<--- Back to Details
First PageDocument Content
File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack
Date: 2014-09-26 08:36:29
File sharing networks
Distributed data storage
File sharing
Denial-of-service attacks
BitTorrent
Kad network
EMule
Peer-to-peer
Kademlia
Distributed hash table
EDonkey network
Denial-of-service attack

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Download Document from Source Website

File Size: 403,50 KB

Share Document on Facebook

Similar Documents

DATASHEET| 1 DATASHEET HEDVIG DISTRIBUTED STORAGE PLATFORM Hedvig’s software-defined storage solution provides the flexibility needed for rapidly changing data, application, and user requirements in private, hybrid, an

DATASHEET| 1 DATASHEET HEDVIG DISTRIBUTED STORAGE PLATFORM Hedvig’s software-defined storage solution provides the flexibility needed for rapidly changing data, application, and user requirements in private, hybrid, an

DocID: 1uRqj - View Document

BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing Yuvraj Agarwal, Rajesh Gupta, Daisuke Komaki, Thomas Weng Department of Computer Science and Engineering, UCSD  {yuv

BuildingDepot: An Extensible and Distributed Architecture for Building Data Storage, Access and Sharing Yuvraj Agarwal, Rajesh Gupta, Daisuke Komaki, Thomas Weng Department of Computer Science and Engineering, UCSD {yuv

DocID: 1uuFR - View Document

Ceph Software Defined Storage Appliance Unified distributed data storage cluster with self-healing, auto-balancing and no single point of failure Lowest power consumption in the industry: 70% power saving Infinite Scale

Ceph Software Defined Storage Appliance Unified distributed data storage cluster with self-healing, auto-balancing and no single point of failure Lowest power consumption in the industry: 70% power saving Infinite Scale

DocID: 1utGb - View Document

DATABASE MANAGEMENT SYSTEMS SOLUTIONS MANUAL THIRD EDITION  Raghu Ramakrishnan

DATABASE MANAGEMENT SYSTEMS SOLUTIONS MANUAL THIRD EDITION Raghu Ramakrishnan

DocID: 1rsHj - View Document

Exercise 4: Extreme Democracy Task 1: Everyone Gets exactly one Vote. . . The goal of this exercise is to prove correct the asynchronous safe broadcast algorithm by Bracha. It tolerates f < n/3 Byzantine faults, so we wi

Exercise 4: Extreme Democracy Task 1: Everyone Gets exactly one Vote. . . The goal of this exercise is to prove correct the asynchronous safe broadcast algorithm by Bracha. It tolerates f < n/3 Byzantine faults, so we wi

DocID: 1rrE3 - View Document