Liang et al., 2005 - Google Patents
Pollution in P2P file sharing systemsLiang et al., 2005
View PDF- Document ID
- 2241334366726910874
- Author
- Liang J
- Kumar R
- Xi Y
- Ross K
- Publication year
- Publication venue
- Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
External Links
Snippet
One way to combat P2P file sharing of copyrighted content is to deposit into the file sharing systems large volumes of polluted files. Without taking sides in the file sharing debate, in this paper we undertake a measurement study of the nature and magnitude of pollution in the …
- 238000000034 method 0 abstract description 26
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1042—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1061—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving node-based peer discovery mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99951—File or database maintenance
- Y10S707/99952—Coherency, e.g. same view to multiple users
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/912—Applications of a database
- Y10S707/913—Multimedia
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liang et al. | Pollution in P2P file sharing systems | |
| Christin et al. | Content availability, pollution and poisoning in file sharing peer-to-peer networks | |
| Liang et al. | The Index Poisoning Attack in P2P File Sharing Systems. | |
| Pucha et al. | Exploiting Similarity for Multi-Source Downloads Using File Handprints. | |
| Pouwelse et al. | A measurement study of the bittorrent peer-to-peer file-sharing system | |
| Balduf et al. | Monitoring data requests in decentralized data storage systems: A case study of IPFS | |
| US8204915B2 (en) | Apparatus and method for generating a database that maps metadata to P2P content | |
| Chu et al. | Availability and locality measurements of peer-to-peer file systems | |
| Sripanidkulchai et al. | Efficient content location using interest-based locality in peer-to-peer systems | |
| Thommes et al. | Epidemiological models of peer-to-peer viruses and pollution | |
| US20030195852A1 (en) | System, method, apparatus and means for protecting digital content | |
| EP1459207A2 (en) | Fingerprint database updating method, client and server | |
| KR100916162B1 (en) | Fingerprint database management method and system | |
| AU2008262281A1 (en) | System and method for advertising on a peer-to-peer network | |
| Wolchok et al. | Crawling {BitTorrent}{DHTs} for Fun and Profit | |
| Ruffo et al. | A peer-to-peer recommender system based on spontaneous affinities | |
| Cohen et al. | A case for associative peer to peer overlays | |
| Keizer et al. | Ditto: Towards decentralised similarity search for web3 services | |
| Xi et al. | Pollution in P2P File Sharing Systems | |
| GB2422214A (en) | A traffic filter for a decentralised peer-to-peer network | |
| Jia et al. | Spam characterization and detection in peer-to-peer file-sharing systems | |
| Jia | Cost-effective spam detection in P2P file-sharing systems | |
| Klemm et al. | Relating Query Popularity and File Replication in the Gnutella Peer-to-Peer Network. | |
| Cai et al. | A holistic mechanism against file pollution in peer-to-peer networks | |
| Soldani | Peer-to-peer behaviour detection by TCP flows analysis |