Mapping the AS membership with the peerId, p.59 ,
121 6.3.2 The Distributed Hash Table algorithm 121 6.3.3 Description of the architecture, Discussion, p.128 ,
A cooperative agent approach based on a peer-to-peer model for DDoS attacks detection and reaction, Proceedings of NAEC 2008, 2008. ,
A collaborative peer-to-peer architecture to defend against DDoS attacks, 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008. ,
DOI : 10.1109/LCN.2008.4664200
Une Architecture Peer-to- Peer de Défense Contre les Attaques DDoS, Proceedings of SAR-SSI 2008, 2008. ,
Decentralized Alerts Correlation Approach for DDoS Intrusion Detection, Proceedings of NTMS 2008, 2008. ,
hTracker: Towards a service provider oriented Peer-to-Peer architecture, 2010 10th Annual International Conference on New Technologies of Distributed Systems (NOTERE), 2010. ,
DOI : 10.1109/NOTERE.2010.5536838
SPOP: A Service Provider Oriented Peer-to-Peer architecture", to appear in SoftCOM, 2010. ,
Evaluating Forward Error Correction performance in BitTorrent protocol, IEEE Local Computer Network Conference, 2010. ,
DOI : 10.1109/LCN.2010.5735842
Improving Data Access in P2P Systems, Bibliography IEEE Internet Computing, vol.61, pp.58-67, 2002. ,
Can ISPS and P2P users cooperate for improved performance?, ACM SIGCOMM Computer Communication Review, 2007. ,
Resilient Overlay Networks, ACM. 18 th Symposium on Operating Systems Principles (SOSP), 21-24 october, pp.131-145, 2001. ,
Influences on cooperation in BitTorrent communities, proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, 2005. ,
Analyzing the efficiency of BitTorrent and related peer-to-peer networks, Proceedings Seventeenth annual ACMSIAM symposium on Discrete algorithms, pp.961-969, 2005. ,
AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs, Asia Future Internet summer school, 2009. ,
Tracing multiple attackers with deterministic packet marking (DPM), Proceedings of IEEE PacRim, pp.49-52, 2003. ,
The BitCod Client: A BitTorrent Clone using Network Coding. Peer-to-Peer Computing, pp.231-232, 2007. ,
Improving Traffic Locality in BitTorrent via Biased Neighbor Selection Some Design Issues of SRMTP, a Scalable Reliable Multicast Transport Protocol Space/Time Trade-offs in Hash Coding with Allowable Errors, Proceedings IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06) Helmut Leopold and Narciso Garcia, Proceedings ECMAST'99, pp.1-9, 1970. ,
A Digital Fountain Approach to Reliable Distribution of Bulk Data Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up downloads Informed content delivery across adaptive overlay networks, ACM SIGCOMM' 98 INFOCOM 99 SIGCOMMCAC05] CacheLogic. CacheLogic ? advanced solutions for peer-to-peer networks, 1998. ,
The Cooperative Association for Internet Data AnalysisAnalysing BitTorrent's Seeding Strategies Taming the Torrent: A practical approach to reducing cross-ISP traffic in P2P systemsImproving BitTorrent: a Simple Approach Internet measurement and data analysis: passive and active measurement Freenet: A distributed anonymous Information storage and retrieval system Designing Privacy Enhancing Technologies: International workshop on Design Issues in Anonymity and Unobservability Replication Strategies in Unstructured Peer-topeer Networks Incentives build robustness in BitTorrent ASSYST: an Active Security System against DoS attacks Semantic Overlay Networks for P2P Systems PlanetP : Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities Locality-awareness in BitTorrent-like P2P applications Improving the download time of BitTorrent-like systems, CER03] CERT Coordination Center Proceedings of ACM SIGCOMM the 7th international workshop on Peer-to-Peer Systems (IPTPS'08) Proceedings First Workshop on Economics of Peer-to-Peer Systems 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12) IEEE International Conference on CommunicationsDAB&al03] F. Dabek, B. Zhao, P. Druschel, and I. Stoica. Towards a common API for structured peer-to-peer overlays 2nd International workshop on Peer-to-Peer Systems (IPTPS'02), pp.140-149, 1999. ,
A Measurement Study of Piece Population in BitTorrent, IEEE GLOBECOM'07 ,
Evolution and enhancement of BitTorrent network topologies Quality of Service, IWQoS, pp.1-10, 2008. ,
