메뉴 건너뛰기




Volumn 31, Issue 9, 2013, Pages 247-256

THUP: A P2P network robust to churn and DoS attack based on bimodal degree distribution

Author keywords

Bimodal degree distribution; churn and DoS tolerance; hierarchical unstructured P2P networks; neighbor selection

Indexed keywords

BIMODAL DEGREE DISTRIBUTION; COMMUNICATION EFFICIENCY; DENIAL OF SERVICE ATTACKS; FILE-SHARING SYSTEM; NEIGHBOR SELECTION; OPTIMAL NETWORK TOPOLOGY; UNSTRUCTURED P2P NETWORK; UNSTRUCTURED PEER-TO-PEER;

EID: 84883444015     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2013.SUP.0513022     Document Type: Article
Times cited : (17)

References (36)
  • 1
    • 1442284120 scopus 로고    scopus 로고
    • Measuring and analyzing the characteristics of napster and gnutella hosts
    • Aug
    • S. Saroiu, K. P. Gummadi, and S. D. Gribble, "Measuring and analyzing the characteristics of napster and gnutella hosts," Multimedia Syst., vol. 9, no. 2, pp. 170-184, Aug. 2003.
    • (2003) Multimedia Syst. , vol.9 , Issue.2 , pp. 170-184
    • Saroiu, S.1    Gummadi, K.P.2    Gribble, S.D.3
  • 3
    • 77955703762 scopus 로고    scopus 로고
    • Robust super-peer-based P2P file-sharing systems
    • Sep
    • J. Lin and M. Yang, "Robust super-peer-based P2P file-sharing systems," Computer J., vol. 53, no. 7, pp. 951-968, Sep. 2010.
    • (2010) Computer J. , vol.53 , Issue.7 , pp. 951-968
    • Lin, J.1    Yang, M.2
  • 5
    • 0036187056 scopus 로고    scopus 로고
    • Mapping the Gnutella network
    • DOI 10.1109/4236.978369
    • M. Ripeanu, A. Iamnitchi, and I. Foster, "Mapping the gnutella network," IEEE Internet Comput., vol. 6, no. 1, pp. 50-57, Jan.-Feb. 2002. (Pubitemid 34198227)
    • (2002) IEEE Internet Computing , vol.6 , Issue.1 , pp. 50-57
    • Ripeanu, M.1    Iamnitchi, A.2    Foster, I.3
  • 7
    • 34547342602 scopus 로고    scopus 로고
    • Characterizing files in the modern Gnutella network
    • DOI 10.1007/s00530-007-0079-8
    • D. Stutzbach, S. Zhao, and R. Rejaie, "Characterizing files in the modern gnutella network," Multimedia Syst., vol. 13, no. 1, pp. 35-50, Mar. 2007. (Pubitemid 47150830)
    • (2007) Multimedia Systems , vol.13 , Issue.1 , pp. 35-50
    • Stutzbach, D.1    Zhao, S.2    Rejaie, R.3
  • 8
    • 42649124325 scopus 로고    scopus 로고
    • Characterizing unstructured overlay topologies in modern P2P file-sharing systems
    • DOI 10.1109/TNET.2007.900406
    • D. Stutzbach, R. Rejaie, and S. Sen, "Characterizing unstructured overlay topologies in modern P2P file-sharing systems," IEEE/ACM Trans. Netw., vol. 16, no. 2, pp. 267-280, Apr. 2008. (Pubitemid 351596032)
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.2 , pp. 267-280
    • Stutzbach, D.1    Rejaie, R.2    Sen, S.3
  • 9
    • 34548021406 scopus 로고    scopus 로고
    • A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
    • DOI 10.1016/j.comcom.2007.04.012, PII S014036640700165X
    • Y. Jiang, C. Lin, M. Shi, X. S. Shen, and X. Chu, "A DOS and faulttolerant authentication protocol for group communications in ad hoc networks," Computer Commun., vol. 30, no. 11-12, pp. 2428-2441, Sep. 2007. (Pubitemid 47285282)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2428-2441
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.S.4    Chu, X.5
  • 10
    • 41349118482 scopus 로고    scopus 로고
    • Optimization of network robustness to waves of targeted and random attacks
    • Apr
    • T. Tanizawa, G. Paul, R. Cohen, S. Havlin, and H. E. Stanley, "Optimization of network robustness to waves of targeted and random attacks," Physical Review E, vol. 71, no. 4, Apr. 2005.
    • (2005) Physical Review e , vol.71 , Issue.4
    • Tanizawa, T.1    Paul, G.2    Cohen, R.3    Havlin, S.4    Stanley, H.E.5
  • 11
    • 28844473499 scopus 로고    scopus 로고
    • Resilience of complex networks to random breakdown
    • G. Paul, S. Sreenivasan, and H. E. Stanley, "Resilience of complex networks to random breakdown," Physical Review E, vol. 72, no. 5, 2005.
