International audienceWe propose a new distributed architecture that aims to investigate and control the spread of contents in the KAD P2P network through the indexation of keywords and files. Our solution can control the DHT at a local level with a new strategy bypassing the Sybil attack protections inserted in KAD. For the targeted DHT entries, we can monitor all requests emitted by the peers, from the initial content publication or search, to the final download request of fake files, assessing accurately peers interest to access it. We demonstrate the efficiency of our approach through experiments performed on the worldwide KAD network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing n...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
International audiencePeer-to-peer (P2P) systems are widely used to exchange content over the Intern...
International audienceIn this short paper, we present a solution to fight against paedophile activit...
International audienceSeveral large scale P2P networks operating on the Internet are based on a Dist...
The purpose of this thesis is to design and implement new monitoring solutions which are able to dea...
International audienceWe present a new solution to protect the widely deployed KAD DHT against local...
International audienceContent pollution is one of the major issues affecting P2P file sharing networ...
International audienceThe current wave of evolution that leads BitTorrent towards a fully decentrali...
This article is an editorial note submitted to CCR. It has NOT been peer reviewed. Authors take full...
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capab...
ftgroup.com Characterizing peer-to-peer overlays is crucial for under-standing their impact on servi...
Today peer-to-peer (P2P) file sharing networks help tens of millions of users to share contents on t...
Today peer-to-peer (P2P) file sharing networks help tens of millions of users to share contents on t...
Abstract — P2P file-sharing systems have indexes, which users search to find locations of desired ti...
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing n...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
International audiencePeer-to-peer (P2P) systems are widely used to exchange content over the Intern...
International audienceIn this short paper, we present a solution to fight against paedophile activit...
International audienceSeveral large scale P2P networks operating on the Internet are based on a Dist...
The purpose of this thesis is to design and implement new monitoring solutions which are able to dea...
International audienceWe present a new solution to protect the widely deployed KAD DHT against local...
International audienceContent pollution is one of the major issues affecting P2P file sharing networ...
International audienceThe current wave of evolution that leads BitTorrent towards a fully decentrali...
This article is an editorial note submitted to CCR. It has NOT been peer reviewed. Authors take full...
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capab...
ftgroup.com Characterizing peer-to-peer overlays is crucial for under-standing their impact on servi...
Today peer-to-peer (P2P) file sharing networks help tens of millions of users to share contents on t...
Today peer-to-peer (P2P) file sharing networks help tens of millions of users to share contents on t...
Abstract — P2P file-sharing systems have indexes, which users search to find locations of desired ti...
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing n...
Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to d...
International audiencePeer-to-peer (P2P) systems are widely used to exchange content over the Intern...