WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/8170,
	  title     = {Taxonomy of Structured P2P Overlay Networks Security Attacks},
	  author    = {Zied Trifa and  Maher Khemakhem},
	  country	= {},
	  institution	= {},
	  abstract     = {The survey and classification of the different security
attacks in structured peer-to-peer (P2P) overlay networks can be
useful to computer system designers, programmers, administrators,
and users. In this paper, we attempt to provide a taxonomy of
structured P2P overlay networks security attacks. We have specially
focused on the way these attacks can arise at each level of the
network. Moreover, we observed that most of the existing systems
such as Content Addressable Network (CAN), Chord, Pastry,
Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability
which lead to disrupt and corrupt their functioning. We hope that our
survey constitutes a good help for who-s working on this area of
research.},
	    journal   = {International Journal of Computer and Information Engineering},
	  volume    = {6},
	  number    = {4},
	  year      = {2012},
	  pages     = {470 - 476},
	  ee        = {https://publications.waset.org/pdf/8170},
	  url   	= {https://publications.waset.org/vol/64},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 64, 2012},
	}