    • (2005) Physical Review e , vol.72 , Issue.5
    • Paul, G.1    Sreenivasan, S.2    Stanley, H.E.3
  • 12
    • 79951777261 scopus 로고    scopus 로고
    • Percolation on correlated complex networks
    • Feb.
    • T. Tanizawa, "Percolation on correlated complex networks," Computer Software-JSSST, vol. 28, no. 1, pp. 135-144, Feb. 2011.
    • (2011) Computer Software-JSSST , vol.28 , Issue.1 , pp. 135-144
    • Tanizawa, T.1
  • 13
    • 77957203090 scopus 로고    scopus 로고
    • Cavity analysis on the robustness of random networks against targeted attacks: Influences of degree-degree correlations
    • Sep
    • Y. Shiraki and Y. Kabashima, "Cavity analysis on the robustness of random networks against targeted attacks: Influences of degree-degree correlations," Physical Review E, vol. 82, no. 3, Sep. 2010.
    • (2010) Physical Review e , vol.82 , Issue.3
    • Shiraki, Y.1    Kabashima, Y.2
  • 17
    • 0042025132 scopus 로고    scopus 로고
    • Building low-diameter peer-to-peer networks
    • Aug
    • G. Pandurangan, P. Raghavan, and E. Upfal, "Building low-diameter peer-to-peer networks," IEEE J. Sel. Areas Commun., vol. 21, no. 6, pp. 995-1002, Aug. 2003.
    • (2003) IEEE J. Sel. Areas Commun. , vol.21 , Issue.6 , pp. 995-1002
    • Pandurangan, G.1    Raghavan, P.2    Upfal, E.3
  • 18
    • 39049163369 scopus 로고    scopus 로고
    • On heterogeneous overlay construction and random node selection in unstructured P2P networks
    • Apr.
    • V. Vishnumurthy and P. Francis, "On heterogeneous overlay construction and random node selection in unstructured P2P networks," in Proc. IEEE INFOCOM, Apr. 2006.
    • (2006) Proc. IEEE INFOCOM
    • Vishnumurthy, V.1    Francis, P.2
  • 19
    • 77955431938 scopus 로고    scopus 로고
    • Minimizing node churn in peer-topeer streaming
    • Sep
    • C. Vassilakis and I. Stavrakakis, "Minimizing node churn in peer-topeer streaming," Computer Commun., vol. 33, no. 14, pp. 1598-1614, Sep. 2010.
    • (2010) Computer Commun. , vol.33 , Issue.14 , pp. 1598-1614
    • Vassilakis, C.1    Stavrakakis, I.2
  • 20
    • 34250797392 scopus 로고    scopus 로고
    • On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks
    • DOI 10.1109/TNET.2007.893199
    • D. Leonard, Z. Yao, V. Rai, and D. Loguinov, "On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks," IEEE/ACM Trans. Netw., vol. 15, no. 3, pp. 644-656, June 2007. (Pubitemid 46979744)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.3 , pp. 644-656
    • Leonard, D.1    Yao, Z.2    Rai, V.3    Loguinov, D.4
  • 21
    • 61449129202 scopus 로고    scopus 로고
    • Node isolation model and age-based neighbor selection in unstructured P2P networks
    • Feb
    • Z. Yao, X. Wang, D. Leonard, and D. Loguinov, "Node isolation model and age-based neighbor selection in unstructured P2P networks," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 144-157, Feb. 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 144-157
    • Yao, Z.1    Wang, X.2    Leonard, D.3    Loguinov, D.4
  • 22
    • 79961153384 scopus 로고    scopus 로고
    • An age-based membership protocol against strong churn in unstructured P2P networks
    • May
    • H. Liu, X. Liu, W. Song, and W. Wen, "An age-based membership protocol against strong churn in unstructured P2P networks," in Proc. Int. Conf. Netw. Comput. Inf. Security, May 2011, vol. 2, pp. 195-200.
    • (2011) Proc. Int. Conf. Netw. Comput. Inf. Security , vol.2 , pp. 195-200
    • Liu, H.1    Liu, X.2    Song, W.3    Wen, W.4
  • 23
    • 0037330403 scopus 로고    scopus 로고
    • Peer-to-peer membership management for gossip-based protocols
    • Feb
    • A. J. Ganesh, A. Kermarrec, and L. Massoulié, "Peer-to-peer membership management for gossip-based protocols," IEEE Trans. Comput., vol. 52, no. 2, pp. 139-149, Feb. 2003.
    • (2003) IEEE Trans. Comput. , vol.52 , Issue.2 , pp. 139-149
