The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional C/S structure mode faces the problems such as overloaded server, system hard to expand and high operation cost in the process of building streaming media server, which seriously hinder the further development of streaming media application. However these problems may be effectively solved by introducing P2P technology into streaming media application. On the basis of analysis of defects...
Over the years of the emergence of peer-to-peer systems a phenomenon named 'Free Riding' has affected its performance and become a serious threat to be resolved. Free riding phenomenon was first felt in the study of Gnutella. As the number of free riders increases, the performance of the overall system decreases as free riders use resources without giving anything to the system. To solve the problem...
In peer-to-peer (P2P) overlay networks, a group of multiple peers have to cooperate with each other. P2P systems are in nature scalable, distributed systems, where there is no centralized coordinator. Hence, a group of peers is required to be scalable in P2P overlay networks. Each peer sends a message to every peer and every other peer receives the message in a group. In group communication, each...
Along with the rapid development of peer-to-peer network technology and the fast increasing number of users, the problems of security in peer-to-peer network is becoming more and more important. By researching the previous trust model of peer-to-peer network, we propose a trust model(PTM) for peer-to-peer networks based on punish mechanism. Firstly, we use the method of social grouping nodes in the...
For a scalable Massively Multiplayer Online Game (MMOG), interest management (IM) is an essential component to reduce unnecessary network traffic. As Area-Of-Interest (AOI) defines each player's interests, an entity normally maintains a subscriber list of players whose AOIs cover the position of the entity. To maintain the subscriber list, players are required to send AOI updates. Unfortunately, AOI...
Over the past decade, bot net has been a serious threat to the Internet because it can be used to launch a variety of attacks on the Internet. To prevent the attacks, we have to fully understand the infection paths and attack methods of bot net. Hence, this study is aimed at reconstructing scenarios of attacks performed by bot net on the Testbed@TWISC platform in such a way that the behavior of the...
Source code compiling is a non-trivial task that requires many computing resources. As a software project grows, its build time increases and debugging on a single computer becomes more and more time consuming task. An obvious solution would be a dedicated cluster acting as a build farm, where developers can send their requests. But in most cases, this solution has a very low utilization of available...
Service discovery is critical for mapping logical resource name to physical resources in large-scale distributed systems. The traditional Domain Name System (DNS) deployed on the Internet, however, suffers from slow-down, vulnerability for denial of service attacks, and does not support fast updates. To address these problems, a novel decentralized service discovery approach based on peer-to-peer...
In the network technology, P2P software represented by BitTorrent in solving the problem of transmission of the large capacity files is a good solution, but it makes the copyright administration more difficult. This paper analyzes network transmission main body under P2P network technology conditions, its copyright infringement forms, and constituents of copyright infringement in detail. It is thought...
SPKI/SDSI certificate system can meet the demand of secure visit control under the circumstances of P2P network. JXTA is an open network computing infrastructure used to solve peer to peer computing, on which explorers can apply P2P. This paper covers the SPKI/SDSI certificate theory and the security demand for P2P ,and raises P2P security plan based on SPKI/SDSI certificate in JXTA peergroups.
Botnets are an emerging phenomenon that is becoming one of the most significant threats to security. Its danger lies less in the malicious codes themselves, but in the support they provide to implement a wide branch of very different criminal practices which are quite more compromising than harming an isolated computer, such as distributed denial of service attacks (DDoS), phishing, online fraud,...
Power management is becoming very important in data centers. Cloud computing is also one of the newest promising data center techniques which is appealing to many big companies. As cloud computing is different from current data centers in terms of power management due to a dynamic structure and property for its online service. Power budgeting, in terms of its important role in power management, provides...
The top-k query algorithm is a useful tool to lookup the best k results from candidate dataset for inquiring action. However, majority top-k query algorithms are applied to client/server networks rather than distributed networks specifically DHT overlay networks. This paper thinks about this problem to design a distributed top-k query algorithm for DHT overlay networks. It first constructs a unique...
The computational systems of the grid make a way in which different heterogeneous resources distributed geographically are connected in a virtual processing environment. The resource discovery is so critical in such environments. In recent years, authors have proposed different methods in the resource discovery in the grid. Recent methods have tried to decrease the discovery and update costs. Some...
Recently, most DDoS attacks and other acts of online crime are facilitated by botnets. To be well prepared for botnet-based attacks, we should know the botnet that could be developed by attackers in the near future. In this paper, we propose a framework for hybrid structure P2P botnet based on Chord. We organize some super bots into the same virtual node to improve the network stability. We also design...
In recent years, botnets have become a significant threat, drawing the attention of computer security practitioners and researchers. As the extensive use of peer-to-peer (P2P) technology, P2P structured botnets have gradually emerged as a new advanced form of botnets. In this paper, we analyze the features of this new type botnet and evaluate effectiveness of various botnets defense strategies. However,...
This paper, based on the survey of students' online behavior and the Netflow statistics which turned out to be the fact that P2P flow accounts for about 70% of the total compus netflow and that the Thunder connection greatly endangers the firewall load, analyzed the download principle of thunder P2P software and put forward some methods on how to control Netflow.
We propose EagleEye, an accountable logging framework as a middleware for distributed and networked systems. EagleEye offloads the logging function from the distributed application program so that applications can focus on the logic handling without worrying about when and how to do logging. By capturing and analyzing network packets, EagleEye is able to reproduce the entire networking event history...
With the wide-spread use of high-speed network connections and high performance computing resources available over the Internet, live video broadcasting services have become available on the Internet. In this service, anyone who has a laptop, desktop, or mobile terminal with a camera can broadcast his own video to any user who is interested in watching it in real time. Such a system must be able to...
We describe a novel, lightweight platform for distributed computing called Conillon. This platform allows regular workstations to function as compute nodes in a desktop grid. Conillon runs on the Java Virtual Machine (JVM) and computational resources from any architecture for which the JVM is implemented can thus be used. Many existing distributed computing platforms are either complex or only allow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.