CN101212302A - Method of defense against DDoS attacks in P2P stream media system - Google Patents
Method of defense against DDoS attacks in P2P stream media system Download PDFInfo
- Publication number
- CN101212302A CN101212302A CNA2007101689793A CN200710168979A CN101212302A CN 101212302 A CN101212302 A CN 101212302A CN A2007101689793 A CNA2007101689793 A CN A2007101689793A CN 200710168979 A CN200710168979 A CN 200710168979A CN 101212302 A CN101212302 A CN 101212302A
- Authority
- CN
- China
- Prior art keywords
- node
- request
- prestige
- requesting
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention aims at providing a method for defending a DDoS aggression in a P2P media stream system, which includes the following steps: the step that the node sends a joining requirement information to the media stream server is included and in the step, after receiving the joining requirement information, the server informs the joining requirement information of the node to the reputation node and the controlling node and return the partial nodes and a initial reputation value; a step that the reputation nodes calculate the node reputation value is included and in the step, after receiving the notices, the reputation node and the controlling node store the information of the node into own node list in order to evaluate and control the action of the node; the step that the node requires a data from the media server or local network is included, which is used for requesting the needed media data by the node; a step that the controlling node judges the node requirement rate is included, which is used for calculating the node requirement rate; a step that whether the requirement rate exceeds the limiting value is judged is also included, which is used for judging whether the requirement rate of the requirement node exceeds the limiting value or not; if the rate exceeds the limiting value, the requirement is stopped, otherwise, the request of the node is permitted.
Description
Technical field
The present invention relates to computer network, communication and information security field, relate in particular to a kind of in the P2P stream media system method of defending DDoS (Distributed Denial of Service) attacks.
Background technology
It is a kind of brand-new denial of service (the DoS:Denial of Service) attack pattern that occurs in recent years that distributed denial of service (DDoS:Distributed Denial of Service) is attacked.Single DoS attack generally adopts mode one to one, low when target of attack CPU speed, internal memory is little or little or the like the every performance index of the network bandwidth when not high its effect be tangible.Along with the development of computer and network technology, the disposal ability of computer increases rapidly, and internal memory increases greatly, has also occurred simultaneously doing million grades of other networks, and this makes the degree of difficulty of DoS attack strengthen.At this time distributed Denial of Service attack means are arisen at the historic moment.Ddos attack has more attack resource owing to its distributed nature than traditional DoS attack, has more powerful destructive power, so be difficult to more take precautions against.
In recent years, P2P network especially P2P file sharing network has obtained using widely, the sizable network traffics on the network have been taken, the P2P stream media technology develops rapidly and has obtained to use widely now, adopts the media file of P2P system to share the also rising rapidly thereupon of net flow that takies.Compare with the P2P file sharing network, because the real-time of bandwidth that need be higher, data and the media server number in the middle of the system are limited, the easier ddos attack that is subjected to of P2P stream media system.Ddos attack in the P2P stream media system is mainly aspect two, one side but for the ddos attack of media server, if part of nodes sends a large amount of requests to the media server of limited quantity and will make that the load of server is overweight or lost efficacy and can not provide due service to system in the system, just at this moment taken place for the ddos attack of server; On the other hand, in the middle of the P2P stream media system, because requesting node can unconfined transmission request, like this some node in the network just can be in system the different a large amount of requests of data set provider transmission, when data set provider returns media data, will take very big bandwidth.If one or more node has exhausted and all available uploaded bandwidth and make those optimum nodes can not get the data of being asked in the network, just at this moment local ddos attack has taken place.So for the P2P stream media system, should adopt distributed method to solve the ddos attack problem of existence.
