A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple …
The Sybil attack consists on the indiscriminate creation of counterfeit identities, by a malicious user (attacker), in large-scale, dynamic distributed systems (for example, Peer-to …
CH Lu, CH Liu, ZH Chen - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With the rapidly increasing number of Internet of Things (IoT) devices, various interconnected devices have become targets of growing cyberattacks. Keeping the firmware …
An effective approach to tackle Sybil attacks consists in establishing computational puzzles to be solved prior to granting new identities. Solutions based on this approach, despite their …
RV Coelho, JT Pastro, RS Antunes… - Proceedings of the 6th …, 2011 - dl.acm.org
Peer-to-peer live streaming applications are becoming increasingly popular, and already reach millions of users worldwide. There are, however, many aspects in which these …
BitTorrent networks are nowadays the most employed method of Peer-to-Peer (P2P) file sharing in the Internet. Recent monitoring reports reveal that content copies being shared …
The degree of autonomy provided to users when publishing contents in P2P file sharing systems allows the dissemination of files with inaccurate, incorrect or imprecise descriptions …
PMR Anand, V Bhaskar - 2011 Annual IEEE India Conference, 2011 - ieeexplore.ieee.org
In Peer-to-Peer (P2P) networks, file sharing application is popular among internet users due to its high scalability and anonymity. The increasing number of polluted or infected contents …