Sciweavers

28 search results - page 3 / 6
» Detecting Malicious Peers in Overlay Multicast Streaming
Sort
View
P2P
2006
IEEE
119views Communications» more  P2P 2006»
13 years 11 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
ICMCS
2005
IEEE
136views Multimedia» more  ICMCS 2005»
13 years 11 months ago
Gridmedia: A Multi-Sender Based Peer-to-Peer Multicast System for Video Streaming
We present a novel single source peer-to-peer multicast architecture called GridMedia which mainly consists of 1) multi-sender based overlay multicast protocol (MSOMP) and 2) mult...
Meng Zhang, Yun Tang, Li Zhao, Jian-Guang Luo, Shi...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 days ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
NOSSDAV
2004
Springer
13 years 11 months ago
A framework for architecting peer-to-peer receiver-driven overlays
This paper presents a simple and scalable framework for architecting peer-to-peer overlays called Peer-to-peer Receiverdriven Overlay (or PRO). PRO is designed for non-interactive...
Reza Rejaie, Shad Stafford
ICMCS
2006
IEEE
141views Multimedia» more  ICMCS 2006»
13 years 11 months ago
Ripple-Stream: Safeguarding P2P Streaming Against Dos Attacks
— Compared with file-sharing and distributed hash table (DHT) network, P2P streaming is more vulnerable to denial of service (DoS) attacks because of its high bandwidth demand a...
Wenjie Wang, Yongqiang Xiong, Qian Zhang, Sugih Ja...