2004
DOI: 10.1016/j.comnet.2004.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Security applications of peer-to-peer networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0
2

Year Published

2004
2004
2022
2022

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 17 publications
0
17
0
2
Order By: Relevance
“…NetBiotic. NetBiotic [Vlachos et al 2004] is a distributed CIDS that is based on the JXTA P2P framework [Gong 2001]. The focus of NetBiotic is not on detecting specific attacks, but rather on the fast creation of a network of interested peers for alert information exchange.…”
Section: Unstructured Cidssmentioning
confidence: 99%
“…NetBiotic. NetBiotic [Vlachos et al 2004] is a distributed CIDS that is based on the JXTA P2P framework [Gong 2001]. The focus of NetBiotic is not on detecting specific attacks, but rather on the fast creation of a network of interested peers for alert information exchange.…”
Section: Unstructured Cidssmentioning
confidence: 99%
“…(However, despite a large churn rate, these studies also show that the total number of peers in the network is relatively stable.) P2P algorithms have been proposed for a wide variety of tasks such as data storage and retrieval [45,19,18,14,26], collaborative filtering [11], spam detection [15], data mining [17], worm detection and suppression [38,59], privacy protection of archived data [23], and recently, for cloud computing services as well [57,8]. However, all algorithms proposed for these problems have no theoretical guarantees of being able to work in a dynamically changing network with a very high churn rate, which can be as much as linear (in the network size) per round.…”
Section: Introductionmentioning
confidence: 99%
“…A number of different applications based on peer-topeer infrastructures have emerged for supporting a variety of Internet services. Examples of such applications include peer-to-peer multicast systems [VanRenesse et al 2003;, Internet indirection infrastructures , and security applications, providing protection against denial of service or virus attacks [Keromytis et al 2002;Janakiraman et al 2003;Vlachos et al 2004].…”
Section: Classification Of Peer-to-peer Applicationsmentioning
confidence: 99%