.. The-htracker-architecture, Mapping the AS membership with the peerId, p.59

P. Statement, .. , and R. , 121 6.3.2 The Distributed Hash Table algorithm 121 6.3.3 Description of the architecture, Discussion, p.128

. Serhouchni, A cooperative agent approach based on a peer-to-peer model for DDoS attacks detection and reaction, Proceedings of NAEC 2008, 2008.

R. Saad, F. Naït-abdesselam, and A. Serhrouchni, A collaborative peer-to-peer architecture to defend against DDoS attacks, 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.
DOI : 10.1109/LCN.2008.4664200

R. Saad, F. Naït-abdesselam, and A. Serhrouchni, Une Architecture Peer-to- Peer de Défense Contre les Attaques DDoS, Proceedings of SAR-SSI 2008, 2008.

G. Doyen, D. Gaïti, R. Khatoun, R. Saad, and A. Serhrouchni, Decentralized Alerts Correlation Approach for DDoS Intrusion Detection, Proceedings of NTMS 2008, 2008.

R. Saad, A. Serhrouchni, and K. Chen, hTracker: Towards a service provider oriented Peer-to-Peer architecture, 2010 10th Annual International Conference on New Technologies of Distributed Systems (NOTERE), 2010.
DOI : 10.1109/NOTERE.2010.5536838

R. Saad, A. Serhrouchni, and K. Chen, SPOP: A Service Provider Oriented Peer-to-Peer architecture", to appear in SoftCOM, 2010.

A. [. Saad, Y. Serhrouchni, K. Begriche, and . Chen, Evaluating Forward Error Correction performance in BitTorrent protocol, IEEE Local Computer Network Conference, 2010.
DOI : 10.1109/LCN.2010.5735842

]. K. Abe&al02, M. Aberer, M. Punceva, R. Hauswirth, and . Schmidt, Improving Data Access in P2P Systems, Bibliography IEEE Internet Computing, vol.61, pp.58-67, 2002.

]. V. Agg&al07, A. Aggarwal, C. Feldmann, and . Scheideler, Can ISPS and P2P users cooperate for improved performance?, ACM SIGCOMM Computer Communication Review, 2007.

]. D. And&al01, G. Andersen, H. Balakrishnan, and F. Kaashoek, Resilient Overlay Networks, ACM. 18 th Symposium on Operating Systems Principles (SOSP), 21-24 october, pp.131-145, 2001.

]. N. And&al05, M. Andrade, A. Mowbray, G. Lima, M. Wagner et al., Influences on cooperation in BitTorrent communities, proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, 2005.

]. D. Art&al05, R. Arthur, and . Panigraphy, Analyzing the efficiency of BitTorrent and related peer-to-peer networks, Proceedings Seventeenth annual ACMSIAM symposium on Discrete algorithms, pp.961-969, 2005.

]. H. Asa&al09, H. Asai, and . Esaki, AURORA: Autonomous System relationships-aware overlay routing architecture in P2P CDNs, Asia Future Internet summer school, 2009.

]. A. Bel&al03, N. Belenky, and . Ansarin, Tracing multiple attackers with deterministic packet marking (DPM), Proceedings of IEEE PacRim, pp.49-52, 2003.

]. D. Bic&al07, R. Bickson, and . Borer, The BitCod Client: A BitTorrent Clone using Network Coding. Peer-to-Peer Computing, pp.231-232, 2007.

]. R. Bin&al06, P. Bindal, W. Cao, J. Chan, G. Medved et al., Improving Traffic Locality in BitTorrent via Biased Neighbor Selection Some Design Issues of SRMTP, a Scalable Reliable Multicast Transport Protocol Space/Time Trade-offs in Hash Coding with Allowable Errors, Proceedings IEEE Int'l Conf. Distributed Computing Systems (ICDCS '06) Helmut Leopold and Narciso Garcia, Proceedings ECMAST'99, pp.1-9, 1970.

]. J. Bye&al98, M. Byers, M. Luby, A. Mitzenmacher, . W. Regebye&al99-]-j et al., A Digital Fountain Approach to Reliable Distribution of Bulk Data Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up downloads Informed content delivery across adaptive overlay networks, ACM SIGCOMM' 98 INFOCOM 99 SIGCOMMCAC05] CacheLogic. CacheLogic ? advanced solutions for peer-to-peer networks, 1998.

