Ask the Expert

P2P availability, confidentiality and authentication vulnerabilities

What are the main vulnerabilities of P2P technology in terms of availability, confidentiality and authentication?

    Requires Free Membership to View

Compared to a traditional network set up using client-server technology, peer-to-peer, or P2P technology is like a network free-for-all. Individual clients can connect directly to each other rather than through a computer designated as a central server. That central server in a standard network can act as the watchdog, guarding the gates of the network by authenticating users and blocking unwanted or malicious traffic. This isn't the case with P2P set ups.

P2P has more uses than just sharing files such as music, videos and games, as is commonly thought. It can also include Instant Messaging (IM) and grid computing architectures. In either case, the two biggest issues, to start, are confidentiality and authentication.

A Web of authentication needs to be set up so only trusted clients can communicate with each other. First, since multiple clients can access each other, without a central authentication server, the system has to have a way for two clients to authentication each other when communicating. This can be done through certificates or key exchanges, for example.

Confidentiality is best protected by encrypting the traffic between the peers once they authenticate each other. Again, key exchanges and agreed upon encryption protocols for the system can be used for this purpose, similar to the way SSL works.

Since P2P networks contain a mix of clients, not always designed for heavy traffic like a dedicated server, they can also suffer from availability issues. Some P2P networks can't handle the loads of their stronger client-server cousins.

Finally, P2P networks can be a den of malware and spread viruses among their clients. They should be carefully monitored for unwanted traffic from outside the network and usage policies should be in place restricting the types of files they can transfer and to which networks they can connect.


More information
  • Learn methods for securing Web-based applications.
  • Discover how to block IM applications in the enterprise.

  • This was first published in November 2005

    There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: