ITU-T recommendations on peer-to-peer (P2P) network security.
Tatsuaki HamaiMasahiro FujiiYu WatanabePublished in: ISADS (2009)
Keyphrases
- network security
- peer to peer
- intrusion detection
- computer networks
- intrusion detection system
- overlay network
- file sharing
- peer to peer networks
- security policies
- traffic analysis
- resource discovery
- data sharing
- network traffic
- dos attacks
- risk assessment
- security breaches
- load balancing
- peer to peer systems
- ad hoc networks
- super peer
- information security
- ip networks
- network administrators
- digital libraries
- end hosts
- distributed computing
- data mining
- video streaming
- anomaly detection
- resource sharing
- situation assessment
- unstructured p p networks
- packet filtering
- machine learning and data mining
- denial of service
- computer systems
- data mining techniques
- real world