AS Relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review (CCR), vol.37, issue.1, pp.29-40, 2007. ,
The Sybil Attack, 1st International workshop on Peer-to-Peer Systems (IPTPS '02), 2002. ,
Efficient Simulation of Large-Scale P2P Networks: Packet-level vs. Flow-level Simulations, 2nd Workshop on the Use of P2P, GRID and Agents for the Development of Content Networks (UPGRADE- CN'07), in conjunction with 16th IEEE HPDC (High Performance Distributed Computing), 2007. ,
BitTorrent session characteristics and models, presented at the 3rd Int. Working Conf. Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs'05), 2005. ,
Stochastic analysis and file availability enhancement for BT-like file sharing systems Quality of Service, pp.30-39, 2006. ,
An Efficient Management Technique for Peer-to-Peer Networks, International Conference on Software Telecommunications and Computer Networks, 2008. ,
Self-scaling networks for content distribution, Int. Workshop on Self-* Properties in Complex Information Systems, 2004. ,
Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, IETF, RFC 2267, 1998. ,
(IPv6 Testing Address Allocation) Phaseout, RFC, vol.3701, p.6, 2004. ,
PlanetSim: A New Overlay network Simulation Framework, th Software Engineering and Middleware, pp.20-21 ,
Making gnutella-like P2P systems scalable, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003. ,
DOI : 10.1145/863955.864000
MULTOPS: a data-structure for bandwidth attack detection, Proceedings of 10th Usenix Security Symposium, pp.23-38, 2001. ,
Network coding for large scale content distribution, proceedings of INFOCOM, 2005. ,
Anatomy of a P2P Content Distribution System with Network Coding, Proceedings of the 5 th International workshop on Peer-to-Peer Systems, 2006. ,
Comprehensive view of a live network coding P2P system Peer-to-Peer Architecture Case Study: Gnutella Network, Proceedings of the 6th ACM SIGCOMM conference on Internet measurement IEEE 1 st International Conference on Peer-to-Peer Computing (P2P'01), pp.27-29, 2001. ,
Project JXTA: A Technology Overview, 2002. ,
GPS: A General Peer-to-Peer Simulator and its Use for Modeling BitTorrent ,
Measurements, analysis, and modeling of bittorrent systems, Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC'05), 2005. ,
A performance study of bittorrent-like peer-to-peer systems, first Quarter, 2007. ,
Fairness, incentives, and performance in peer-to-peer networks, 41st Annual Allerton Conference on Communication, Control and Computing, 2003. ,
An autonomous architecture for inter-domain Traceback across the borders of network operation, Proceedings of 11th IEEE Symposium on Computers and Communications (ISCC '06), pp.378-385, 2006. ,
Understanding the properties of the BitTorrent overlay, INRIA, 2007. ,
Insightsinto PPLive: A Measurement Study of a Large-Scale P2P IPTV System, IPTV Workshop, International World Wide Web Conference, 2006. ,
About Super-Seed mode ,
RFC 2104: HMAC: Keyed-Hashing for Message Authentication, 1997. ,
DOI : 10.17487/rfc2104
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.2086
Intel Peer-to-peer working group Implementing pushback : Routerbased defense against ddos attacks, NDSS, 2002. ,
Available online at: http://www.ipoque.com/resources/internet- studies/internet-study, 20082009. ,
Dissecting BitTorrent: five months in a torrent's lifetime, PAM'2004, 5th annual Passive & Active Measurement Workshop, 2004. ,
PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks, Journal of Network and Computer Applications, pp.821-850, 2008. ,
Comparing the Performance of Distributed Hash Tables Under Churn, 3 rd International workshop on Peer-to-Peer Systems (IPTPS'04) in LNCSc, pp.87-99, 2004. ,
DOI : 10.1007/978-3-540-30183-7_9
On the Markov chain central limit theorem, Probability Surveys, vol.1, issue.0, pp.299-320, 2004. ,
DOI : 10.1214/154957804100000051
Incentives in Bittorrent induce Free-Riding, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, 2005. ,
Should Internet Service Providers Fear Peer-Assisted Content Distribution?, Internet Measurement Conference (IMC), 2005. ,
The FastTrack Protocol ,
NSTAT: a model-based real-time network intrusion detection system, 1997. ,
SETI@home-massively distributed computing for SETI, Computing in Science & Engineering, pp.78-83, 2001. ,
DOI : 10.1109/5992.895191
