Part of the Lecture Notes in Computer Science book series (LNCS, volume 2376)
Implementing a Reputation-Aware Gnutella Servent
We describe the design and implementation of a reputation-aware servent for Gnutella-like peer-to-peer systems.
KeywordsQuery Message Reputation Manager Sybil Attack Secure Hash Function Gnutella Network
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- 1.S. Bellovin. Security aspects of Napster and Gnutella. In Proc. of USENIX 2001, Boston, June 2001.Google Scholar
- 2.I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000.Google Scholar
- 3.F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a P2P network. In Proc. of the Eleventh International World Wide Web Conference, Honolulu, Hawaii, May 2002.Google Scholar
- 4.R. Dingledine, M.J. Freedman, and D. Molnar. The Free Haven project: Distributed anonymous storage service. In Proc. of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California, USA, July 2000.Google Scholar
- 5.J.R. Douceur. The sybil attack. In Proc. of the IPTPS02 Workshop, Cambridge, MA (USA), March 2002.Google Scholar
- 6.P. Druschel and A. Rowstron. Past: A large-scale persistent peer-to-peer storage utility. In Proc. of the Eight IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schoss Elmau, Germany, May 2001.Google Scholar
- 7.P. Golle and K. Leyton-Brown. Incentives for sharing in peer-to-peer networks. In Proc. of the Third ACM Conference on Electronic Commerce, Tampa, Florida, USA, October 2001.Google Scholar
- 8.L. Gong. JXTA: A network programming environment. IEEE Internet Computing, 5(3):88–95, May/June 2001.Google Scholar
- 9.Openprivacy. http://www.openprivacy.org.
- 10.A. Oram, editor. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, March 2001.Google Scholar
- 11.M. Parameswaran, A. Susarla, and A.B. Whinston. P2P networking: An information-sharing alternative. IEEE Computer, 34(7):31–38, July 2001.Google Scholar
- 12.M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. Technical Report TR-2001-26, University of Chicago, Department of Computer Science, July 2001.Google Scholar
- 13.S. Saroiu, P.K. Gummadi, and S.D. Gribble. A measurement study of peer-to-peer file sharing systems. In Proc. of the Multimedia Computing and Networking, San Jose, CA, January 2002.Google Scholar
- 14.S. Thadani. Meta information searches on the Gnutella network. http://rfc-gnutella.sourceforge.net/Proposals/MetaData/metainformationsearches.htm.
- 15.S. Thadani. Free riding on Gnutella. Technical report, LimeWire LLC, 2001. http://www.limewire.org.
- 16.The Gnutella Protocol Specification v0.4 (Document Revision 1.2), June 2001. http://www.clip2.com/GnutellaProtocol04.pdf.
- 17.B. Yang and H. Garcia-Molina. Comparing hybrid peer-to-peer systems. In Proc. of the 27th International Conference on Very Large Data Bases, Rome, Italy, September 2001.Google Scholar
© Springer-Verlag Berlin Heidelberg 2002