Measuring “Sybil attacks” in Kademlia-based networks
暂无分享,去创建一个
[1] Michalis Faloutsos,et al. Transport layer identification of P2P traffic , 2004, IMC '04.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[4] Xueqi Cheng,et al. Rainbow: A Robust and Versatile Measurement Tool for Kademlia-Based DHT Networks , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.
[5] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[6] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[7] Taoufik En-Najjary,et al. Exploiting KAD: possible uses and misuses , 2007, CCRV.
[8] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[9] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.