[. Chen, S. A. Jarvis, D. R. Choffnes, F. E. Bustamantecho&al08-]-a, L. Chow et al., The Cooperative Association for Internet Data AnalysisAnalysing BitTorrent's Seeding Strategies Taming the Torrent: A practical approach to reducing cross-ISP traffic in P2P systemsImproving BitTorrent: a Simple Approach Internet measurement and data analysis: passive and active measurement Freenet: A distributed anonymous Information storage and retrieval system Designing Privacy Enhancing Technologies: International workshop on Design Issues in Anonymity and Unobservability Replication Strategies in Unstructured Peer-topeer Networks Incentives build robustness in BitTorrent ASSYST: an Active Security System against DoS attacks Semantic Overlay Networks for P2P Systems PlanetP : Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities Locality-awareness in BitTorrent-like P2P applications Improving the download time of BitTorrent-like systems, CER03] CERT Coordination Center Proceedings of ACM SIGCOMM the 7th international workshop on Peer-to-Peer Systems (IPTPS'08) Proceedings First Workshop on Economics of Peer-to-Peer Systems 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12) IEEE International Conference on CommunicationsDAB&al03] F. Dabek, B. Zhao, P. Druschel, and I. Stoica. Towards a common API for structured peer-to-peer overlays 2nd International workshop on Peer-to-Peer Systems (IPTPS'02), pp.140-149, 1999.

]. C. Dal&al07, J. Dale, and . Liu, A Measurement Study of Piece Population in BitTorrent, IEEE GLOBECOM'07

]. C. Dal&al08, J. Dale, J. Liu, B. Peters, and . Li, Evolution and enhancement of BitTorrent network topologies Quality of Service, IWQoS, pp.1-10, 2008.

G. Claffy and . Riley, AS Relationships: Inference and Validation, ACM SIGCOMM Computer Communication Review (CCR), vol.37, issue.1, pp.29-40, 2007.

]. J. Dou&al02 and . Douceur, The Sybil Attack, 1st International workshop on Peer-to-Peer Systems (IPTPS '02), 2002.

]. K. Egr&al07, T. Eger, A. Hoßfeld, G. Binzenhöfer, and . Kunzmann, Efficient Simulation of Large-Scale P2P Networks: Packet-level vs. Flow-level Simulations, 2nd Workshop on the Use of P2P, GRID and Agents for the Development of Content Networks (UPGRADE- CN'07), in conjunction with 16th IEEE HPDC (High Performance Distributed Computing), 2007.

]. D. Erm&al05, D. Erman, A. Ilie, and . Popescu, BitTorrent session characteristics and models, presented at the 3rd Int. Working Conf. Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs'05), 2005.

]. B. Fan&al06, D. Fan, J. Chiu, and . Lui, Stochastic analysis and file availability enhancement for BT-like file sharing systems Quality of Service, pp.30-39, 2006.

]. M. Fay&al08, A. Fayçal, and . Serhrouchni, An Efficient Management Technique for Peer-to-Peer Networks, International Conference on Software Telecommunications and Computer Networks, 2008.

]. P. Fel&al04, E. W. Felber, and . Biersack, Self-scaling networks for content distribution, Int. Workshop on Self-* Properties in Complex Information Systems, 2004.

]. P. Fer&al98, D. Ferguson, and . Senie, Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, IETF, RFC 2267, 1998.

]. R. Fin&al04, R. Fink, and . Hinden, (IPv6 Testing Address Allocation) Phaseout, RFC, vol.3701, p.6, 2004.

. P. Gar, C. Garcia, R. Pairot, and . Mondejar, PlanetSim: A New Overlay network Simulation Framework, th Software Engineering and Middleware, pp.20-21

S. [. Chawathe, L. Ratnasamy, N. Breslau, S. Lanham, and . Shenker, Making gnutella-like P2P systems scalable, Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications , SIGCOMM '03, 2003.
DOI : 10.1145/863955.864000

]. T. Gil&al01, M. Gil, and . Poleto, MULTOPS: a data-structure for bandwidth attack detection, Proceedings of 10th Usenix Security Symposium, pp.23-38, 2001.

]. C. Gka&al05, P. Gkantsidis, and . Rodriguez, Network coding for large scale content distribution, proceedings of INFOCOM, 2005.

]. C. Gka&al06, J. Gkantsidis, P. Miller, and . Rodriguez, Anatomy of a P2P Content Distribution System with Network Coding, Proceedings of the 5 th International workshop on Peer-to-Peer Systems, 2006.

. Gka-'&al06-]-c, J. Gkantsidis, P. Miller, and . Rodriguez, Comprehensive view of a live network coding P2P system Peer-to-Peer Architecture Case Study: Gnutella Network, Proceedings of the 6th ACM SIGCOMM conference on Internet measurement IEEE 1 st International Conference on Peer-to-Peer Computing (P2P'01), pp.27-29, 2001.

. [. Gong, Project JXTA: A Technology Overview, 2002.

. W. Gps, N. Yang, and . Abu-ghazaleh, GPS: A General Peer-to-Peer Simulator and its Use for Modeling BitTorrent

]. L. Guo&al05, S. Guo, Z. Chen, E. Xiao, X. Tan et al., Measurements, analysis, and modeling of bittorrent systems, Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC'05), 2005.

]. L. Guo&al07, S. Guo, Z. Chen, E. Xiao, X. Tan et al., A performance study of bittorrent-like peer-to-peer systems, first Quarter, 2007.

]. G. Gus&al05, G. De-veciana, and X. Yang, Fairness, incentives, and performance in peer-to-peer networks, 41st Annual Allerton Conference on Communication, Control and Computing, 2003.

]. H. Haz&al06, Y. Hazeyama, D. Kadobayashi, M. Miyamoto, and . Oe, An autonomous architecture for inter-domain Traceback across the borders of network operation, Proceedings of 11th IEEE Symposium on Computers and Communications (ISCC '06), pp.378-385, 2006.

]. A. Ham&al07, A. Hamra, C. Legout, and . Barakat, Understanding the properties of the BitTorrent overlay, INRIA, 2007.

]. X. Hei&al06, C. Hei, J. Liang, Y. Liang, K. W. Liu et al., Insightsinto PPLive: A Measurement Study of a Large-Scale P2P IPTV System, IPTV Workshop, International World Wide Web Conference, 2006.

J. Hoffman, About Super-Seed mode

H. Krawczyk, M. Bellare, and R. Canetti, RFC 2104: HMAC: Keyed-Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.2086

S. M. Bellovin, Intel Peer-to-peer working group Implementing pushback : Routerbased defense against ddos attacks, NDSS, 2002.

. Ipoque, Available online at: http://www.ipoque.com/resources/internet- studies/internet-study, 20082009.

. Garces-erice, Dissecting BitTorrent: five months in a torrent's lifetime, PAM'2004, 5th annual Passive & Active Measurement Workshop, 2004.

]. J. Jia&al08, L. Zhang, L. Liu, C. Ramaswamy, and . Pu, PeerCast: Churn-resilient end system multicast on heterogeneous overlay networks, Journal of Network and Computer Applications, pp.821-850, 2008.

J. Li, J. Stribling, and T. Gil, Comparing the Performance of Distributed Hash Tables Under Churn, 3 rd International workshop on Peer-to-Peer Systems (IPTPS'04) in LNCSc, pp.87-99, 2004.
DOI : 10.1007/978-3-540-30183-7_9

. [. Jones, On the Markov chain central limit theorem, Probability Surveys, vol.1, issue.0, pp.299-320, 2004.
DOI : 10.1214/154957804100000051

]. S. Jun&al05, M. Jun, and . Ahamad, Incentives in Bittorrent induce Free-Riding, Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, 2005.

]. T. Kar&al05, P. Karagiannis, D. Rodriguez, and . Papagiannaki, Should Internet Service Providers Fear Peer-Assisted Content Distribution?, Internet Measurement Conference (IMC), 2005.

. [. Hargreaves, The FastTrack Protocol

]. Kem&al97, . Ra, and . Kemmerer, NSTAT: a model-based real-time network intrusion detection system, 1997.

E. Korpela, SETI@home-massively distributed computing for SETI, Computing in Science & Engineering, pp.78-83, 2001.
DOI : 10.1109/5992.895191

]. D. Kos&al03, A. Kostic, J. Rodriguez, A. Albrecht, and . Vahdat, Bullet: High bandwidth data dissemination using an overlay mesh, Symposium on Operating Systems Principles (SOSP), 2003.

]. R. Kum&al06, K. Kumar, and . Ross, Peer-assisted file distribution: The minimum distribution time Hot Topics in Web Systems and Technologies, 2006. HOTWEB '06, pp.1-11, 2006.

]. J. Lab-]-planetlablac&al02, L. Lacan, L. Lancérica, and . Dairaine, When FEC Speed Up Data Access in P2P Networks, Proceedings of IDMS-PROMS, 2002.

