It is often argued that peer-to-peer systems can offer anonymity for
(i) clients accessing resources
(ii) the hosts providing access to resources.
Discuss each of these propositions. Suggest a way in which the resistance to attacks on anonymity
might be improved.

What will be an ideal response?

The general argument is that although TCP/IP messages contain the IP addresses of the source and destination
nodes, when an application-level multi-hop routing overlay is used, only the previous and next node in the
route can be discovered when packets are intercepted or logged somewhere in the network. A GUID does not
by itself provide any information about the location of the node that hosts it. But if an attacker can gain
knowledge of the contents of some of the routing tables, this property is compromised. Furthermore, an
attacker with eavesdropping access at several points in the network could send ‘probe’ messages to specific
GUIDs and observe the resulting IP traffic. This is likely to reveal quite a lot of information about the location
of the GUID.
So the propositions that clients and resource hosts can remain anonymous is only true for weak attackers
with limited access to the network.
This resistance to attacks might be improved by generating several outgoing messages for each incoming
request at an intermediate node, all but one of the messages would be treated as a ‘dummy’ message and
destroyed at the next node. This would incur a substantial additional cost in network traffic.

Computer Science & Information Technology

You might also like to view...

What's the difference between the Delay and Reverb effects?

What will be an ideal response?

Computer Science & Information Technology

__________ certificates are used in most network security applications including IP security, transport layer security and S/MIME.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology