The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For a scalable Massively Multiplayer Online Game (MMOG), interest management (IM) is an essential component to reduce unnecessary network traffic. As Area-Of-Interest (AOI) defines each player's interests, an entity normally maintains a subscriber list of players whose AOIs cover the position of the entity. To maintain the subscriber list, players are required to send AOI updates. Unfortunately, AOI...
Service discovery is critical for mapping logical resource name to physical resources in large-scale distributed systems. The traditional Domain Name System (DNS) deployed on the Internet, however, suffers from slow-down, vulnerability for denial of service attacks, and does not support fast updates. To address these problems, a novel decentralized service discovery approach based on peer-to-peer...
In recent years, botnets have become a significant threat, drawing the attention of computer security practitioners and researchers. As the extensive use of peer-to-peer (P2P) technology, P2P structured botnets have gradually emerged as a new advanced form of botnets. In this paper, we analyze the features of this new type botnet and evaluate effectiveness of various botnets defense strategies. However,...
Peer-to-Peer(P2P) botnets that use P2P networks for remote control of bots have become the root cause of many Internet attacks. Compared with current botnets, P2P botnets are harder to be hijacked and defended. In this paper, we presents two sybil attacks techniques, i.e., random sybil attack and d-choice sybil attack to mitigate P2P botnets based on analyzing the weakness of botnets. We quantitatively...
Recently, the improvements in processing performance of a computer and high speed communication of an optical fiber have been achieved, so that the amount of data which are processed by a computer and flowed on a network has been increasing greatly. However, in a client-server system, since the server receives and processes the amount of data from the clients through the network, a load on the server...
Peer-to-peer (P2P) systems have drawn a lot of attention from telecom research communities, due to their advantages such as high scalability and cost-effectiveness. Many P2P inspired architectures have been proposed to implement the traditional telecom functionalities such as rendezvous service and even wireless networking. Although DHT is always adopted as the major element of such architectures,...
Peer-to-Peer systems have become a substantial element in computer networking. Distributing the load and splitting complex tasks are only some reasons why many developers have come to adopt this technology. However, all of them face a severe problem at the very beginning: setting up an overlay network, such that other clients can easily join it. With an empty peer cache common bootstrapping methods...
In this article we are dealing with security problems of peer-to-peer networks, with malware propagation model, establishing empirical model of file propagation in peer-to-peer networks and we are describing our system for automatic file downloading.
Botnet has recently been identified as one of the most important security threats of the Internet. So we should study the new technology which may be used by botmaster in the near future. In this paper we predict the new feature of the next generation botnet and present the design of an advanced P2P botnet basing on our discussion.
In this work wepsilare dealing with security in highly distributed systems, namely in peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of Malware spreading. Also we are proposing our system for automatic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.