2009 Fourth International Conference on Internet Monitoring and Protection 2009
DOI: 10.1109/icimp.2009.14
|View full text |Cite
|
Sign up to set email alerts
|

Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…The work [10] introduced an efficient new concept of classifications of the attacks on peer to peer which they proposed that there is a relationship and most of the attack are actually are chain of multiple attacks, this concept analyzed the attacking to improve the methods of security in P2P system. Work [13] proposed a several models to understand the propagation of the malware and its behavior (Mathematical file spreading model, Biological model, SIR model, SEIR Model and Empirical model) and subjected the last one to the experiments aiming build model which cross over the malware propagation in order to develop the trust among the peer and to create a reputation system that Predicts which peer is good and which is infected.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The work [10] introduced an efficient new concept of classifications of the attacks on peer to peer which they proposed that there is a relationship and most of the attack are actually are chain of multiple attacks, this concept analyzed the attacking to improve the methods of security in P2P system. Work [13] proposed a several models to understand the propagation of the malware and its behavior (Mathematical file spreading model, Biological model, SIR model, SEIR Model and Empirical model) and subjected the last one to the experiments aiming build model which cross over the malware propagation in order to develop the trust among the peer and to create a reputation system that Predicts which peer is good and which is infected.…”
Section: Resultsmentioning
confidence: 99%
“…For example the decentralized unstructured P2P system, the client use a flood the query in the network for applying a probe to find how many node having his request, another example when the users in that network share a large file size like videos this may cause some logical links but many physical links, the first examples causes sometimes networks drowning by the query and the second may cause of network heavy traffic and time delay. These two examples give network bandwidth block out and sometimes an accidental DoS, sometimes bandwidth blocking can come through a malware causes a flood of query in the system which caused what is said distributed denial of service (DDoS) [11,13]. This proposed approach can be described clearly by the following flowchart as shown in Figure 4a below.…”
Section: External Threats Avoidancementioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, a number of research efforts have emphasized that P2P networks are subject to various security threats due to their inherent features [6,9,18,21,22]. To overcome the identified security issues in P2P networks, we propose to design a new key exchange scheme that provides end-to-end (E2E) authentication and confidentiality capabilities.…”
Section: Approach Overviewmentioning
confidence: 99%
“…The peers that go offline in the P2P network having less probability of getting infected. In [7] Bit Torrent is considered as an empirical model for malware spreading while the results of infected nodes in the models where dynamic hit list-based malware is considered in Bit Torrent networks and they are shown in [8] and [9]. These models are having a known drawback.…”
Section: IImentioning
confidence: 99%