    • Ganesh, A.J.1    Kermarrec, A.2    Massoulié, L.3
  • 24
    • 22044433190 scopus 로고    scopus 로고
    • CYCLON: Inexpensive membership management for unstructured P2P overlays
    • DOI 10.1007/s10922-005-4441-x
    • S. Voulgaris, D. Gavidia, and M. Van Steen, "Cyclon: Inexpensive membership management for unstructured P2P overlays," J. Netw. Syst. Manage., vol. 13, no. 2, pp. 197-216, June 2005. (Pubitemid 40963651)
    • (2005) Journal of Network and Systems Management , vol.13 , Issue.2 , pp. 197-216
    • Voulgaris, S.1    Gavidia, D.2    Van Steen, M.3
  • 25
    • 47949110510 scopus 로고    scopus 로고
    • Ph.D. dissertation Swiss Federal Institute of Technology (ETH)
    • B. Pretre, "Attacks on peer-to-peer networks," Ph.D. dissertation, Swiss Federal Institute of Technology (ETH), 2005.
    • (2005) Attacks on Peer-to-peer Networks
    • Pretre, B.1
  • 26
    • 67349157090 scopus 로고    scopus 로고
    • Optimally DOS resistant P2P topologies for live multimedia streaming
    • Jan
    • M. Brinkmeier, G. Schäfer, and T. Strufe, "Optimally DOS resistant P2P topologies for live multimedia streaming," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 6, Jan. 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.6
    • Brinkmeier, M.1    Schäfer, G.2    Strufe, T.3
  • 30
    • 77949651044 scopus 로고    scopus 로고
    • Formal understanding of the emergence of superpeer networks: A complex network approach
    • Jan.
    • B. Mitra, A. K. Dubey, S. Ghose, and N. Ganguly, "Formal understanding of the emergence of superpeer networks: A complex network approach," in Proc. 11th Int. Conf. Distrib. Comput. Netw., Jan. 2010, pp. 219-230.
    • (2010) Proc. 11th Int. Conf. Distrib. Comput. Netw. , pp. 219-230
    • Mitra, B.1    Dubey, A.K.2    Ghose, S.3    Ganguly, N.4
  • 31
    • 77951126500 scopus 로고    scopus 로고
    • Catastrophic cascade of failures in interdependent networks
    • Apr
    • S. V. Buldrev, R. Parshani, G. Paul, H. E. Stanley, and S. Havlin, "Catastrophic cascade of failures in interdependent networks," Nature, vol. 464, pp. 1025-1028, Apr. 2010.
    • (2010) Nature , vol.464 , pp. 1025-1028
    • Buldrev, S.V.1    Parshani, R.2    Paul, G.3    Stanley, H.E.4    Havlin, S.5
  • 32
    • 84883320208 scopus 로고    scopus 로고
    • Y. Matsumoto, "Ruby" [Online]. Available: http://www.ruby-lang. org/en/
    • Ruby
    • Matsumoto, Y.1
  • 33
    • 33750454058 scopus 로고    scopus 로고
    • Error and attack tolerance of evolving networks with local preferential attachment
    • DOI 10.1016/j.physa.2006.05.049, PII S0378437106006595
    • S. Sun, Z. Liu, Z. Chen, and Z. Yuan, "Error and attack tolerance of evolving networks with local preferential attachment," Physica A: Statistical Theoretical Physics, vol. 373, no. 1, pp. 851-860, Jan. 2007. (Pubitemid 44647712)
    • (2007) Physica A: Statistical Mechanics and its Applications , vol.373 , pp. 851-860
    • Sun, S.1    Liu, Z.2    Chen, Z.3    Yuan, Z.4
  • 34
    • 0032286776 scopus 로고    scopus 로고
    • The Size of the Giant Component of a Random Graph with a Given Degree Sequence
    • M. Molloy and B. Reed, "The size of the giant component of a random graph with a given degree sequence," Combinatorics, Probability, Comput., vol. 7, no. 3, pp. 295-305, Sep. 2000. (Pubitemid 128480814)
    • (1998) Combinatorics Probability and Computing , vol.7 , Issue.3 , pp. 295-305
    • Molloy, M.1    Reed, B.2
  • 35
    • 33751255669 scopus 로고    scopus 로고
    • Identity-based secure collaboration in ad hoc networks
    • Feb
    • J. Pan, L. Cai, X. Shen, and J. W. Mark, "Identity-based secure collaboration in ad hoc networks," Elsevier Comput. Netw., vol. 51, no. 3, pp. 835-865, Feb. 2007.
    • (2007) Elsevier Comput. Netw. , vol.51 , Issue.3 , pp. 835-865
    • Pan, J.1    Cai, L.2    Shen, X.3    Mark, J.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.