Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization

  • Xinli Huang
  • Fanyuan Ma
  • Yin Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3759)


Currently, great efforts on network security are being made to concern software protection and prevention of loopholes, rather than the network topology. In this paper, we present a detailed and in-depth study on the response of peer-to-peer (P2P) networks subject to attacks, and investigate how to improve their attack survivability with a viewpoint of topological properties. We first, by extensive simulations, examine the attack vulnerability of P2P networks and find that these networks are extremely robust to random attacks whereas highly vulnerable under intentional targeted attacks. Based on these findings, we then develop a novel framework better characterizing the immunization of Gnutella-like P2P networks by taking into account the cost of curing infected peers. Finally, we propose a unique defense policy against intentional attacks and verify its performance merits via comprehensive experiments.


Connected Node Computer Virus Infected Node Attack Strategy Epidemic Threshold 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Paster-Satorras, R., Vespignani, A.: Epidemics spreading in scale-free networks. Phys. Rev. Lett. 86, 3200–3203 (2001)CrossRefGoogle Scholar
  2. 2.
    Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)CrossRefGoogle Scholar
  3. 3.
    Holme, P., Kim, B.J., Yoon, C.N., Han, S.K.: Attack vulnerability of complex networks. Phys. Rev. E 65, 56109 (2002)CrossRefGoogle Scholar
  4. 4.
    Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the Internet topology. Comput. Commun. Rev. 29, 251 (1999)CrossRefGoogle Scholar
  5. 5.
    Adamic, L.A., Huberman, B.A.: Power-law distribution of the world wide web. Science 287, 2115 (2000)CrossRefGoogle Scholar
  6. 6.
    Barabási, A.-L., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Albert, R., Jeong, H., Barabási, A.-L.: The Diameter of World Wide Web. Nature 401, 130–131 (1999)CrossRefGoogle Scholar
  8. 8.
    Dezsö, Z., Barabási, A.-L.: Halting viruses in scale-free networks. Phys. Rev. E 65, 055103(R) (2002)Google Scholar
  9. 9.
    Chen, H., Jin, H., Sun, J.H., Han, Z.F.: Efficient immunization algorithm for peer-to-peer networks. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 623–626. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Mihajlo, A., Jovanovic, F.S.: Annexstein and Kenneth A. Berman, Modeling peer-to-peer network topologies through small-world models and power laws. IX Telecommunications Forum (2001)Google Scholar
  11. 11.
    Saroiu, S., Gummadi, K.P., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Multimedia Computing and Networking, MMCN (Janaury 2002)Google Scholar
  12. 12.
    Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xinli Huang
    • 1
  • Fanyuan Ma
    • 1
  • Yin Li
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiP.R.China

Personalised recommendations