Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Overlay topology optimization and se...
~
Liu, Yunhao.
Linked to FindBook
Google Book
Amazon
博客來
Overlay topology optimization and security studies in peer-to-peer systems.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Overlay topology optimization and security studies in peer-to-peer systems./
Author:
Liu, Yunhao.
Description:
147 p.
Notes:
Source: Dissertation Abstracts International, Volume: 65-09, Section: B, page: 4671.
Contained By:
Dissertation Abstracts International65-09B.
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3146065
ISBN:
0496050400
Overlay topology optimization and security studies in peer-to-peer systems.
Liu, Yunhao.
Overlay topology optimization and security studies in peer-to-peer systems.
- 147 p.
Source: Dissertation Abstracts International, Volume: 65-09, Section: B, page: 4671.
Thesis (Ph.D.)--Michigan State University, 2004.
Current and future Internet and distributed systems rely on both centralized client-server model and decentralized peer-to-peer (P2P) model. P2P model is an emerging technology aiming to effectively utilize and manage increasingly large and globally distributed information and computing resources, complementing the available client-server services. In order to truly adopt the P2P model for deploying large-scale Internet applications, and timely merge this model as an indispensable component in the main stream of distributed computing technology, we must address several major technical challenges including the efficiency of overlay networks, cost-effective P2P information search, and privacy and security protection of peers. This dissertation focuses on addressing two critical issues. The first issue is topology mismatch problem between P2P overlay networks and the underlying physical networks in unstructured P2P systems. Addressing topology mismatch problem can fundamentally improve overall search performance of P2P systems. We demonstrate the seriousness of the topology mismatch problem, and define an optimal overlay problem that is proved to be a NP-hard problem. We then develop several effective schemes and algorithms to alleviate the topology mismatch problem. Our proposed algorithms are completely distributed, scalable and effective. Simulation studies show that the total traffic and response time of the queries can be significantly reduced by these schemes without shrinking the search scope. The second issue is overlay distributed denial-of-service (DDoS) attack in P2P systems. Most previous security techniques protect networks from network-layer DDoS attacks, but cannot be applied to overlay DDoS attacks. We propose a distributed and scalable method, DD-POLICE, to detect malicious nodes in order to defend P2P systems from overlay flooding-based DDoS attacks. We show the effectiveness of DD-POLICE by simulation studies and implementation on Gnutella 0.6 protocols. We believe that widely employing these proposed approaches will make P2P systems more scalable and robust.
ISBN: 0496050400Subjects--Topical Terms:
626642
Computer Science.
Overlay topology optimization and security studies in peer-to-peer systems.
LDR
:02962nmm 2200265 4500
001
1839346
005
20050627125022.5
008
130614s2004 eng d
020
$a
0496050400
035
$a
(UnM)AAI3146065
035
$a
AAI3146065
040
$a
UnM
$c
UnM
100
1
$a
Liu, Yunhao.
$3
1927742
245
1 0
$a
Overlay topology optimization and security studies in peer-to-peer systems.
300
$a
147 p.
500
$a
Source: Dissertation Abstracts International, Volume: 65-09, Section: B, page: 4671.
500
$a
Adviser: Li Xiao.
502
$a
Thesis (Ph.D.)--Michigan State University, 2004.
520
$a
Current and future Internet and distributed systems rely on both centralized client-server model and decentralized peer-to-peer (P2P) model. P2P model is an emerging technology aiming to effectively utilize and manage increasingly large and globally distributed information and computing resources, complementing the available client-server services. In order to truly adopt the P2P model for deploying large-scale Internet applications, and timely merge this model as an indispensable component in the main stream of distributed computing technology, we must address several major technical challenges including the efficiency of overlay networks, cost-effective P2P information search, and privacy and security protection of peers. This dissertation focuses on addressing two critical issues. The first issue is topology mismatch problem between P2P overlay networks and the underlying physical networks in unstructured P2P systems. Addressing topology mismatch problem can fundamentally improve overall search performance of P2P systems. We demonstrate the seriousness of the topology mismatch problem, and define an optimal overlay problem that is proved to be a NP-hard problem. We then develop several effective schemes and algorithms to alleviate the topology mismatch problem. Our proposed algorithms are completely distributed, scalable and effective. Simulation studies show that the total traffic and response time of the queries can be significantly reduced by these schemes without shrinking the search scope. The second issue is overlay distributed denial-of-service (DDoS) attack in P2P systems. Most previous security techniques protect networks from network-layer DDoS attacks, but cannot be applied to overlay DDoS attacks. We propose a distributed and scalable method, DD-POLICE, to detect malicious nodes in order to defend P2P systems from overlay flooding-based DDoS attacks. We show the effectiveness of DD-POLICE by simulation studies and implementation on Gnutella 0.6 protocols. We believe that widely employing these proposed approaches will make P2P systems more scalable and robust.
590
$a
School code: 0128.
650
4
$a
Computer Science.
$3
626642
690
$a
0984
710
2 0
$a
Michigan State University.
$3
676168
773
0
$t
Dissertation Abstracts International
$g
65-09B.
790
1 0
$a
Xiao, Li,
$e
advisor
790
$a
0128
791
$a
Ph.D.
792
$a
2004
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3146065
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9188860
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login