seif Haridi, "An Overview of Structured P2P Overlay Networks", IEEE Communications Surveys and Tutorials, 2005.
2 Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma and Steven Lim, "A Survey and Comparison of Peer-to-Peer Overlay Network Schemes", IEEE Communications Surveys and Tutorials, 2004
3 Vivek Vishnumurthy and Paul Francis, "A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection", 2007 USENIX Annual Technical Conference, pp.309-322, 2007.
4 박호진, 박광로, "P2P 기술 동향 및 홈네트워크 응용", 전자통신동향분석 제 21권 제 5호, pp.1-10, 2006.   과학기술학회마을
5 Gnutella, http://en.wikipedia.org/wiki/Gnutella/
6 KaZaA, http://en.wikipedia.org/wiki/Kazaa
7 BitTorrent, http://www.bittorrent.com/
8 Kademlia, http://en.wikipedia.org/wiki/Kademlia/
9 eDonkey network, http://en.wikipedia.org/wiki/EDonkey_network/
10 D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, and Z. Xu, "Peer-to-Peer Computing", HP TechReport HPL-2002-57, 2002.
11 권혁찬, 문용혁, 구자범, 고선기, 나재훈, 장종수, "P2P 표준화 및 기술 동향", 전자통신동향분석 제22권 제1호 2007.
12 개인정보보호 종합지원 포털, http://www.privacy.go.kr/
13 KISA 정보보호 및 개인정보보호관리체계 인증, http://isms.kisa.or.kr/
14 이경현, 신원, "P2P 통신구조 및 보안체계 연구", 한국정보보호학회, 2011.