hidden
Image Database Export Citations

Menu:

Securing Peer-to-Peer Content Sharing Systems through Detecting Pollution Behaviors

Show simple item record

dc.contributor.author Chang, Eric
dc.date.accessioned 2017-03-14T18:45:24Z
dc.date.available 2017-03-14T18:45:24Z
dc.date.issued 2017 en_US
dc.identifier.uri https://hdl.handle.net/10535/10270
dc.description.abstract Peer-to-Peer (P2P) content sharing systems have experienced an explosive growth, and now dominate large fractions of both the Internet users and traffic volume. However, due to the self-organization and self-maintenance nature of P2P overlay networks, these systems are vulnerable to the content pollution, where attackers aggressively inject a large quantity of polluted content into the systems. Such polluted content could largely reduce the availability of the original authentic content, thus enormously shattering genuine users' confidence in the P2P content sharing systems. In this report, we present a survey and comparison of various models on defending against content pollution. We categorize the various schemes into some groups and discuss the application-level model performance of each group. At end of the report, we present some future aspects on defending against content pollution; moreover, some important and useful evaluation results are in the report. en_US
dc.language English en_US
dc.relation.ispartofseries Working Paper en_US
dc.subject Research en_US
dc.subject.classification Computer Science en_US
dc.title Securing Peer-to-Peer Content Sharing Systems through Detecting Pollution Behaviors en_US
dc.type Working Paper en_US
dc.type.methodology Summary Report en_US
dc.publisher.workingpaperseries Yale University en_US
dc.coverage.country USA en_US
dc.subject.sector Information & Knowledge en_US


Files in this item

Files Size Format View xmlui.dri2xhtml.METS-1.0.item-files-description
p2p-reputation.pdf 1.047Mb PDF View/Open Main article

This item appears in the following document type(s)

Show simple item record