A survey on content-centric technologies for the current Internet: CDN and P2P solutions

A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …

Design and evaluation of IPFS: a storage layer for the decentralized web

D Trautwein, A Raman, G Tyson, I Castro… - Proceedings of the …, 2022 - dl.acm.org
Recent years have witnessed growing consolidation of web operations. For example, the
majority of web traffic now originates from a few organizations, and even micro-websites …

Accelerometer: Understanding acceleration opportunities for data center overheads at hyperscale

A Sriraman, A Dhanotia - Proceedings of the Twenty-Fifth International …, 2020 - dl.acm.org
At global user population scale, important microservices in warehouse-scale data centers
can grow to account for an enormous installed base of servers. With the end of Dennard …

On unbiased sampling for unstructured peer-to-peer networks

D Stutzbach, R Rejaie, N Duffield, S Sen… - Proceedings of the 6th …, 2006 - dl.acm.org
This paper addresses the difficult problem of selecting representative samples of peer
properties (eg degree, link bandwidth, number of files shared) in unstructured peer-to-peer …

A global view of kad

M Steiner, T En-Najjary, EW Biersack - Proceedings of the 7th ACM …, 2007 - dl.acm.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHT …

Long Term Study of Peer Behavior in the kad DHT

M Steiner, T En-Najjary… - IEEE/ACM Transactions …, 2009 - ieeexplore.ieee.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHTs …

Profiling a million user DHT

J Falkner, M Piatek, JP John, A Krishnamurthy… - Proceedings of the 7th …, 2007 - dl.acm.org
Distributed hash tables (DHTs) provide scalable, key-based lookup of objects in dynamic
network environments. Although DHTs have been studied extensively from an analytical …

[PDF][PDF] Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.

S Wolchok, OS Hofmann, N Heninger, EW Felten… - NDSS, 2010 - jhalderm.com
Researchers at the University of Washington recently proposed Vanish [20], a system for
creating messages that automatically “self-destruct” after a period of time. Vanish works by …

Exploiting KAD: possible uses and misuses

M Steiner, T En-Najjary, EW Biersack - ACM SIGCOMM Computer …, 2007 - dl.acm.org
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer
traffic makes a major fraction of the total traffic seen in the Internet. The dominating …

A systematic study on peer-to-peer botnets

P Wang, L Wu, B Aslam, CC Zou - 2009 Proceedings of 18th …, 2009 - ieeexplore.ieee.org
" Botnet" is a network of computers that are compromised and controlled by an attacker.
Botnets are one of the most serious threats to today's Internet. Most current botnets have …