Results 11 - 20
of
3,583
The Index Poisoning Attack in P2P File Sharing Systems
- In INFOCOM
, 2006
"... Abstract — P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when a user searches for a targeted title, the inde ..."
Abstract
-
Cited by 51 (0 self)
- Add to MetaCart
Abstract — P2P file-sharing systems have indexes, which users search to find locations of desired titles. In the index poisoning attack, the attacker inserts massive numbers of bogus records into the index for a set of targeted titles. As a result, when a user searches for a targeted title
Analyzing the Dynamics and Resource Usage of P2P File Sharing by a Spatio-temporal Model
"... resource usage of P2P file sharing by a spatiotemporal model. In Proceedings of the ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
resource usage of P2P file sharing by a spatiotemporal model. In Proceedings of the
Monitoring Challenges and Approaches for P2P File-Sharing Systems
"... Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University o ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Since the release of Napster in 1999, P2P file-sharing has enjoyed a dramatic rise in popularity. A 2000 study by Plonka on the University of Wisconsin campus network found that file-sharing accounted for a comparable volume of traffic to HTTP, while a 2002 study by Saroiu et al. on the University
Challenges and directions for monitoring P2P file sharing networks
- In 3rd USENIX Workshop on Hot Topics in Security (HotSec ’08
, 2008
"... Abstract — We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We describe simple techniques for implicating arbitrary network endpoints in illegal content sharing and demonstrate ..."
Abstract
-
Cited by 37 (1 self)
- Add to MetaCart
and demonstrate the effectiveness of these techniques experimentally, attracting real DMCA complaints for nonsense devices, e.g., IP printers and a wireless access point. We then step back and evaluate the challenges and possible future directions for pervasive monitoring in P2P file sharing networks. 1
Efficient parallelized network coding for P2P file sharing applications
- In Proceedings of the 4th International Conference on Advances in Grid and Pervasive Computing, GPC ’09
, 2009
"... Abstract. In this paper, we investigate parallel implementation techniques for network coding to enhance the performance of Peer-to-Peer (P2P) file sharing applications. It is known that network coding mitigates peer/piece selection problems in P2P file sharing systems; however, due to the decoding ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
Abstract. In this paper, we investigate parallel implementation techniques for network coding to enhance the performance of Peer-to-Peer (P2P) file sharing applications. It is known that network coding mitigates peer/piece selection problems in P2P file sharing systems; however, due to the decoding
Incentives for p2p file sharing in mobile ad hoc networks
- In CCNC
"... Abstract-P2P overlay networks are a natural fit for MANETs because both are decentralized and have dynamic topologies. Most nodes in P2P file sharing networks are freeloaders, nodes that do not contribute to the network. In order to have a useful P2P network, it is important that nodes not only sha ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract-P2P overlay networks are a natural fit for MANETs because both are decentralized and have dynamic topologies. Most nodes in P2P file sharing networks are freeloaders, nodes that do not contribute to the network. In order to have a useful P2P network, it is important that nodes not only
AN INTERCONNECTION SYSTEM FOR P2P FILE SHARING NETWORKS
"... Currently there are a lot of public P2P file sharing networks in existence. Some of them have millions of online users. There is a need for a system that allows searching files in every P2P network and downloading from every P2P network. To our knowledge, there is not any interconnection system in e ..."
Abstract
- Add to MetaCart
Currently there are a lot of public P2P file sharing networks in existence. Some of them have millions of online users. There is a need for a system that allows searching files in every P2P network and downloading from every P2P network. To our knowledge, there is not any interconnection system
Robust Super-Peer-Based P2P File-Sharing Systems
, 2009
"... This paper presents an efficient approach for improving file availability in super-peer-based peer-to-peer (P2P) file-sharing systems. In the super-peer-based P2P file-sharing system, peers are organized into multiple groups. In each group, there is a special peer called super-peer to serve the regu ..."
Abstract
- Add to MetaCart
This paper presents an efficient approach for improving file availability in super-peer-based peer-to-peer (P2P) file-sharing systems. In the super-peer-based P2P file-sharing system, peers are organized into multiple groups. In each group, there is a special peer called super-peer to serve
On the Penetration of Business Networks by P2P File Sharing (DRAFT)
"... P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Because of these problems, the majority of businesses attempt to restrict the use of P2P software, but how successf ..."
Abstract
- Add to MetaCart
P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Because of these problems, the majority of businesses attempt to restrict the use of P2P software, but how
Constructing Fair-Exchange P2P File Market
"... Abstract. P2P is a promising technology to construct the underlying supporting layer of a Grid. It is known that contribution from all the peers is vital for the sustainability of a P2P community, but peers are often selfish and unwilling to contribute. In this paper we describe how to construct a f ..."
Abstract
- Add to MetaCart
fair file-exchanging P2P community. We name this community a P2P file market. Our scheme forces peers to contribute by a micropayment-based incentive mechanism. 1
Results 11 - 20
of
3,583