메뉴 건너뛰기




Volumn 5550 LNCS, Issue , 2009, Pages 104-116

Conducting and optimizing eclipse attacks in the kad peer-to-peer network

Author keywords

Eclipse attack; Kad; P2P security; Sybil attack

Indexed keywords

CLIENT APPLICATIONS; ECLIPSE ATTACK; FILE SHARING; KAD; P2P SECURITY; PEER-TO-PEER NETWORKS; SECURITY MEASURE; STRUCTURED P2P; SYBIL ATTACK; STRUCTURED P2P NETWORKS;

EID: 67650333330     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01399-7_9     Document Type: Conference Paper
Times cited : (23)

References (15)
  • 1
    • 67650314150 scopus 로고    scopus 로고
    • ipoque GmbH: ipoque Internet Study (2007), http://www.ipoque.com/ resources/internet-studies/internet-study-2007/
    • ipoque GmbH: ipoque Internet Study (2007), http://www.ipoque.com/ resources/internet-studies/internet-study-2007/
  • 2
    • 77749315845 scopus 로고    scopus 로고
    • ISP Platforms Under a Heavy Peer-to-Peer Workload
    • Steinmetz, R, Wehrle, K, eds, Peer-to-Peer Systems and Applications, Springer, Heidelberg
    • Haβlinger, G.: ISP Platforms Under a Heavy Peer-to-Peer Workload. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol. 3485, pp. 369-381. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3485 , pp. 369-381
    • Haβlinger, G.1
  • 8
    • 84947235017 scopus 로고    scopus 로고
    • Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, 2429, pp. 53-65. Springer, Heidelberg (2002)
    • Maymounkov, P., Mazières, D.: Kademlia: A Peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53-65. Springer, Heidelberg (2002)
  • 9
    • 67650311302 scopus 로고    scopus 로고
    • eMule website: http://www.emule-project.net/
    • eMule website: http://www.emule-project.net/
  • 10
    • 67650314152 scopus 로고    scopus 로고
    • aMule website: http://www.amule.org/
    • aMule website: http://www.amule.org/
  • 12
    • 50049110213 scopus 로고    scopus 로고
    • Master's thesis, University of Mannheim and Institut Eurécom, Sophia-Antipolis, France
    • Brunner, R.: A performance evaluation of the Kad-protocol. Master's thesis, University of Mannheim and Institut Eurécom, Sophia-Antipolis, France (2006)
    • (2006) A performance evaluation of the Kad-protocol
    • Brunner, R.1
  • 13
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 14
    • 84929878975 scopus 로고    scopus 로고
    • Online, Editorial Zone of [7
    • Computer Communication Review Online, Editorial Zone of [7]: http://ccr.sigcomm.org/online/?q=node/288
    • Computer Communication Review
  • 15
    • 84869353194 scopus 로고    scopus 로고
    • MorphXT website
    • MorphXT website: http://www.emule-mods.de/?mods=morphxt/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.