Total be exactly safeguard the downloading rate of each node in the centre data library storage system and the maximum download rate that each node is allowed at very direct solution of the problems referred to above.Before request of response, whether each data set provider can be visited can have only under the situation about not surpassing and just can transmit data to requesting node above the maximum download rate of node after this central database rice is judged response request.But just not too suitable for this single central database of large-scale P2P stream media system, because there is the problem of Single Point of Faliure and shortage autgmentability in single database server.On the other hand, the performance of the node of system is different, some node can be good at providing data to other requesting nodes in data download, and some node comes the available bandwidth of consumption systems by sending a large amount of malicious requests, simultaneously do not provide data, so necessary performance according to them is distinguished for the node in the system to other nodes.
Present existing solution is just studied the traditional DoS attack that exists in the middle of the P2P stream media system, do not consider the distributivity of P2P system and ddos attack more may take place, and all be single, can not take precautions against ddos attack simultaneously server and system part at a kind of DoS attack wherein.Also fail simultaneously the comprehensive different manifestations of considering node in the P2P stream media system, the service of optimum node is affected.
Summary of the invention
The object of the present invention is to provide a kind of in the P2P stream media system method of defending DDoS (Distributed Denial of Service) attacks, this method can find malicious node timely and effectively control, also can very fast recovery even ddos attack to a certain degree occurred.
Of the present invention in the P2P stream media system method of defending DDoS (Distributed Denial of Service) attacks, comprising:
Node sends the step of the message that joins request to media server, media server is received the information that joins request of notice prestige node and this node of Control Node after the solicited message of new node, and node and an initial credit value of returning the low credit value of a part are given this requesting node;
The step of prestige node computing node credit value, notified prestige node and Control Node according to the P2P algorithm that is adopted (as adopting Chord, Pastry etc.) with the information stores of this requesting node in the node listing of oneself, so that estimate behavior with this node of control, having stored the prestige node of this nodal information can estimate the behavior of this node dynamically, calculate its credit value, and be divided into youngster's rank this rank is notified to corresponding control nodes, Control Node adopts corresponding P2P algorithm that this value is stored in its node listing, for the behavior of controlling this node provides foundation;
Node is to the step of media server or localized network request msg, it is just to server or the required media data of localized network request oneself after node adding system, for the ddos attack that better defence may exist, requesting node can only send request of data to the peer node close with own credit value here;
Control Node is judged the step of requesting node request rate, and requested Control Node is calculated the request rate of this node and upgraded timely;
Judge whether request rate surpasses the step of limit value, Control Node judges according to the higher limit that each credit rating is set whether the request rate of described request node surpasses this limit value, if surpass this limit value then stop the request of requesting node, otherwise, allow the request of requesting node.
Of the present invention in the P2P stream media system method of defending DDoS (Distributed Denial of Service) attacks, also comprise: the step of the credit value of the node that prestige node periodic test oneself is stored, the prestige node judges that according to the credit value of setting for the node of different brackets whether the node of being stored reaches the prestige of even higher level of node, is labeled as even higher level of node if reach with it.
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks be that also described node sends the hash ID value that the described request in the step of the message that joins request disappears and always comprises node, IP address, information such as the port of monitoring to media server.
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Chord algorithm with the information stores of this requesting node in the node listing of oneself.
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Pastry algorithm with the information stores of this requesting node in the node listing of oneself.
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the CAN algorithm with the information stores of this requesting node in the node listing of oneself.
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Kademlia algorithm with the information stores of this requesting node in the node listing of oneself
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Tapestry algorithm with the information stores of this requesting node in the node listing of oneself.
Of the present invention in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, the described step of judging that whether request rate surpasses limit value comprises: be requested node and judge the step that whether surpasses the upper limit of own uploading rate after providing service for requesting node, this step is used to be requested node and whether judges after providing service for requesting node the upper limit above the uploading rate of oneself; Be requested the step of querying node solicited message, this step is used to be requested the solicited message of node to corresponding control nodes query requests node, and solicited message mainly comprises the current request speed of node and the upward restriction of request rate; The step of Control Node query requests information, this step are used to be controlled in the solicited message that Control Node adopts corresponding P2P algorithm queries requesting node, return to after finding this information and are requested node; Be requested the step of node comparison of request information, the higher limit that this step is used to be requested node request rate that requesting node is current and request rate compares, just do not upload data to requesting node if current request rate surpasses the higher limit of request rate, otherwise do not provide data to requesting node.
