Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Malicious peers eviction for P2P overlays
AU - Ismail, H.
AU - Germanus, D.
AU - Suri, Neeraj
PY - 2016/10/17
Y1 - 2016/10/17
N2 - P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the overlay. Such subsets may refer to peers that replicate critical or popular content. © 2016 IEEE.
AB - P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the overlay. Such subsets may refer to peers that replicate critical or popular content. © 2016 IEEE.
KW - Detection
KW - DHT
KW - Eviction
KW - Localized Attack
KW - P2P
KW - Security
KW - Error detection
KW - Peer to peer networks
KW - Decentralized design
KW - Fault-tolerant applications
KW - Malicious peer
KW - P2P applications
KW - Service interfaces
KW - Network security
U2 - 10.1109/CNS.2016.7860488
DO - 10.1109/CNS.2016.7860488
M3 - Conference contribution/Paper
SN - 9781509030668
SP - 216
EP - 224
BT - 2016 IEEE Conference on Communications and Network Security (CNS)
PB - IEEE
ER -