WASET
	%0 Journal Article
	%A Guruprasad Khataniar and  Hitesh Tahbildar and  Prakriti Prava Das
	%D 2013
	%J International Journal of Computer and Information Engineering
	%B World Academy of Science, Engineering and Technology
	%I Open Science Index 75, 2013
	%T Attacks and Counter Measures in BST Overlay Structure of Peer-To-Peer System
	%U https://publications.waset.org/pdf/13541
	%V 75
	%X There are various overlay structures that provide
efficient and scalable solutions for point and range query in a peer-topeer
network. Overlay structure based on m-Binary Search Tree
(BST) is one such popular technique. It deals with the division of the
tree into different key intervals and then assigning the key intervals to
a BST. The popularity of the BST makes this overlay structure
vulnerable to different kinds of attacks. Here we present four such
possible attacks namely index poisoning attack, eclipse attack,
pollution attack and syn flooding attack. The functionality of BST is
affected by these attacks. We also provide different security
techniques that can be applied against these attacks.
	%P 337 - 340