Structured P2P technologies for distributed command and control
نویسندگان
چکیده
The utility of Peer-to-Peer (P2P) systems extends far beyond traditional file sharing. This paper provides an overview of how P2P systems are capable of providing robust command and control for Distributed Multi-Agent Systems (DMASs). Specifically, this article presents the evolution of P2P architectures to date by discussing supporting technologies and applicability of each generation of P2P systems. It provides a detailed survey of fundamental design approaches found in modern large-scale P2P systems highlighting design considerations for building and deploying scalable P2P applications. The survey includes unstructured P2P systems, content retrieval systems, communications structured P2P systems, flat structured P2P systems and finally Hierarchical Peer-to-Peer (HP2P) overlays. It concludes with a presentation of design tradeoffs and opportunities for future research into P2P overlay systems.
منابع مشابه
BotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملAdaptive Scheduling of Message Forwarding of DHT-Based P2P Network Broadcast
Aggregated information, such as the total and free capacity of storages, computing power, network bandwidth, and so on, is very important for many peer-to-peer (P2P) applications and P2P-based grid or cloud computing. Previous studies have proposed to build a broadcast tree for a structured P2P network. Along this tree, the root can broadcast a command message to all the other peers, and in the...
متن کاملPeer-to-Peer Botnets
“Botnet” is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense...
متن کاملPeer-to-Peer Botnets: The Next Generation of Botnet Attacks
“Botnet” is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today’s Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense...
متن کاملProviding Quantitative Scalability Improvement of Consistency Control for Large-Scale, Replication-Based Grid Systems
ions and Middleware for Petascale Computing and Beyond Ivo F. Sbalzarini (2010). International Journal of Distributed Systems and Technologies (pp. 40-56). www.igi-global.com/article/abstractions-middleware-petascale-computingbeyond/42975?camid=4v1a Semantic Technologies for Distributed Search P2P Networks Amitava Biswas, Suneil Mohan and Rabi Mahapatra (2010). Handbook of Research on P2P and G...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Peer-to-Peer Networking and Applications
دوره 2 شماره
صفحات -
تاریخ انتشار 2009