Sciweavers

28 search results - page 1 / 6
» Detecting Malicious Peers in Overlay Multicast Streaming
Sort
View
LCN
2006
IEEE
13 years 11 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
13 years 11 months ago
SIM: Scalable Island Multicast for Peer-to-Peer Media Streaming
Despite the fact that global multicast is still not possible in today’s Internet, many local networks are already multicastcapable (the so-called multicast “islands”). Howev...
Xing Jin, Kan-Leung Cheng, S.-H. Gary Chan
GLOBECOM
2006
IEEE
13 years 11 months ago
Building A Monitoring Overlay for Peer-to-Peer Streaming
— Current peer-to-peer (P2P) streaming systems often assume that nodes are cooperative to upload and download data. However, in the open environment of the Internet, this is not ...
Xing Jin, Qiuyan Xia, S.-H. Gary Chan
TISSEC
2008
100views more  TISSEC 2008»
13 years 4 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
INFOCOM
2010
IEEE
13 years 2 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...