Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
Enormous content distribution systems improved broadly with the rapid growth of novel and innovative technologies. Peer-to-peer (P2P) content distribution network (CDN) technologies such innovative technological improvement which claims low cost, efficient high demand data distribution and it gradually involves to the next-generation CDNs. Communications among the nodes of such open network infrastructures...
As one of the most widely-used Peer-to-Peer applications, BitTorrent system has gained a lot of successes in last decade. BitTorrent has been extensively studied in the literature. However, few research studies vulnerabilities of BitTorrent, and the abuses of BitTorrent have already impeded the wide adoption of the system. In this paper, we study a common attack on BitTorrent — the Leechers attack,...
An ideal file sharing method is all mobile users can directly share their files one-to-one in the mobile peer-to-peer (MP2P) environment. However, some copyright multimedia files usually are shared and downloaded extensively through P2P technology, so P2P technology has a bad reputation by these illegal distribution behaviors. Hence, how to effectively control unauthorized digital content distribution...
Web services are increasingly hosted on peer to peer networks, to facilitate resource sharing and cooperation. In these settings, each peer hosts a set of services which can be invoked by other peers of the network through a service query. In a pure peer to peer network, it might not be possible to maintain directory for publishing the services, rather, the peers need to search for the required service...
BitTorrent is a widely deployed P2P file sharing protocol, extensively used to distribute digital content and soft- ware updates, among others. Recent actions against torrent and tracker repositories have fostered the move towards a fully distributed solution based on a distributed hash table to support both torrent search and tracker implementation. In this paper we present a security study of the...
Content delivery by P2P networks plays an important role nowadays, meanwhile, content owners may attack the networks to block unauthorized content distribution. In this paper, analytical models are developed to analyze the “battle” between users and content owners. The effect of the two most commonly applied attacks, content pollution and index poisoning, are compared. The impact of user behavior...
This paper presents the various mechanisms for virtual machine image distribution within a large batch farm and between sites that offer cloud computing services. The work is presented within the context of the Large Hadron Collider Computing Grid (LCG), it has two main goals. First it aims at presenting the CERN specific mechanisms that have been put in place to test the pre-staging of virtual machine...
Applications using P2P as an Overlay network in MANet (P2M) are very unstable in terms of MANet interconnections and P2P churn. MANet-based P2P applications usually create a considerable overhead on the P2P consumer due to the control of the end-to-end communication with the peer that provides the shared content. Moreover, traditional P2P networks offer polluted contents wasting the device's scarce...
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But security and trust have also become urgent problems for a P2P network due to its openness and anonymousness. Most of the current schemes rely on some trust models, but the research in systematic...
In order to build large-scale RFID applications, it is necessary to establish public RFID service infrastructure, the essential task is to build efficient and secure RFID code resolution network. Aiming at alleviating the problems in load balancing, single node failure tolerance and security of resolution network, based on related standards and research works, a hierarchical P2P based RFID code resolution...
Attack signature validation plays a key role in intrusion detection and prevention technologies. Usually, when new attacks, particularly worms, appear, security software analyzes and generates signatures for these attacks. Since inaccurate signatures may block legitimate traffic that is similar to the attack traffic (false positives), security software is reluctant to deploy new signatures without...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. Most existing methods for trust management, which are based on reputation, focus on preventing network from the malicious peers. In fact, peers' capabilities to fulfill the tasks are also important factors, which will greatly impact the efficiency of P2P...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, and securing such networks is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of the participating hosts and the underlying networking systems without presenting any definite scheme for trust establishment. If MANET is to achieve the same level of...
In the classic use of P2P, e.g. file sharing, there is no concern about persistent peer identification, peer and content reputation and content authenticity. Security proposals currently found in technical literature try to adapt techniques from client-server architecture to P2P environments, which it is not the most appropriate approach. This work proposes applying public keys to identify peers....
With the wide deployment of P2P networks, the attacks against them have been attracting more and more attention. However, studies on security problems in P2P network mainly focus on individual attack. We still lack systemic analysis of attacks in P2P network. Understanding the taxonomy and the relationships between attacks will help to build the security mechanism and effectively organize the defense...
Kademlia-based DHT has been deployed in many P2P applications and it is reported that there are millions of simultaneous users in Kad network. For such a protocol that significantly involves so many peers, its robustness and security must be evaluated carefully. In this paper, we analyze the Kademlia protocol and identify several potential vulnerabilities. We classify potential attacks as three types:...
Nowadays, we are witnessing an important increase in attacks among which distributed denial-of-service (DDoS) that easily flood the victims using multiple paths. Intrusion detection and filtering are necessary mechanisms to combat against these attacks and secure networks. However, the existing detection techniques for DDoS attacks have their entities work in isolation. In this paper, we propose an...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.