Home > Research > Publications & Outputs > Malicious peers eviction for P2P overlays

Links

Text available via DOI:

View graph of relations

Malicious peers eviction for P2P overlays

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Malicious peers eviction for P2P overlays. / Ismail, H.; Germanus, D.; Suri, Neeraj.
2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. p. 216-224.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Ismail, H, Germanus, D & Suri, N 2016, Malicious peers eviction for P2P overlays. in 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, pp. 216-224. https://doi.org/10.1109/CNS.2016.7860488

APA

Ismail, H., Germanus, D., & Suri, N. (2016). Malicious peers eviction for P2P overlays. In 2016 IEEE Conference on Communications and Network Security (CNS) (pp. 216-224). IEEE. https://doi.org/10.1109/CNS.2016.7860488

Vancouver

Ismail H, Germanus D, Suri N. Malicious peers eviction for P2P overlays. In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE. 2016. p. 216-224 doi: 10.1109/CNS.2016.7860488

Author

Ismail, H. ; Germanus, D. ; Suri, Neeraj. / Malicious peers eviction for P2P overlays. 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. pp. 216-224

Bibtex

@inproceedings{8edb448f64914c2fb925c66772dbe1c9,
title = "Malicious peers eviction for P2P overlays",
abstract = "P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the overlay. Such subsets may refer to peers that replicate critical or popular content. {\textcopyright} 2016 IEEE.",
keywords = "Detection, DHT, Eviction, Localized Attack, P2P, Security, Error detection, Peer to peer networks, Decentralized design, Fault-tolerant applications, Malicious peer, P2P applications, Service interfaces, Network security",
author = "H. Ismail and D. Germanus and Neeraj Suri",
year = "2016",
month = oct,
day = "17",
doi = "10.1109/CNS.2016.7860488",
language = "English",
isbn = "9781509030668",
pages = "216--224",
booktitle = "2016 IEEE Conference on Communications and Network Security (CNS)",
publisher = "IEEE",

}

RIS

TY - GEN

T1 - Malicious peers eviction for P2P overlays

AU - Ismail, H.

AU - Germanus, D.

AU - Suri, Neeraj

PY - 2016/10/17

Y1 - 2016/10/17

N2 - P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the overlay. Such subsets may refer to peers that replicate critical or popular content. © 2016 IEEE.

AB - P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the overlay. Such subsets may refer to peers that replicate critical or popular content. © 2016 IEEE.

KW - Detection

KW - DHT

KW - Eviction

KW - Localized Attack

KW - P2P

KW - Security

KW - Error detection

KW - Peer to peer networks

KW - Decentralized design

KW - Fault-tolerant applications

KW - Malicious peer

KW - P2P applications

KW - Service interfaces

KW - Network security

U2 - 10.1109/CNS.2016.7860488

DO - 10.1109/CNS.2016.7860488

M3 - Conference contribution/Paper

SN - 9781509030668

SP - 216

EP - 224

BT - 2016 IEEE Conference on Communications and Network Security (CNS)

PB - IEEE

ER -