نتایج جستجو برای: bittorrent

تعداد نتایج: 914  

2010
Teemu Rautio Mika Ylianttila

This thesis includes the design, implementation and evaluation of a multiaccess peer-to-peer content distribution prototype based on BitTorrent. The prototype is designed to enhance the current BitTorrent in terms of download duration and traffic locality in an overlapping multiaccess environment. The thesis begins with related state of the art including future ways of networking as well as cur...

Journal: :Computer Networks 2009
Nazareno Andrade Elizeu Santos-Neto Francisco Vilar Brasileiro Matei Ripeanu

BitTorrent is a widely popular peer-to-peer content distribution protocol. Unveiling patterns of resource demand and supply in its usage is paramount to inform operators and designers of BitTorrent and of future content distribution systems. This study examines three BitTorrent content-sharing communities regarding resource demand and supply. The resulting characterization is significantly broa...

Journal: :CoRR 2010
Stevens Le Blond Arnaud Legout Fabrice Le Fessant Walid Dabbous Mohamed Ali Kâafar

This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We sho...

Journal: :Electronics 2022

A Distributed Denial-of-Service attack uses multiple sources operating in concert to a network or site. typical DDoS flood on website targets web server with valid requests, exhausting the server’s resources. The participants this are usually compromised/infected computers controlled by attackers. There several variations of kind attack, and torrent index poisoning is one. (DDoS) using poisonin...

Journal: :CoRR 2010
Liang Wang Jussi Kangasharju

Evaluation of large-scale network systems and applications is usually done in one of three ways: simulations, real deployment on Internet, or on an emulated network testbed such as a cluster. Simulations can study very large systems but often abstract out many practical details, whereas real world tests are often quite small, on the order of a few hundred nodes at most, but have very realistic ...

2011
Yong-Ju Lee Hag-Young Kim

BitTorrent is a convenient tool for downloading and distributing very large files. This feature throws us a clue if virtual machine images in distributed environments are possible to move from one site to another. Users also gain the ability to have their computer that follows them rather than be tied to one physical location. In this paper, we explore how the BitTorrent protocol can be applied...

2008
Imre Kelényi Péter Ekler Bertalan Forstner

File-sharing on mobile phones is becoming widespread. With the recent introduction of the first mobile BitTorrent clients, any mobile user can access content shared via BitTorrent. We created two BitTorrent clients, one for Symbian OS, and the other for Java-enabled mobile devices. In this paper we overview their key characteristics, compare their differences and discuss the issues we faced dur...

Journal: :CoRR 2011
Stevens Le Blond Pere Manils Chaabane Abdelberi Mohamed Ali Kâafar Claude Castelluccia Arnaud Legout Walid Dabbous

Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in pra...

Journal: :ACM SIGMETRICS Performance Evaluation Review 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید