International audienceSeveral large scale P2P networks operating on the Internet are based on a Distributed Hash Table. These networks offer valuable services, but they all suffer from a critical issue allowing malicious nodes to be inserted in specific places on the DHT for undesirable purposes (monitoring, distributed denial of service, pollution, etc.). While several attacks and attack scenarios have been documented, few studies have measured the actual deployment of such attacks and none of the documented countermeasures have been tested for compatibility with an already deployed network. In this article, we focus on the KAD network. Based on large scale monitoring campaigns, we show that the world-wide deployed KAD network suffers larg...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
Abstract—Kademlia-based DHT has been deployed in many P2P applications and it is reported that there...
International audienceSeveral large scale P2P networks operating on the Internet are based on a Dist...
The purpose of this thesis is to design and implement new monitoring solutions which are able to dea...
International audienceWe present a new solution to protect the widely deployed KAD DHT against local...
International audienceWe propose a new distributed architecture that aims to investigate and control...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
International audienceIn this short paper, we present a solution to fight against paedophile activit...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capab...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
International audienceContent pollution is one of the major issues affecting P2P file sharing networ...
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
International audienceThe current wave of evolution that leads BitTorrent towards a fully decentrali...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
Abstract—Kademlia-based DHT has been deployed in many P2P applications and it is reported that there...
International audienceSeveral large scale P2P networks operating on the Internet are based on a Dist...
The purpose of this thesis is to design and implement new monitoring solutions which are able to dea...
International audienceWe present a new solution to protect the widely deployed KAD DHT against local...
International audienceWe propose a new distributed architecture that aims to investigate and control...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
International audienceIn this short paper, we present a solution to fight against paedophile activit...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capab...
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although ...
International audienceContent pollution is one of the major issues affecting P2P file sharing networ...
We show that malicious nodes in a peer-to-peer system may impact the external Internet environment, ...
International audienceThe current wave of evolution that leads BitTorrent towards a fully decentrali...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
Abstract—Kademlia-based DHT has been deployed in many P2P applications and it is reported that there...