It is often argued that peer-to-peer systems can offer anonymity for
(i) clients accessing resources
(ii) the hosts providing access to resources.
Discuss each of these propositions. Suggest a way in which the resistance to attacks on anonymity
might be improved.
What will be an ideal response?
The general argument is that although TCP/IP messages contain the IP addresses of the source and destination
nodes, when an application-level multi-hop routing overlay is used, only the previous and next node in the
route can be discovered when packets are intercepted or logged somewhere in the network. A GUID does not
by itself provide any information about the location of the node that hosts it. But if an attacker can gain
knowledge of the contents of some of the routing tables, this property is compromised. Furthermore, an
attacker with eavesdropping access at several points in the network could send ‘probe’ messages to specific
GUIDs and observe the resulting IP traffic. This is likely to reveal quite a lot of information about the location
of the GUID.
So the propositions that clients and resource hosts can remain anonymous is only true for weak attackers
with limited access to the network.
This resistance to attacks might be improved by generating several outgoing messages for each incoming
request at an intermediate node, all but one of the messages would be treated as a ‘dummy’ message and
destroyed at the next node. This would incur a substantial additional cost in network traffic.
You might also like to view...
Method_______ returns a string representing the data received and the address of the socket sending the data.
a) recv. b) receive. c) recvfrom. d) None of the above.
Use a multilevel list if you wish to visually represent numerical data
Indicate whether the statement is true or false
Case-Based Critical Thinking QuestionsCase 11-1Luca is the database administrator for a city parks and recreation department. The department routinely uses community college interns to process applications and registration for the department's programs. It is important that the user interface minimize user input errors as much as possible. Luca needs to use a VBA function in his code to return a value of True if the Paid field has no data or a value of False if the Paid field is not empty. Which VBA function should Luca use?
A. IsPaid B. IsNum C. IsNull D. IsBound
What are POST code beeps and how should you respond to them?
What will be an ideal response?