Monitoring and Controlling Content Access in KAD

We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Cholez, T, Chrisment, I, Festor, O
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Cholez, T
Chrisment, I
Festor, O
description We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.
doi_str_mv 10.1109/ICC.2010.5502179
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5502179</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5502179</ieee_id><sourcerecordid>5502179</sourcerecordid><originalsourceid>FETCH-LOGICAL-i217t-3cd9121911fb8e46afdb937090395cb6be3abc996cabaf1d049338e75f992a7b3</originalsourceid><addsrcrecordid>eNpFUE1LxDAUjB8Ldlfvgpf-ga7v5SVp37HUVRdXvCh4W5I0lUpNpe3Ff28XFzzNDMMMwwhxjbBGBL7dVtVawqy0Bok5n4glKqmUUUDvpyJBpiLDoqCzf0Pi-WzMgYwM5AuRFJgZxVrlF2I5jp8AWjJhIuC5j-3UD238SG2s06qP09B33UEfeIhTWnofxjFtY_pU3l2KRWO7MVwdcSXe7jev1WO2e3nYVuUua-eNU0a-ZpTIiI0rgjK2qR1TDgzE2jvjAlnnmY23zjZYg2KiIuS6YZY2d7QSN3-9bQhh_z20X3b42R8voF-jEUgf</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Monitoring and Controlling Content Access in KAD</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Cholez, T ; Chrisment, I ; Festor, O</creator><creatorcontrib>Cholez, T ; Chrisment, I ; Festor, O</creatorcontrib><description>We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.</description><identifier>ISSN: 1550-3607</identifier><identifier>ISBN: 1424464021</identifier><identifier>ISBN: 9781424464029</identifier><identifier>EISSN: 1938-1883</identifier><identifier>EISBN: 142446403X</identifier><identifier>EISBN: 9781424464043</identifier><identifier>EISBN: 1424464048</identifier><identifier>EISBN: 9781424464036</identifier><identifier>DOI: 10.1109/ICC.2010.5502179</identifier><identifier>LCCN: 81-649547</identifier><language>eng</language><publisher>IEEE</publisher><subject>Advertising ; Communication system control ; Communications Society ; Crawlers ; IP networks ; Law enforcement ; Monitoring ; Peer to peer computing ; Protection ; Routing</subject><ispartof>2010 IEEE International Conference on Communications, 2010, p.1-6</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5502179$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5502179$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cholez, T</creatorcontrib><creatorcontrib>Chrisment, I</creatorcontrib><creatorcontrib>Festor, O</creatorcontrib><title>Monitoring and Controlling Content Access in KAD</title><title>2010 IEEE International Conference on Communications</title><addtitle>ICC</addtitle><description>We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.</description><subject>Advertising</subject><subject>Communication system control</subject><subject>Communications Society</subject><subject>Crawlers</subject><subject>IP networks</subject><subject>Law enforcement</subject><subject>Monitoring</subject><subject>Peer to peer computing</subject><subject>Protection</subject><subject>Routing</subject><issn>1550-3607</issn><issn>1938-1883</issn><isbn>1424464021</isbn><isbn>9781424464029</isbn><isbn>142446403X</isbn><isbn>9781424464043</isbn><isbn>1424464048</isbn><isbn>9781424464036</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUE1LxDAUjB8Ldlfvgpf-ga7v5SVp37HUVRdXvCh4W5I0lUpNpe3Ff28XFzzNDMMMwwhxjbBGBL7dVtVawqy0Bok5n4glKqmUUUDvpyJBpiLDoqCzf0Pi-WzMgYwM5AuRFJgZxVrlF2I5jp8AWjJhIuC5j-3UD238SG2s06qP09B33UEfeIhTWnofxjFtY_pU3l2KRWO7MVwdcSXe7jev1WO2e3nYVuUua-eNU0a-ZpTIiI0rgjK2qR1TDgzE2jvjAlnnmY23zjZYg2KiIuS6YZY2d7QSN3-9bQhh_z20X3b42R8voF-jEUgf</recordid><startdate>20100101</startdate><enddate>20100101</enddate><creator>Cholez, T</creator><creator>Chrisment, I</creator><creator>Festor, O</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>20100101</creationdate><title>Monitoring and Controlling Content Access in KAD</title><author>Cholez, T ; Chrisment, I ; Festor, O</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i217t-3cd9121911fb8e46afdb937090395cb6be3abc996cabaf1d049338e75f992a7b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Advertising</topic><topic>Communication system control</topic><topic>Communications Society</topic><topic>Crawlers</topic><topic>IP networks</topic><topic>Law enforcement</topic><topic>Monitoring</topic><topic>Peer to peer computing</topic><topic>Protection</topic><topic>Routing</topic><toplevel>online_resources</toplevel><creatorcontrib>Cholez, T</creatorcontrib><creatorcontrib>Chrisment, I</creatorcontrib><creatorcontrib>Festor, O</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cholez, T</au><au>Chrisment, I</au><au>Festor, O</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Monitoring and Controlling Content Access in KAD</atitle><btitle>2010 IEEE International Conference on Communications</btitle><stitle>ICC</stitle><date>2010-01-01</date><risdate>2010</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1550-3607</issn><eissn>1938-1883</eissn><isbn>1424464021</isbn><isbn>9781424464029</isbn><eisbn>142446403X</eisbn><eisbn>9781424464043</eisbn><eisbn>1424464048</eisbn><eisbn>9781424464036</eisbn><abstract>We propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2010.5502179</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-3607
ispartof 2010 IEEE International Conference on Communications, 2010, p.1-6
issn 1550-3607
1938-1883
language eng
recordid cdi_ieee_primary_5502179
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Advertising
Communication system control
Communications Society
Crawlers
IP networks
Law enforcement
Monitoring
Peer to peer computing
Protection
Routing
title Monitoring and Controlling Content Access in KAD
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T16%3A58%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Monitoring%20and%20Controlling%20Content%20Access%20in%20KAD&rft.btitle=2010%20IEEE%20International%20Conference%20on%20Communications&rft.au=Cholez,%20T&rft.date=2010-01-01&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1550-3607&rft.eissn=1938-1883&rft.isbn=1424464021&rft.isbn_list=9781424464029&rft_id=info:doi/10.1109/ICC.2010.5502179&rft_dat=%3Cieee_6IE%3E5502179%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=142446403X&rft.eisbn_list=9781424464043&rft.eisbn_list=1424464048&rft.eisbn_list=9781424464036&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5502179&rfr_iscdi=true