node

This paper considers a threat scenario of unauthorized eavesdropping in a peer-to-peer network, where routes between the initiator node and the recipient node pass through two intermediate nodes. It is shown how the compromise of one or several nodes affects the share of routes that can be intercepted by an attacker and how this relates to the total number of possible routes. Formulas are obtained for calculating the number of intercepted connections, and probabilities of successful interception and unsuccessful connection are determined, reflecting the system’s vulnerability.

Categories:
12 Views