Authors
Samira Chaou, Gil Utard, Franck Pommereau
Publication date
2011/7/4
Conference
2011 International Conference on High Performance Computing & Simulation
Pages
419-426
Publisher
IEEE
Description
We present a peer-to-peer based storage system and evaluate its resistance in the presence of malicious peers. To do so, we resort to simulation of the actual code borrowed from the production system. Our analysis allows to identify the main threats, prioritise them and propose directions for mitigating the attacks.
Scholar articles
S Chaou, G Utard, F Pommereau - 2011 International Conference on High Performance …, 2011