Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Can Heterogeneity Make Gnutella Scalable?
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Making gnutella-like P2P systems scalable
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Evaluating GUESS and Non-Forwarding Peer-to-Peer Search
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
INCA: qualitative reference framework for incentive mechanisms in P2P networks
International Journal of Computer Applications in Technology
Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment
Computer Communications
The anatomy of a large-scale social search engine
Proceedings of the 19th international conference on World wide web
Affinity P2P: A self-organizing content-based locality-aware collaborative peer-to-peer network
Computer Networks: The International Journal of Computer and Telecommunications Networking
A trust-based robust and efficient searching scheme for peer-to-peer networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A secure and efficient searching scheme for trusted nodes in a peer-to-peer network
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Searching dynamic communities with personal indexes
ISWC'05 Proceedings of the 4th international conference on The Semantic Web
On studying p2p topology construction based on virtual regions and its effect on search performance
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Searching the village: models and methods for social search
Communications of the ACM
A reciprocal capacity based adaptive topology protocol for p2p networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Threat model for grid security services
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Secure and privacy-aware searching in peer-to-peer networks
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Hi-index | 0.02 |
We present a peer-level protocol for forming adaptive, self-organizing topologies for data-sharing P2P networks. This protocol is based on the idea that a peer should directly connect to those peers from which it is most likely to download satisfactory content. We show that the resulting topologies are more efficient than standard Gnutella topologies. Furthermore, we show that these adaptive topologies have the added benefits of increased resistance to certain types of attacks, intrinsic rewards for active peers and punishments for malicious peers and freeriders.