On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis

Interactive networks are vulnerable to various attacks due to the existence of malicious nodes which do not comply with the network protocol so as to achieve their own purposes. For example, in a Peer-To-Peer (P2P) streaming system, since each peer needs to participate in uploading data to other peers, malicious peers may choose to upload bogus data so as to damage the playback and degrade the watching experience of normal peers in the system. This is known as pollution attack in P2P networks, and it can cause severe impact to the performance of P2P streaming systems.

Provided by: Chinese University of Hong Kong Topic: Networking Date Added: Nov 2011 Format: PDF

Find By Topic