A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

[HTML][HTML] State-of-the-art survey on P2P overlay networks in pervasive computing environments

A Malatras - Journal of Network and Computer Applications, 2015 - Elsevier
P2P overlay networks have attracted significant research interest due to their utility as
virtualized abstractions of complex network infrastructures, optimized to satisfy specific …

Low-resource eclipse attacks on ethereum's peer-to-peer network

Y Marcus, E Heilman, S Goldberg - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present eclipse attacks on Ethereum nodes that exploit the peer-to-peer network used
for neighbor discovery. Our attacks can be launched using only two hosts, each with a single …

Sybillimit: A near-optimal social network defense against sybil attacks

H Yu, PB Gibbons, M Kaminsky… - 2008 IEEE Symposium …, 2008 - ieeexplore.ieee.org
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable
to sybil attacks, where a malicious user pretends to have multiple identities (called sybil …

Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm.

T Holz, M Steiner, F Dahl, EW Biersack, FC Freiling - Leet, 2008 - usenix.org
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Check out the new USENIX Web site. Measurements and Mitigation of Peer-to-Peer-based …

Low-latency vehicular edge: A vehicular infrastructure model for 5G

V Balasubramanian, S Otoum, M Aloqaily… - … Modelling Practice and …, 2020 - Elsevier
With 5G network services around the corner, vehicular cloud networks providing
computation capabilities have taken precedence over traditional costly cloud solutions …

Long Term Study of Peer Behavior in the kad DHT

M Steiner, T En-Najjary… - IEEE/ACM Transactions …, 2009 - ieeexplore.ieee.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHTs …

Measuring large-scale distributed systems: case of bittorrent mainline dht

L Wang, J Kangasharju - IEEE P2P 2013 Proceedings, 2013 - ieeexplore.ieee.org
Peer-to-peer networks have been quite thoroughly measured over the past years, however it
is interesting to note that the BitTorrent Mainline DHT has received very little attention even …

Eclipsing ethereum peers with false friends

S Henningsen, D Teunis, M Florian… - arXiv preprint arXiv …, 2019 - arxiv.org
Ethereum is a decentralized Blockchain system that supports the execution of Turing-
complete smart contracts. Although the security of the Ethereum ecosystem has been …

The pollution attack in p2p live video streaming: measurement results and defenses

P Dhungel, X Hei, KW Ross, N Saxena - … of the 2007 workshop on Peer …, 2007 - dl.acm.org
P2P mesh-pull live video streaming applications---such as Cool-Streaming, PPLive, and
PPStream---have become popular in the recent years. In this paper, we examine the stream …