Real-world sybil attacks in BitTorrent mainline DHT

L Wang, J Kangasharju - 2012 IEEE Global Communications …, 2012 - ieeexplore.ieee.org
Distributed hash tables (DHT) are a key building block for modern P2P content-distribution
system, for example in implementing the distributed tracker of BitTorrent Mainline DHT …

VPN-zero: a privacy-preserving decentralized virtual private network

M Varvello, IQ Azurmendi, A Nappa… - 2021 IFIP …, 2021 - ieeexplore.ieee.org
Distributed Virtual Private Networks (dVPNs) are new solutions aiming to solve the trust-
privacy concern of a VPN's central authority by leveraging a distributed architecture. In this …

Resource monitoring for the detection of parasite P2P botnets

RA Rodríguez-Gómez, G Maciá-Fernández… - Computer Networks, 2014 - Elsevier
Detecting botnet behaviors in networks is a popular topic in the current research literature.
The problem of detection of P2P botnets has been denounced as one of the most difficult …

Exploring and improving BitTorrent topologies

C Decker, R Eidenbenz… - IEEE P2P 2013 …, 2013 - ieeexplore.ieee.org
BitTorrent, the most popular peer-to-peer (P2P) file-sharing protocol, accounts for a
significant fraction of the traffic of the Internet. Using a novel technique, we measure live …

Vpn0: A privacy-preserving decentralized virtual private network

M Varvello, IQ Azurmendi, A Nappa… - arXiv preprint arXiv …, 2019 - arxiv.org
Distributed Virtual Private Networks (dVPNs) are new VPN solutions aiming to solve the trust-
privacy concern of a VPN's central authority by leveraging a distributed architecture. In this …

Understanding the evolution of multimedia content in the internet through bittorrent glasses

R Farahbakhsh, N Crespi, Á Cuevas, R Cuevas… - IEEE …, 2013 - ieeexplore.ieee.org
Today′ s Internet traffic is mostly dominated by multimedia content and the prediction is that
this trend will intensify in the future. Therefore, main Internet players, such as ISPs, content …

Understanding BitTorrent: a reality check from the ISP's perspective

M Varvello, M Steiner, K Laevens - Computer Networks, 2012 - Elsevier
During the last decade, Peer-to-Peer (P2P) applications have been one of the dominant
components of Internet traffic. Understanding BitTorrent, by far the most popular P2P …

A measurement study on mainline dht and magnet link

Z Xinxing, T Zhihong, Z Luchen - 2016 IEEE First International …, 2016 - ieeexplore.ieee.org
Although Mainline DHT is not an official BitTorrent protocol so far, it's widely used in many
BitTorrent clients such as Utorrent, Vuze, BitComet and Xunlei. Despite there are millions of …

THash: A practical network optimization scheme for DHT-based P2P applications

Y Sun, YR Yang, X Zhang, Y Guo, J Li… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
P2P platforms have been criticized because of the heavy strain that they can inflict on costly
inter-domain links of network operators. It is therefore mandatory to develop network …

An ISP-friendly inter-overlay coordination framework for multiple coexisting P2P systems

P Yang, L Xu - Peer-to-Peer Networking and Applications, 2014 - Springer
Abstract As Peer-to-Peer (P2P) systems are widely deployed in the Internet, P2P traffic
control becomes a challenge for Internet Service Providers (ISPs) and P2P system vendors …