Pass through such scheme, we have controlled the node in the system and have sent rate request for media server on the one hand, also controlled node on the other hand and sent rate request to system, simultaneously distinguish service that the node that makes malice can obtain seldom according to performance for the node in the system, and optimum node can obtain better service, can find malicious node so timely and effectively control, also can very fast recovery even ddos attack to a certain degree occurred.
Description of drawings
Fig. 1 be implement of the present invention in the P2P stream media system system topological figure of the method for defending DDoS (Distributed Denial of Service) attacks.
Fig. 2 be of the present invention in the P2P stream media system flow chart of the method for defending DDoS (Distributed Denial of Service) attacks.
Fig. 3 be of the present invention in the P2P stream media system node flow for authenticating ID figure of the method for defending DDoS (Distributed Denial of Service) attacks.
Fig. 4 be of the present invention in the P2P stream media system request rate of judging in the method for defending DDoS (Distributed Denial of Service) attacks whether surpass the flow chart of limit value.
Embodiment
Following with reference to accompanying drawing to of the present invention in the P2P stream media system embodiment of the method for defending DDoS (Distributed Denial of Service) attacks be elaborated.
Fig. 1 be implement of the present invention in the P2P stream media system system topological figure of the method for defending DDoS (Distributed Denial of Service) attacks.As shown in Figure 1, of the present invention in the P2P stream media system in the force method of defending DDoS (Distributed Denial of Service) attacks, according to node prestige situation node is fallen into three classes, prestige node, Control Node, ordinary node, the prestige node is because degrees of comparison is the highest, it is taken charge of dynamically the prestige situation of ordinary node, Control Node and prestige node is checked, the node that reaches the prestige node for credit rating is labeled as the prestige node with it, the node that credit rating is reached Control Node is labeled as Control Node with it, and other is an ordinary node.
Fig. 2 be of the present invention in the P2P stream media system flow chart of the method for defending DDoS (Distributed Denial of Service) attacks.The method of defending DDoS (Distributed Denial of Service) attacks in the P2P stream media system of this invention comprises: node sends the step S10 of the message that joins request to media server, node sends the message that joins request to media server, the hash ID value that comprises node in the request message, the IP address, the information of monitoring such as port, media server receive that node and an initial credit value of notifying the information that joins request of corresponding prestige node and this node of Control Node after the solicited message of new node and returning the low credit value of a part give requesting node; The step S20 of prestige node computing node credit value, receive the prestige node of the information that joins request of this node and Control Node according to the P2P algorithm that is adopted (as adopting Chord, Pastry, CAN, Kademlia, Tapestry etc.) with the information stores of requesting node in the node listing of oneself, so that estimate behavior with this node of control, having stored the prestige node of this nodal information can estimate the behavior of this node dynamically, calculate its credit value, and be divided into several levels this rank is notified to corresponding control nodes, Control Node adopts corresponding P2P algorithm that this value is stored in its node listing, for the behavior of controlling this node provides foundation; Node is to the step S30 of media server or localized network request msg, it is just to server or the required media data of localized network request oneself after node adding system, for the ddos attack that better defence may exist, requesting node can only send request of data to the peer node close with own credit value here; Control Node is judged the step S40 of requesting node request rate, and requested Control Node is calculated the request rate of this node and upgraded timely; Judge whether request rate surpasses the step S50 of limit value, Control Node judges according to the higher limit that each credit rating is set whether the request rate of described request node surpasses this limit value, if surpass this limit value then stop the request S60 of requesting node, otherwise, the request S70 of permission requesting node.
