-
3
-
-
38549154599
-
Insights into pplive: A measurement study of a large-scale p2p iptv system
-
May
-
X. Hei, C. Liang, J. Liang, Y. Liu, and K. Ross, ""Insights into pplive: A measurement study of a large-scale p2p iptv system"," in Proc. Workshop on Internet Protocol TV (IPTV) services over World Wide Web in conjunction with WWW2006, May 2006.
-
(2006)
Proc. Workshop on Internet Protocol TV (IPTV) services over World Wide Web in conjunction with WWW2006
-
-
Hei, X.1
Liang, C.2
Liang, J.3
Liu, Y.4
Ross, K.5
-
4
-
-
33847636533
-
The impact and implications of the growth in residential user-to-user traffic
-
K. Cho, K. Fukuda, and H. Esaki, ""The impact and implications of the growth in residential user-to-user traffic"," in Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Cho, K.1
Fukuda, K.2
Esaki, H.3
-
7
-
-
2442603590
-
Security for structured peer-to-peer overlay networks
-
December
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D.S.Wallach, "Security for structured peer-to-peer overlay networks," in Proceedings of OSDI2002, December 2002.
-
(2002)
Proceedings of OSDI2002
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
8
-
-
34547492967
-
-
A. Singh, T.-W. Ngan, D. P, and D. Wallach, Eclipse Attacks on Overlays: Threats and Defenses, in Proceedings of INFOCOM 2006, April 2006.
-
A. Singh, T.-W. Ngan, D. P, and D. Wallach, "Eclipse Attacks on Overlays: Threats and Defenses," in Proceedings of INFOCOM 2006, April 2006.
-
-
-
-
10
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks. Computer Communication Review 31(3), July 2001."
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
12
-
-
47249161637
-
-
EMule, http://www.emule-project.net.
-
EMule
-
-
-
13
-
-
79955828770
-
Early Experience with an Internet Broadcast System Based on Overlay Multicast
-
June
-
Y. Chu, A. Ganjam, T. S. E. Ng, S. G. Rao, K. Sripanidkulchai, J. Zhan, and H. Zhang, "Early Experience with an Internet Broadcast System Based on Overlay Multicast," in Proceedings of USENIX, June 2004.
-
(2004)
Proceedings of USENIX
-
-
Chu, Y.1
Ganjam, A.2
Ng, T.S.E.3
Rao, S.G.4
Sripanidkulchai, K.5
Zhan, J.6
Zhang, H.7
-
15
-
-
84871950357
-
-
BitTorrent, http://www.bittorrent.org.
-
BitTorrent
-
-
-
16
-
-
21644459146
-
DONet/CoolStreaming: A Data-driven Overlay Network for Live Media Streaming
-
X. Zhang, J. Liu, B. Li, and T.-S. P. Yum, "DONet/CoolStreaming: A Data-driven Overlay Network for Live Media Streaming," in Proceedings of IEEE INFOCOM, 2005.
-
(2005)
Proceedings of IEEE INFOCOM
-
-
Zhang, X.1
Liu, J.2
Li, B.3
Yum, T.-S.P.4
-
19
-
-
0037453341
-
-
D. Malkhi, Y. Mansour, and M. Reiter, Diffusing without false rumors: On propagating updates in a byzantine environment, Theoretical Computer Science, 299, no. (1-3), pp. 289-306, 2003.
-
D. Malkhi, Y. Mansour, and M. Reiter, "Diffusing without false rumors: On propagating updates in a byzantine environment," Theoretical Computer Science, vol. 299, no. (1-3), pp. 289-306, 2003.
-
-
-
-
20
-
-
0037303962
-
Tolerating malicious gossip
-
February
-
Y. Minsky and F. Schneider, "Tolerating malicious gossip," Distributed Computing, vol. 16, no. 1, pp. 49-68, February 2003.
-
(2003)
Distributed Computing
, vol.16
, Issue.1
, pp. 49-68
-
-
Minsky, Y.1
Schneider, F.2
-
21
-
-
47249154859
-
Preventing DDoS Attacks with P2P Systems through Robust Membership Management,
-
Tech. Rep
-
X. Sun, R. Torres, and S. Rao, "Preventing DDoS Attacks with P2P Systems through Robust Membership Management," Tech. Rep., 2007.
-
(2007)
-
-
Sun, X.1
Torres, R.2
Rao, S.3
-
24
-
-
47249089157
-
DDoS Vulnerability Analysis of BitTorrent Protocol,
-
Tech. Rep
-
K. C. Sia, "DDoS Vulnerability Analysis of BitTorrent Protocol," Tech. Rep., 2007.
-
(2007)
-
-
Sia, K.C.1
-
25
-
-
47249098419
-
-
Prolexic, http://prolexic.com/news/20070514-alert.php.
-
Prolexic
-
-
-
26
-
-
34547381072
-
Puppetnets: Misusing web browsers as a distributed attack infrastructure
-
V. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis, ""Puppetnets: Misusing web browsers as a distributed attack infrastructure"," in "Proc. of ACM Computer and Communication Security", 2006.
-
(2006)
Proc. of ACM Computer and Communication Security
-
-
Lam, V.1
Antonatos, S.2
Akritidis, P.3
Anagnostakis, K.G.4
-
27
-
-
47249120456
-
-
DNS amplification attacks
-
"DNS amplification attacks," http://www.isotf.org/news/DNS- Amplification-Attacks.pdf.
-
-
-
|