Abstract Compared with le-sharing and distributed hash table (DHT) network, P2P streaming is more vul-nerable to denial of service (DoS) attacks because of its high bandwidth demand and stringent time requirement. This paper studies the design of DoS resilient stream-ing networks using credit systems. We propose a novel frameworkripple-streamto improve DoS resilience of P2P streaming. Ripple-stream leverages existing credit sys-tems to introduce credit constraints in overlay construction such that malicious nodes are pushed to the fringe of over-lay networks. Combining credit constraints with overlay optimization techniques, ripple-stream can achieve both DoS resilience and overlay efciency. Our evaluations show that ripple-stream can effe...
Online streaming is a popular service for data-intensive applications such as video streaming. P2P-b...
Part 13: Short PapersInternational audienceNowadays, peer-to-peer (P2P) streaming systems have becom...
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate attacks due to...
Abstract — Using a P2P approach for live multimedia streaming applications in general offers the pro...
network demonstrates its potential to deliver quality media streams to a large audience. However, P2...
We present a flexible framework for throttling attackers in peer-to-peer media streaming systems. In...
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed a...
Media content distribution is a widely useful tool that has seen increasing popularity driven by the...
Abstract—Researchers show that network coding can greatly improve the quality of service in P2P live...
UnrestrictedCompare to traditional Client/Server architecture, Peer-to-peer (P2P) network is especia...
Um die ständig wachsenden Anforderungen zur Übertragung von Live Video Streams im Internet zu erfüll...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
We present a streaming protocol that addresses the security issues pertaining to BitTorrent like P2P...
Current peer-to-peer (P2P) streaming systems often assume that nodes are cooperative to upload and d...
Online streaming is a popular service for data-intensive applications such as video streaming. P2P-b...
Part 13: Short PapersInternational audienceNowadays, peer-to-peer (P2P) streaming systems have becom...
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate attacks due to...
Abstract — Using a P2P approach for live multimedia streaming applications in general offers the pro...
network demonstrates its potential to deliver quality media streams to a large audience. However, P2...
We present a flexible framework for throttling attackers in peer-to-peer media streaming systems. In...
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed a...
Media content distribution is a widely useful tool that has seen increasing popularity driven by the...
Abstract—Researchers show that network coding can greatly improve the quality of service in P2P live...
UnrestrictedCompare to traditional Client/Server architecture, Peer-to-peer (P2P) network is especia...
Um die ständig wachsenden Anforderungen zur Übertragung von Live Video Streams im Internet zu erfüll...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
We present a streaming protocol that addresses the security issues pertaining to BitTorrent like P2P...
Current peer-to-peer (P2P) streaming systems often assume that nodes are cooperative to upload and d...
Online streaming is a popular service for data-intensive applications such as video streaming. P2P-b...
Part 13: Short PapersInternational audienceNowadays, peer-to-peer (P2P) streaming systems have becom...
Peer-to-Peer (P2P) live video streaming systems are known to suffer from intermediate attacks due to...