Bullet: High bandwidth data dissemination using an overlay mesh, Symposium on Operating Systems Principles (SOSP), 2003. ,
Peer-assisted file distribution: The minimum distribution time Hot Topics in Web Systems and Technologies, 2006. HOTWEB '06, pp.1-11, 2006. ,
When FEC Speed Up Data Access in P2P Networks, Proceedings of IDMS-PROMS, 2002. ,
Experimental views on neighbor selection in BitTorrent Network and Parallel Computing Workshops, NPC Workshops. IFIP International Conference on, pp.813-818, 2007. ,
Understanding BitTorrent: An Experimental Perspective, 2005. ,
Rarest First and Choke Algorithms Are Enough, Proceedings of ACM SIGCOMM/USENIX IMC, 2006. ,
Clustering and sharing incentives in BitTorrent systems, SIGMETRICS '07: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp.301-312, 2007. ,
Pushing BitTorrent Locality to the Limit, 2009. ,
Exploring the use of BitTorrent as the basis for a large trace repository, 2004. ,
Performance analysis of BitTorrent-like systems with heterogeneous users, Performance Evaluation, vol.64, pp.9-12, 2007. ,
Efficient dynamic probabilistic packet marking for IP traceback, Proceedingd of the 11th International Conf. Networks (ICON 2003), pp.475-480, 2003. ,
A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Survey and Tutorial, pp.72-93, 2004. ,
A simulation study of block management in BitTorrent, Proceedings of International Conference on Scalable Information Systems (Infoscale), Hong Kong, 2006. ,
Controlling high bandwidth aggregates, The network SIGCOMM Comput ,
Viceroy: a scalable and dynamic emulation of the Butterfly, ACM. 21 st symposium on Principles of Distributed Computing (PODC'02), pp.21-24, 2002. ,
Kademlia: A peer-to-peer information system based on the XOR metric, 1 st International workshop on Peer-to-Peer Systems (IPTPS'02), pp.7-08, 2002. ,
Rateless Codes and Big Downloads, IPTPS'03, 2003. ,
MBone: The Multicast Backbone, Communications of the ACM, vol.37, issue.8, pp.54-60, 1994. ,
Public and Private BitTorrent Communities: A Measurement Study, 9th Int'l Workshop on Peer-to-Peer Systems (IPTPS'10), 2010. ,
D-WARD: DDoS Network Attack Recognition and Defense, 2002. ,
Internet Denial of Service: Attack and Defense Mechanisms " (Radia Perlman Computer Networking and Security), 2004. ,
Distributed Defense Against DDOS Attacks, 2005. ,
IP Mobility Support for IPv4, RFC, vol.3220, 2002. ,
Inferring Internet Denial of Service Activity, Proceedings of the 2001 USENIX Security Symposium, 2001. ,
Analyzing and improving BitTorrent performance, 2005. ,
The evolution of the u.s. internet peering system, 2003. ,
The OMNeT++ Discrete Event Simulation System, Proceedings of the European Simulation Multiconference (ESM'2001) ,
A BitTorrent Module for the OMNeT++ Simulator, Proceedings 17th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2009. ,
OverSim: A Flexible Overlay Network Simulation Framework, 2007 IEEE Global Internet Symposium, 2007. ,
DOI : 10.1109/GI.2007.4301435
Improvement of BitTorrent Performance and Inter-Domain Traffic by Inserting ISP-owned Peers, 6th International workshop on Internet Charging and QoS Technologies (ICQT'09), 2009. ,
Opentransit 2008 Peering Policy Do incentives build robustness in BitTorrent?, Proceedings of NSDI'07, 2007. ,
The effect of heterogeneous link capacities in BitTorrent-like file sharing systems Peer-to-Peer Systems, pp.40-47, 2004. ,
Assessing the Performance of Erasure Codes in the Wide-Area, Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp.182-187, 2005. ,
Accessing Nearby Copies of Replicated Objects in Distributed Environment, Proceedings ACM Symp. Parallel Algorithms and Architectures, 1997. ,
The BitTorrent P2P file-sharing system: Measurements and Analysis ,
Tribler: A social-based peer-to-peer system, Proceedings of IPTPS, 2006. ,
MDx-MAC and building fast MACs from hash functions " Crypto'95, 1995. ,
Impact of Self-Organization in Peer-to-Peer Overlays on Underlay Utilization, Fourth International Conference on Internet and Web Applications and Services, 2009. ,
Modeling and performance analysis of BitTorrentlike peer-to-peer networks, Proceedings of ACM SIGCOMM, 2003. ,
Exploring Proximity Based Peer Selection in BitTorrent-like Protocol, 2004. ,