]. Y. Lei&al07, L. Lei, Q. Yang, C. Jiang, and . Wu, Experimental views on neighbor selection in BitTorrent Network and Parallel Computing Workshops, NPC Workshops. IFIP International Conference on, pp.813-818, 2007.

]. A. Leg&al05, G. Legout, P. Urvoy-keller, and . Michiardi, Understanding BitTorrent: An Experimental Perspective, 2005.

]. A. Leg&al06, G. Legout, P. Urvoy-keller, and . Michiardi, Rarest First and Choke Algorithms Are Enough, Proceedings of ACM SIGCOMM/USENIX IMC, 2006.

]. A. Leg&al07, N. Legout, E. Liogkas, L. Kohler, and . Zhang, Clustering and sharing incentives in BitTorrent systems, SIGMETRICS '07: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp.301-312, 2007.

]. S. Leg&al09, A. Le-blond, W. Legout, and . Dabbous, Pushing BitTorrent Locality to the Limit, 2009.

]. A. Lev&al04, B. N. Bellissimo, P. Levine, and . Shenoy, Exploring the use of BitTorrent as the basis for a large trace repository, 2004.

]. Lia&al07, F. Liao, K. Papadopoulos, and . Psounis, Performance analysis of BitTorrent-like systems with heterogeneous users, Performance Evaluation, vol.64, pp.9-12, 2007.

]. J. Liu&al03, Z. Liu, Y. Lee, and . Chung, Efficient dynamic probabilistic packet marking for IP traceback, Proceedingd of the 11th International Conf. Networks (ICON 2003), pp.475-480, 2003.

]. E. Lua&al04, J. Lua, M. Crowcroft, and . Pias, A Survey and Comparison of Peer-to-Peer Overlay Network Schemes, IEEE Communications Survey and Tutorial, pp.72-93, 2004.

H. Tom, D. H. Luan, and . Tsang, A simulation study of block management in BitTorrent, Proceedings of International Conference on Scalable Information Systems (Infoscale), Hong Kong, 2006.

. Shenker, Controlling high bandwidth aggregates, The network SIGCOMM Comput

]. D. Mal&al02, M. Malkhi, D. Naor, and . Ratajczak, Viceroy: a scalable and dynamic emulation of the Butterfly, ACM. 21 st symposium on Principles of Distributed Computing (PODC'02), pp.21-24, 2002.

]. P. May&al02, D. Maymounkov, and . Mazieres, Kademlia: A peer-to-peer information system based on the XOR metric, 1 st International workshop on Peer-to-Peer Systems (IPTPS'02), pp.7-08, 2002.

]. P. May&al03, D. Maymounkov, and . Mazieres, Rateless Codes and Big Downloads, IPTPS'03, 2003.

. Mbo-]-h and . Eriksson, MBone: The Multicast Backbone, Communications of the ACM, vol.37, issue.8, pp.54-60, 1994.

D. H. Pouwelse, H. J. Epema, and . Sips, Public and Private BitTorrent Communities: A Measurement Study, 9th Int'l Workshop on Peer-to-Peer Systems (IPTPS'10), 2010.

]. J. Mir&al02, P. Mirkovic, and . Proposal, D-WARD: DDoS Network Attack Recognition and Defense, 2002.

J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms " (Radia Perlman Computer Networking and Security), 2004.

]. J. Mir&al05, M. Mirkovic, P. Robinson, G. Reiher, and . Oikonomou, Distributed Defense Against DDOS Attacks, 2005.

C. Perkins, . Nokia, and . Center, IP Mobility Support for IPv4, RFC, vol.3220, 2002.

]. D. Moo&al01, G. Moore, S. Voelker, and . Savage, Inferring Internet Denial of Service Activity, Proceedings of the 2001 USENIX Security Symposium, 2001.

C. [. Bharambe, V. N. Herley, and . Padmanabhan, Analyzing and improving BitTorrent performance, 2005.

. [. Norton, The evolution of the u.s. internet peering system, 2003.

A. Varga, The OMNeT++ Discrete Event Simulation System, Proceedings of the European Simulation Multiconference (ESM'2001)

K. Katsaros, V. P. Kemerlis, C. Stais, and G. Xylomenos, A BitTorrent Module for the OMNeT++ Simulator, Proceedings 17th Annual Meeting of the IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2009.