Fig. 3 be of the present invention in the P2P stream media system node flow for authenticating ID figure of the method for defending DDoS (Distributed Denial of Service) attacks.The credit value T (S110) of the node that prestige node periodic test oneself is stored, whether the credit value T of decision node reaches the threshold T 1 (S120) of Control Node, if reach it is not labeled as ordinary node S130, then, whether the credit value T of decision node reaches the threshold T 2 (S150) of prestige node, if reach the threshold value of prestige node it is labeled as prestige node (step S160), if do not reach the threshold T 2 of prestige node, then it is labeled as Control Node (step S170).
Of the present invention in the P2P stream media system in the method for defending DDoS (Distributed Denial of Service) attacks, judge that the step (S50) whether request rate surpasses limit value comprising: be requested node and judge the step S210 that whether surpasses the upper limit of own uploading rate after providing service for requesting node, this step is used to be requested node and whether judges after providing service for requesting node the upper limit above the uploading rate of oneself; Be requested the step S220 of querying node solicited message, this step is used to be requested the solicited message of node to corresponding control nodes query requests node, and solicited message mainly comprises the current request speed of node and the upward restriction of request rate; The step S230 of Control Node query requests information, this step is used for the solicited message that Control Node adopts corresponding P2P algorithm queries requesting node, returns to after finding this information and is requested node; Be requested the step S240 of node comparison of request information, the higher limit that this step is used to be requested node request rate that requesting node is current and request rate compares, just do not upload data to requesting node if current request rate surpasses the higher limit of request rate, otherwise do not provide data to requesting node.
More than explanation only is one embodiment of the present invention; can not limit the present invention, those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention; as long as in the scope that the present invention asked, all in protection scope of the present invention.
Claims (9)
1. the method for a defending DDoS (Distributed Denial of Service) attacks in the P2P stream media system comprises:
Node sends the step of the message that joins request to media server, media server is received the information that joins request of notice prestige node and this node of Control Node after the solicited message of new node, and node and an initial credit value of returning the low credit value of a part are given this requesting node;
The step of prestige node computing node credit value, notified prestige node and control system point according to the P2P algorithm that is adopted with the information stores of this requesting node in the node listing of oneself, so that estimate behavior with this node of control, having stored the prestige node of this nodal information can estimate the behavior of this node dynamically, calculate its credit value, and be divided into several levels this rank is notified to corresponding control nodes, Control Node adopts corresponding P2P algorithm that this value is stored in its node listing, for the behavior of controlling this node provides foundation;
Node is to the step of media server or localized network request msg, it is just to server or the required media data of localized network request oneself after node adding system, for the ddos attack that better defence may exist, requesting node can only send request of data to the peer node close with own credit value here;
Control Node is judged the step of requesting node request rate, and requested Control Node is calculated the request rate of this node and upgraded timely;
Judge whether request rate surpasses the step of limit value, Control Node judges according to the higher limit that each credit rating is set whether the request rate of described request node surpasses this limit value, if surpass this limit value then stop the request of requesting node, otherwise, allow the request of requesting node.
2. as claimed in claim 1 in the P2P stream media system method of defending DDoS (Distributed Denial of Service) attacks, also comprise: the step of the credit value of the node that prestige node periodic test oneself is stored, the prestige node judges according to the credit value of setting for the node of different brackets whether the node of being stored reaches the prestige of even higher level of node, if reach the node that it is labeled as upper level.
3. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, described node sends the hash ID value that described request message in the step of the message that joins request comprises node to media server, the IP address, information such as the port of monitoring.
4. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Chord algorithm with the information stores of this requesting node in the node listing of oneself.
5. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Pastry algorithm with the information stores of this requesting node in the node listing of oneself.
6. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the CAN algorithm with the information stores of this requesting node in the node listing of oneself.
7. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Kademlia algorithm with the information stores of this requesting node in the node listing of oneself.
8. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, in the step of described prestige node computing node credit value, notified prestige node and Control Node according to the Tapestry algorithm with the information stores of this requesting node in the node listing of oneself.
