Active Measurement of Routing Table in Kad
暂无分享,去创建一个
[1] Eddie Kohler,et al. Small is not always beautiful , 2008, IPTPS.
[2] Keith W. Ross,et al. Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.
[3] Keith W. Ross,et al. A measurement study of attacks on BitTorrent leechers , 2008, IPTPS.
[4] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Keith W. Ross,et al. A Measurement Study of Attacks on BitTorrent Seeds , 2011, 2011 IEEE International Conference on Communications (ICC).
[6] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[7] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[8] Xu Peng,et al. Research on Measurement of Peer-to-Peer File Sharing System , 2006 .
[9] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[10] Zhoujun Li,et al. Misusing Kademlia Protocol to Perform DDoS Attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[11] Taoufik En-Najjary,et al. Actively Monitoring Peers in KAD , 2007, IPTPS.
[12] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[13] Taoufik En-Najjary,et al. Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.
[14] Ruben Torres,et al. DDoS Attacks by Subverting Membership Management in P2P Systems , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.