B. [. Baumgart, S. Heep, and . Krause, OverSim: A Flexible Overlay Network Simulation Framework, 2007 IEEE Global Internet Symposium, 2007.
DOI : 10.1109/GI.2007.4301435

]. I. Pap&al06, S. Papafili, G. D. Soursos, and . Stamoulis, Improvement of BitTorrent Performance and Inter-Domain Traffic by Inserting ISP-owned Peers, 6th International workshop on Internet Charging and QoS Technologies (ICQT'09), 2009.

]. M. Pia&al07, T. Piatek, T. Isdal, A. Anderson, A. Krishnamurthy et al., Opentransit 2008 Peering Policy Do incentives build robustness in BitTorrent?, Proceedings of NSDI'07, 2007.

]. F. Pic&al07, G. Lo-piccolo, and . Neglia, The effect of heterogeneous link capacities in BitTorrent-like file sharing systems Peer-to-Peer Systems, pp.40-47, 2004.

J. S. Plank, Assessing the Performance of Erasure Codes in the Wide-Area, Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp.182-187, 2005.

]. C. Plx&al97, R. Plaxton, A. W. Rajaraman, and . Richa, Accessing Nearby Copies of Replicated Objects in Distributed Environment, Proceedings ACM Symp. Parallel Algorithms and Architectures, 1997.

]. J. Pou&al04, P. Pouwelse, D. H. Garbacki, H. J. Epema, and . Sips, The BitTorrent P2P file-sharing system: Measurements and Analysis

M. Epema, M. Reinders, H. Van-steen, and . Sips, Tribler: A social-based peer-to-peer system, Proceedings of IPTPS, 2006.

]. B. Pre&al95, P. C. Preneel, and . Van-oorschot, MDx-MAC and building fast MACs from hash functions " Crypto'95, 1995.

]. K. Pus&al09, S. Pussep, O. Oechsner, M. Abboud, B. Kantor et al., Impact of Self-Organization in Peer-to-Peer Overlays on Underlay Utilization, Fourth International Conference on Internet and Web Applications and Services, 2009.

R. Qiu and . Srikant, Modeling and performance analysis of BitTorrentlike peer-to-peer networks, Proceedings of ACM SIGCOMM, 2003.

. [. Qureshi, Exploring Proximity Based Peer Selection in BitTorrent-like Protocol, 2004.

]. A. Ras&al07, R. Rasti, and . Rejaie, Understanding peer-level performance in BitTorrent: A measurement study, Proceedings of 16th International Conference on, pp.109-114, 2007.

. [. Ratnasamy, A Scalable Content-Addressable Network, 2002.

]. I. Ree&al60, G. Reed, and . Solomon, Polynomial Codes Over Certain Finite Field, J. SIAM, vol.8, pp.300-304, 1960.

]. S. Ren&al10, E. Ren, T. Tan, L. Luo, S. Guo et al., TopBT: a topology-aware and infrastructure-independent BitTorrent client, proceedings of INFOCOM'10

H. Stoica and . Yu, OpenDHT: A Public DHT Service and Its Uses, Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005), pp.73-84, 2005.

]. B. Rio&al98, P. Riou, and . Landais, Principes des tests d'hypothèse en statistique: ?, ? et P, Ann Fr Anesth Réanim, vol.17, pp.1168-1180, 1998.

L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997.
DOI : 10.1145/263876.263881

]. P. Ros&al08, D. Dhungel, B. Wu, K. W. Schonhorst, and . Ross, A Measurement Study of Atatcks on BitTorrent Leechers, Proceedings of 7th International workshop on Peerto-Peer Systems, 2008.

]. A. Row&al01, P. Rowstron, and . Druschel, Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems, IFIP/ACM. 18 th International Conference on Distributed Systems Platforms (Middleware'01, pp.12-16, 2001.

]. P. Sar&al07, P. Saraswat, and . Batra, An empirical performance evaluation and modelling of BitTorrent peer-to-peer file sharing system using queuing network models, Research project, Advanced Learning and Research Institute, 2007.

]. R. She&al04, R. Sherwood, B. Braud, and . Bhattacharjee, Slurpie: a cooperative bulk data transfer protocol, INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, pp.941-951, 2004.

]. D. She&al06, R. Levin, B. Sherwood, and . Bhattacharjee, Fair file swarming with FOX, Fifth International workshop on Peer-to-peer Systems, 2006.

]. Sna&al99, . Sr, and . Snapp, DIDS (Distributed Intrusion Detection System)motivation architecture and an early prototype, Proceedings of the 14th national computer security conference, 1999.