Understanding peer-level performance in BitTorrent: A measurement study, Proceedings of 16th International Conference on, pp.109-114, 2007. ,
A Scalable Content-Addressable Network, 2002. ,
Polynomial Codes Over Certain Finite Field, J. SIAM, vol.8, pp.300-304, 1960. ,
TopBT: a topology-aware and infrastructure-independent BitTorrent client, proceedings of INFOCOM'10 ,
OpenDHT: A Public DHT Service and Its Uses, Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), pp.73-84, 2005. ,
Principes des tests d'hypothèse en statistique: ?, ? et P, Ann Fr Anesth Réanim, vol.17, pp.1168-1180, 1998. ,
Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997. ,
DOI : 10.1145/263876.263881
A Measurement Study of Atatcks on BitTorrent Leechers, Proceedings of 7th International workshop on Peerto-Peer Systems, 2008. ,
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems, IFIP/ACM. 18 th International Conference on Distributed Systems Platforms (Middleware'01, pp.12-16, 2001. ,
An empirical performance evaluation and modelling of BitTorrent peer-to-peer file sharing system using queuing network models, Research project, Advanced Learning and Research Institute, 2007. ,
Slurpie: a cooperative bulk data transfer protocol, INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, pp.941-951, 2004. ,
Fair file swarming with FOX, Fifth International workshop on Peer-to-peer Systems, 2006. ,
DIDS (Distributed Intrusion Detection System)motivation architecture and an early prototype, Proceedings of the 14th national computer security conference, 1999. ,
The Open Source Network Intrusion Detection System ,
Bittorrent and fountain codes: friends or foes ?, Proceedings in IDPDPS 2010, 2010. ,
The World Wide Web Security FAQ, version 1 Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications, ACM. SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.27-31, 2001. ,
OverQoS: An Overlay Based Architecture for Enhancing Internet QoS, 1st Symposium on Networked Systems Design and Implementation, 2004. ,
A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, pp.335-371, 2004. ,
Bittorrent fairness: analysis and improvements, Proceedings of Workshop Internet, Telecom. and Signal Proceedings, 2005. ,
Performance analysis and improvement for Bittorrent-like sharing systems, 2007. ,
Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-6, 2006. ,
DOI : 10.1109/INFOCOM.2006.41
P4P: Proactive Provider Participation for P2P, 2007. ,
A Survey of Peer-to-Peer Security Issues, International Symposium on Software Security, 2002. ,
On the role of helpers in peer-to-peer file download systems: design, analysis, and simulation, Proceedings of IPTPS, 2007. ,
Erasure Coding vs Replication: A Quantitative Comparison, Revised Papers from the First International workshop on Peer-to-Peer Systems, pp.328-338, 2002. ,
On characterizing PPStream: measurement and analysis of P2P IPTV under large-scale broadcasting, proceedings of the 28th IEEE conference on Global telecommunications, pp.3552-3557, 2009. ,
Cooperating security managers: A peer-based intrusion detection system, IEEE Network, vol.10, issue.1, pp.20-23, 1996. ,
How efficient is BitTorrent? " in Multimedia Computing and Networking, SPIE, vol.6071, issue.1, p.607100, 2006. ,
CAT: A Cost-Aware BitTorrent, 32 nd IEEE Conference on Local Computer Networks, pp.226-227, 2007. ,
Designing a Super-Peer Network, IEEE. 21 st International Council for Open and Distance Education (ICDE'03), 05-08 mars 2003, pp.49-60, 2003. ,
A Survey of BitTorrent Performance, IEEE Communications Surveys and Tutorials ,
Performance of peer-topeer networks: Service capacity and role of resource sharing policies, Performance Evaluation, vol.63, issue.3, pp.175-194, 2006. ,
Intrusion detection using autonomous agents, Computer Networks, pp.547-570, 2000. ,
Tapestry: A Resilient Global-Scale Overlay for Service Deployment, IEEE Journal on Selected Areas in Communications, vol.22, issue.1, pp.41-53, 2004. ,
DOI : 10.1109/JSAC.2003.818784
Exploiting Proximity in Cooperative Download of Large Files in Peer-to-Peer Networks, Second International Conference on Internet and Web Applications and Services (ICIW'07) Proceedings of Infocom 2010, 2007. ,
Bayeux: An architecture ZHA&al05e for scalable and fault-tolerant widearea data dissemination, Proceedings of NOSSDAV, 2001. ,