Detecting Malicious Peers in Overlay Multicast Streaming.
Samarth ShettyPatricio GaldamesWallapak TavanapongYing CaiPublished in: LCN (2006)
Keyphrases
- overlay multicast
- overlay network
- detecting malicious
- end hosts
- node failures
- peer to peer
- video streaming
- network security
- data streams
- network topology
- web pages
- denial of service attacks
- congestion control
- fault tolerance
- real time
- data sharing
- ad hoc networks
- end to end
- load balancing
- data replication
- ip addresses
- campus network
- intrusion detection
- ip multicast
- computer systems
- database systems