Exploiting KAD: possible uses and misuses
暂无分享,去创建一个
Taoufik En-Najjary | Moritz Steiner | Ernst W. Biersack | Moritz Steiner | E. Biersack | T. En-Najjary
[1] Mischa Schwartz,et al. ACM SIGCOMM computer communication review , 2001, CCRV.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Peter Druschel,et al. Exploiting network proximity in peer-to-peer overlay networks , 2002 .
[4] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[5] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[6] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[7] Krishna P. Gummadi,et al. The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.
[8] David Mazières,et al. Democratizing Content Publication with Coral , 2004, NSDI.
[9] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[10] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[11] Joseph M. Hellerstein,et al. Maelstrom: Churn as shelter , 2005 .
[12] Daniel Stutzbach,et al. Improving Lookup Performance Over a Widely-Deployed DHT , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[13] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[14] Keith W. Ross,et al. Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.
[15] Evangelos P. Markatos,et al. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets , 2006, ACNS.
[16] Joseph M. Hellerstein,et al. Induced Churn as Shelter from Routing-Table Poisoning , 2006, NDSS.
[17] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[18] Ernst W. Biersack,et al. Building a reliable P2P system out of unreliable P2P clients: the case of KAD , 2007, CoNEXT '07.
[19] Taoufik En-Najjary,et al. Actively Monitoring Peers in KAD , 2007, IPTPS.
[20] Moritz Steiner. Load reduction in the KAD peer-to-peer system , 2007 .
[21] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[22] Minas Gjoka,et al. BotTorrent: Misusing BitTorrent to Launch DDoS Attacks , 2007, SRUTI.
[23] Phillip B. Gibbons,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2006, IEEE/ACM Transactions on Networking.