P2P protocol analysis and blocking algorithm

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

P2P (Peer to Peer) technology provides methods for overcoming many weak points of conventional client-server mechanism, and consequently, many efforts in many fields are made to apply it. On the other side of the coin, these strong points of the P2P technology have been used for bad purposes, causing many problems and concerns. This paper proposes a method to block P2P applications fundamentally in order to eliminate illegal data or files. We use Ethereal, a reliable network packet analysis tool, and analyze the packets receive and send when P2P applications run. Then, in this paper we examine the packet architecture and characteristics of each P2P application, and propose the algorithms that can block P2P applications. When being used for blocking up P2P applications, these proposed algorithms can play important roles in reducing excessive P2P traffic and illegal data sharing. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hwang, S. M. (2005). P2P protocol analysis and blocking algorithm. In Lecture Notes in Computer Science (Vol. 3481, pp. 21–30). Springer Verlag. https://doi.org/10.1007/11424826_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free