2016 IEEE 14th International Conference on Industrial Informatics (INDIN) 2016
DOI: 10.1109/indin.2016.7819275
|View full text |Cite
|
Sign up to set email alerts
|

LDEPTH: A low diameter hierarchical P2P network architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
3

Year Published

2017
2017
2020
2020

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 10 publications
0
11
0
3
Order By: Relevance
“…In most of the structured P2P networks, nodes pick random IDs when they enter the network and the P2P system does not monitor the ID assignments, which allows an attacker to obtain as many as IDs it desires and use them to compromise the network. However, Linear Diophantine Equation (LDE)-based P2P limits the number of logical addresses per single resource type [19]. This technique prevents users from acquiring various fake identities.…”
Section: Attacks On P2p Routing Protocolsmentioning
confidence: 99%
“…In most of the structured P2P networks, nodes pick random IDs when they enter the network and the P2P system does not monitor the ID assignments, which allows an attacker to obtain as many as IDs it desires and use them to compromise the network. However, Linear Diophantine Equation (LDE)-based P2P limits the number of logical addresses per single resource type [19]. This technique prevents users from acquiring various fake identities.…”
Section: Attacks On P2p Routing Protocolsmentioning
confidence: 99%
“…Este mecanismo proposto baseia-se em uma pontuação de confiança em cada operação realizada obtenção ou alocação de dados na rede DHT. Esta abordagem,é desvantajosa, visto que um nó pode ser malicioso, mas se comportar como um nó confiável na rede [Rahimi et al 2016] e em determinado momento denegrir o comportamento da rede. Diante disso, até que este nó se torne não confiável poderá ainda se comunicar com os demais participantes.…”
Section: Trabalhos Relacionadosunclassified
“…As redes baseadas em distributed hash table (DHT) estão cada vez mais em evidência para implementação de diversos serviços [Rahimi et al 2016]. Esta atenção especial se deve as suas características como tolerância a falhas, alta disponibilidade, escalabilidade, resiliência entre outros.…”
Section: Introductionunclassified
“…To give an example which will be expanded later. Most Intrusion Detection Systems (specifically referring to Network Intrusion Detection Systems) like Snort or Suricata rely on catching adversarial activity to be trained against that activity [7,8]. What happens if the activity is not caught though?…”
Section: An Arms Racementioning
confidence: 99%