Optimising sybil attacks against P2P-based botnets.
Carlton R. DavisJosé M. FernandezStephen NevillePublished in: MALWARE (2009)
Keyphrases
- file sharing
- malicious users
- ddos attacks
- peer to peer
- distributed denial of service attacks
- countermeasures
- internet traffic
- network traffic
- peer to peer computing
- malicious attacks
- traffic analysis
- peer to peer networks
- overlay network
- security threats
- watermarking algorithm
- anomaly detection
- trust management
- security protocols
- detection mechanism
- sensitive data
- peer to peer systems
- resource discovery
- computer security
- distributed network
- fully distributed
- scalable distributed
- malicious nodes
- multimedia
- distributed environment