Funnel: Choking polluters in bittorrent file sharing communities

FR Santos, WL da Costa Cordeiro… - … on Network and …, 2011 - ieeexplore.ieee.org
BitTorrent-based file sharing communities are very popular nowadays. Anecdotal evidence
hints that such communities are exposed to content pollution attacks (ie, publication of" …

[HTML][HTML] Torrent Poisoning Protection with a Reverse Proxy Server

A Godinho, J Rosado, F Sá, F Caldeira, F Cardoso - Electronics, 2022 - mdpi.com
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a
network or site. A typical DDoS flood attack on a website targets a web server with multiple …

Identity management based on adaptive puzzles to protect p2p systems from sybil attacks

WL da Costa Cordeiro, FR Santos, GH Mauch… - Computer Networks, 2012 - Elsevier
The Sybil attack consists on the indiscriminate creation of counterfeit identities, by a
malicious user (attacker), in large-scale, dynamic distributed systems (for example, Peer-to …

Secure and efficient firmware update for increasing IoT-enabled smart devices

CH Lu, CH Liu, ZH Chen - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With the rapidly increasing number of Internet of Things (IoT) devices, various
interconnected devices have become targets of growing cyberattacks. Keeping the firmware …

Securing p2p systems from sybil attacks through adaptive identity management

WL da Costa Cordeiro, FR Santos… - … on Network and …, 2011 - ieeexplore.ieee.org
An effective approach to tackle Sybil attacks consists in establishing computational puzzles
to be solved prior to granting new identities. Solutions based on this approach, despite their …

Challenging the feasibility of authentication mechanisms for P2P live streaming

RV Coelho, JT Pastro, RS Antunes… - Proceedings of the 6th …, 2011 - dl.acm.org
Peer-to-peer live streaming applications are becoming increasingly popular, and already
reach millions of users worldwide. There are, however, many aspects in which these …

Characterizing dissemination of illegal copies of content through monitoring of BitTorrent networks

AH Schmidt, RS Antunes, MP Barcellos… - 2012 IEEE Network …, 2012 - ieeexplore.ieee.org
BitTorrent networks are nowadays the most employed method of Peer-to-Peer (P2P) file
sharing in the Internet. Recent monitoring reports reveal that content copies being shared …

Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems

FR Santos, WL da Costa Cordeiro, LP Gaspary… - Computer …, 2013 - Elsevier
The degree of autonomy provided to users when publishing contents in P2P file sharing
systems allows the dissemination of files with inaccurate, incorrect or imprecise descriptions …

[PDF][PDF] 内容共享网络中的关键问题

鲁强, 刘波, 胡华平 - 通信学报, 2016 - infocomm-journal.com
作为文件, 信息和资源等联网内容的共享平台, 内容共享网络在互联网中具有十分广泛的分布.
随着网络技术的快速发展和深入应用, 特别是对等网络的兴起与流行, 极大地方便了人们通过 …

Polluted content prevention in Peer-to-Peer file sharing networks

PMR Anand, V Bhaskar - 2011 Annual IEEE India Conference, 2011 - ieeexplore.ieee.org
In Peer-to-Peer (P2P) networks, file sharing application is popular among internet users due
to its high scalability and anonymity. The increasing number of polluted or infected contents …