Monitoring and Controlling Content Access in KAD
We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Cholez, T Chrisment, I Festor, O |
description | We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network. |
doi_str_mv | 10.1109/ICC.2010.5502179 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5502179</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5502179</ieee_id><sourcerecordid>5502179</sourcerecordid><originalsourceid>FETCH-LOGICAL-i217t-3cd9121911fb8e46afdb937090395cb6be3abc996cabaf1d049338e75f992a7b3</originalsourceid><addsrcrecordid>eNpFUE1LxDAUjB8Ldlfvgpf-ga7v5SVp37HUVRdXvCh4W5I0lUpNpe3Ff28XFzzNDMMMwwhxjbBGBL7dVtVawqy0Bok5n4glKqmUUUDvpyJBpiLDoqCzf0Pi-WzMgYwM5AuRFJgZxVrlF2I5jp8AWjJhIuC5j-3UD238SG2s06qP09B33UEfeIhTWnofxjFtY_pU3l2KRWO7MVwdcSXe7jev1WO2e3nYVuUua-eNU0a-ZpTIiI0rgjK2qR1TDgzE2jvjAlnnmY23zjZYg2KiIuS6YZY2d7QSN3-9bQhh_z20X3b42R8voF-jEUgf</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Monitoring and Controlling Content Access in KAD</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Cholez, T ; Chrisment, I ; Festor, O</creator><creatorcontrib>Cholez, T ; Chrisment, I ; Festor, O</creatorcontrib><description>We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.</description><identifier>ISSN: 1550-3607</identifier><identifier>ISBN: 1424464021</identifier><identifier>ISBN: 9781424464029</identifier><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 142446403X</identifier><identifier>EISBN: 9781424464043</identifier><identifier>EISBN: 1424464048</identifier><identifier>EISBN: 9781424464036</identifier><identifier>DOI: 10.1109/ICC.2010.5502179</identifier><identifier>LCCN: 81-649547</identifier><language>eng</language><publisher>IEEE</publisher><subject>Advertising ; Communication system control ; Communications Society ; Crawlers ; IP networks ; Law enforcement ; Monitoring ; Peer to peer computing ; Protection ; Routing</subject><ispartof>2010 IEEE International Conference on Communications, 2010, p.1-6</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5502179$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5502179$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cholez, T</creatorcontrib><creatorcontrib>Chrisment, I</creatorcontrib><creatorcontrib>Festor, O</creatorcontrib><title>Monitoring and Controlling Content Access in KAD</title><title>2010 IEEE International Conference on Communications</title><addtitle>ICC</addtitle><description>We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.</description><subject>Advertising</subject><subject>Communication system control</subject><subject>Communications Society</subject><subject>Crawlers</subject><subject>IP networks</subject><subject>Law enforcement</subject><subject>Monitoring</subject><subject>Peer to peer computing</subject><subject>Protection</subject><subject>Routing</subject><issn>1550-3607</issn><issn>1938-1883</issn><isbn>1424464021</isbn><isbn>9781424464029</isbn><isbn>142446403X</isbn><isbn>9781424464043</isbn><isbn>1424464048</isbn><isbn>9781424464036</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUE1LxDAUjB8Ldlfvgpf-ga7v5SVp37HUVRdXvCh4W5I0lUpNpe3Ff28XFzzNDMMMwwhxjbBGBL7dVtVawqy0Bok5n4glKqmUUUDvpyJBpiLDoqCzf0Pi-WzMgYwM5AuRFJgZxVrlF2I5jp8AWjJhIuC5j-3UD238SG2s06qP09B33UEfeIhTWnofxjFtY_pU3l2KRWO7MVwdcSXe7jev1WO2e3nYVuUua-eNU0a-ZpTIiI0rgjK2qR1TDgzE2jvjAlnnmY23zjZYg2KiIuS6YZY2d7QSN3-9bQhh_z20X3b42R8voF-jEUgf</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>Cholez, T</creator><creator>Chrisment, I</creator><creator>Festor, O</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20100101</creationdate><title>Monitoring and Controlling Content Access in KAD</title><author>Cholez, T ; Chrisment, I ; Festor, O</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i217t-3cd9121911fb8e46afdb937090395cb6be3abc996cabaf1d049338e75f992a7b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Advertising</topic><topic>Communication system control</topic><topic>Communications Society</topic><topic>Crawlers</topic><topic>IP networks</topic><topic>Law enforcement</topic><topic>Monitoring</topic><topic>Peer to peer computing</topic><topic>Protection</topic><topic>Routing</topic><toplevel>online_resources</toplevel><creatorcontrib>Cholez, T</creatorcontrib><creatorcontrib>Chrisment, I</creatorcontrib><creatorcontrib>Festor, O</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cholez, T</au><au>Chrisment, I</au><au>Festor, O</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Monitoring and Controlling Content Access in KAD</atitle><btitle>2010 IEEE International Conference on Communications</btitle><stitle>ICC</stitle><date>2010-01-01</date><risdate>2010</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1550-3607</issn><eissn>1938-1883</eissn><isbn>1424464021</isbn><isbn>9781424464029</isbn><eisbn>142446403X</eisbn><eisbn>9781424464043</eisbn><eisbn>1424464048</eisbn><eisbn>9781424464036</eisbn><abstract>We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2010.5502179</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-3607 |
ispartof | 2010 IEEE International Conference on Communications, 2010, p.1-6 |
issn | 1550-3607 1938-1883 |
language | eng |
recordid | cdi_ieee_primary_5502179 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Advertising Communication system control Communications Society Crawlers IP networks Law enforcement Monitoring Peer to peer computing Protection Routing |
title | Monitoring and Controlling Content Access in KAD |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T16%3A58%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Monitoring%20and%20Controlling%20Content%20Access%20in%20KAD&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Communications&rft.au=Cholez,%20T&rft.date=2010-01-01&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1550-3607&rft.eissn=1938-1883&rft.isbn=1424464021&rft.isbn_list=9781424464029&rft_id=info:doi/10.1109/ICC.2010.5502179&rft_dat=%3Cieee_6IE%3E5502179%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=142446403X&rft.eisbn_list=9781424464043&rft.eisbn_list=1424464048&rft.eisbn_list=9781424464036&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5502179&rfr_iscdi=true |