. Sno and . Snort, The Open Source Network Intrusion Detection System

]. S. Spo&al10, . Spoto, M. Gaeta, M. Grangetto, and . Sereno, Bittorrent and fountain codes: friends or foes ?, Proceedings in IDPDPS 2010, 2010.

]. L. Ste&al03, J. N. Stein, . Stewartsto&al01-]-i, R. Stoica, D. Morris et al., The World Wide Web Security FAQ, version 1 Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications, ACM. SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.27-31, 2001.

]. L. Sub&al04, I. Subramanian, R. Stoica, and . Katz, OverQoS: An Overlay Based Architecture for Enhancing Internet QoS, 1st Symposium on Networked Systems Design and Implementation, 2004.

]. S. The&al04, D. Androutsellis-theotokis, and . Spinellis, A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, pp.335-371, 2004.

]. R. Tho&al05, M. Thommes, and . Coates, Bittorrent fairness: analysis and improvements, Proceedings of Workshop Internet, Telecom. and Signal Proceedings, 2005.

]. Y. Tia&al07, D. Tian, K. W. Wu, and . Ng, Performance analysis and improvement for Bittorrent-like sharing systems, 2007.

G. Urvoy-keller and P. Michiardi, Impact of Inner Parameters and Overlay Structure on the Performance of BitTorrent, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-6, 2006.
DOI : 10.1109/INFOCOM.2006.41

]. H. Xie&al07, . Xie, Y. Krishnamurthy, A. Yang, and . Silberschatz, P4P: Proactive Provider Participation for P2P, 2007.

]. D. Wal&al02 and . Wallach, A Survey of Peer-to-Peer Security Issues, International Symposium on Software Security, 2002.

]. J. Wan&al07, C. Wang, V. Yeo, K. Prabhakaran, and . Ramchandran, On the role of helpers in peer-to-peer file download systems: design, analysis, and simulation, Proceedings of IPTPS, 2007.

]. H. Wea&al02, J. Weatherspoon, and . Kubiatowicz, Erasure Coding vs Replication: A Quantitative Comparison, Revised Papers from the First International workshop on Peer-to-Peer Systems, pp.328-338, 2002.

]. W. Wei&al09, J. Liang, R. Bi, Z. Wu, C. Li et al., On characterizing PPStream: measurement and analysis of P2P IPTV under large-scale broadcasting, proceedings of the 28th IEEE conference on Global telecommunications, pp.3552-3557, 2009.

]. G. Whi&al96, E. A. White, U. W. Fisch, and . Pooch, Cooperating security managers: A peer-based intrusion detection system, IEEE Network, vol.10, issue.1, pp.20-23, 1996.

]. G. Wug&al06, T. Wu, and . Cker-chiueh, How efficient is BitTorrent? " in Multimedia Computing and Networking, SPIE, vol.6071, issue.1, p.607100, 2006.

]. S. Yam&al07, H. Yamazaki, K. Tode, and . Murakami, CAT: A Cost-Aware BitTorrent, 32 nd IEEE Conference on Local Computer Networks, pp.226-227, 2007.

]. B. Yan&al03, H. Yang, and . Garcia-molina, Designing a Super-Peer Network, IEEE. 21 st International Council for Open and Distance Education (ICDE'03), 05-08 mars 2003, pp.49-60, 2003.

]. L. Xia&al10, J. K. Xia, and . Muppala, A Survey of BitTorrent Performance, IEEE Communications Surveys and Tutorials

]. X. Yan&al06, G. Yang, and . De-veciana, Performance of peer-topeer networks: Service capacity and role of resource sharing policies, Performance Evaluation, vol.63, issue.3, pp.175-194, 2006.

]. E. Zam&al00, D. Spafford, and . Zamboni, Intrusion detection using autonomous agents, Computer Networks, pp.547-570, 2000.

L. Zhao, J. Huang, and . Stribling, Tapestry: A Resilient Global-Scale Overlay for Service Deployment, IEEE Journal on Selected Areas in Communications, vol.22, issue.1, pp.41-53, 2004.
DOI : 10.1109/JSAC.2003.818784

]. L. Zhn&al07, J. K. Zhang, W. Muppala, and . Tu, Exploiting Proximity in Cooperative Download of Large Files in Peer-to-Peer Networks, Second International Conference on Internet and Web Applications and Services (ICIW'07) Proceedings of Infocom 2010, 2007.

. Kubiatowicz, Bayeux: An architecture ZHA&al05e for scalable and fault-tolerant widearea data dissemination, Proceedings of NOSSDAV, 2001.