A survey on content-centric technologies for the current Internet: CDN and P2P solutions

A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …

A survey of information-centric networking

B Ahlgren, C Dannewitz, C Imbrenda… - IEEE …, 2012 - ieeexplore.ieee.org
The information-centric networking (ICN) concept is a significant common approach of
several future Internet research activities. The approach leverages in-network caching …

Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.

T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling - Leet, 2008 - usenix.org
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Check out the new USENIX Web site. Measurements and Mitigation of Peer-to-Peer-based …

Monitoring data requests in decentralized data storage systems: A case study of IPFS

L Balduf, S Henningsen, M Florian… - 2022 IEEE 42nd …, 2022 - ieeexplore.ieee.org
Decentralized data storage systems like the Interplanetary Filesystem (IPFS) are becoming
increasingly popular, eg, as a data layer in blockchain applications and for sharing content …

A Survey on Content Retrieval on the Decentralised Web

N Keizer, O Ascigil, M Król, D Kutscher… - ACM Computing …, 2024 - dl.acm.org
The control, governance, and management of the web have become increasingly
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …

Mapping the interplanetary filesystem

S Henningsen, M Florian, S Rust… - 2020 IFIP Networking …, 2020 - ieeexplore.ieee.org
The Interplanetary Filesystem (IPFS) is a distributed data storage service frequently used by
blockchain applications and for sharing content in a censorship-resistant manner. Data is …

Long Term Study of Peer Behavior in the kad DHT

M Steiner, T En-Najjary… - IEEE/ACM Transactions …, 2009 - ieeexplore.ieee.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHTs …

[PDF][PDF] Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.

S Wolchok, OS Hofmann, N Heninger, EW Felten… - NDSS, 2010 - jhalderm.com
Researchers at the University of Washington recently proposed Vanish [20], a system for
creating messages that automatically “self-destruct” after a period of time. Vanish works by …

Measuring large-scale distributed systems: case of bittorrent mainline dht

L Wang, J Kangasharju - IEEE P2P 2013 Proceedings, 2013 - ieeexplore.ieee.org
Peer-to-peer networks have been quite thoroughly measured over the past years, however it
is interesting to note that the BitTorrent Mainline DHT has received very little attention even …

Exploiting KAD: possible uses and misuses

M Steiner, T En-Najjary, EW Biersack - ACM SIGCOMM Computer …, 2007 - dl.acm.org
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer
traffic makes a major fraction of the total traffic seen in the Internet. The dominating …