9. as claimed in claim 1 in the P2P stream media system feature of the method for defending DDoS (Distributed Denial of Service) attacks also be, the described step of judging that whether request rate surpasses limit value comprises: be requested node and judge the step that whether surpasses the upper limit of own uploading rate after providing service for requesting node, this step is used to be requested node and whether judges after providing service for requesting node the upper limit above the uploading rate of oneself; Be requested the step of querying node solicited message, this step is used to be requested the solicited message of node to corresponding control nodes query requests node, and solicited message mainly comprises the current request speed of node and the upward restriction of request rate; The step of Control Node query requests information, this step are used for the solicited message that Control Node adopts corresponding P2P algorithm queries requesting node, return to after finding this information and are requested node; Be requested the step of node comparison of request information, the higher limit that this step is used to be requested node request rate that requesting node is current and request rate compares, just do not upload data to requesting node if current request rate surpasses the higher limit of request rate, otherwise do not provide data to requesting node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710168979A CN101212302B (en) | 2007-12-21 | 2007-12-21 | Method of defense against DDoS attacks in P2P stream media system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200710168979A CN101212302B (en) | 2007-12-21 | 2007-12-21 | Method of defense against DDoS attacks in P2P stream media system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101212302A true CN101212302A (en) | 2008-07-02 |
CN101212302B CN101212302B (en) | 2012-09-12 |
Family
ID=39612011
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200710168979A Expired - Fee Related CN101212302B (en) | 2007-12-21 | 2007-12-21 | Method of defense against DDoS attacks in P2P stream media system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101212302B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101895541A (en) * | 2010-07-09 | 2010-11-24 | 浙江省公众信息产业有限公司 | Method for collaboratively resisting overlay layer DDoS attack in P2P network |
CN101902722B (en) * | 2009-05-25 | 2013-05-08 | 南京中兴软件有限责任公司 | Method for realizing roaming authentication of mobile terminal in wireless local area network and access point |
CN104009983A (en) * | 2014-05-14 | 2014-08-27 | 杭州安恒信息技术有限公司 | Detection method and system for CC attack |
WO2017035717A1 (en) * | 2015-08-29 | 2017-03-09 | 华为技术有限公司 | Distributed denial of service attack detection method and associated device |
CN108809923A (en) * | 2017-04-28 | 2018-11-13 | 卡巴斯基实验室股份制公司 | The system and method for traffic filtering when detecting ddos attack |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1154610A3 (en) * | 2000-05-12 | 2005-05-11 | International Business Machines Corporation | Methods and system for defeating TCP Syn flooding attacks |
CN1494291A (en) * | 2002-11-02 | 2004-05-05 | 深圳市中兴通讯股份有限公司 | Method of preventing reject service attack using ether net point to point protocol |
CN101018156A (en) * | 2007-02-16 | 2007-08-15 | 华为技术有限公司 | Method, device and system for preventing the broadband rejection service attack |
-
2007
- 2007-12-21 CN CN200710168979A patent/CN101212302B/en not_active Expired - Fee Related
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902722B (en) * | 2009-05-25 | 2013-05-08 | 南京中兴软件有限责任公司 | Method for realizing roaming authentication of mobile terminal in wireless local area network and access point |
CN101895541A (en) * | 2010-07-09 | 2010-11-24 | 浙江省公众信息产业有限公司 | Method for collaboratively resisting overlay layer DDoS attack in P2P network |
CN101895541B (en) * | 2010-07-09 | 2012-12-26 | 浙江省公众信息产业有限公司 | Method for collaboratively resisting overlay layer DDoS attack in P2P network |
CN104009983A (en) * | 2014-05-14 | 2014-08-27 | 杭州安恒信息技术有限公司 | Detection method and system for CC attack |
CN104009983B (en) * | 2014-05-14 | 2017-03-29 | 杭州安恒信息技术有限公司 | Detection method and its detecting system that a kind of CC is attacked |
WO2017035717A1 (en) * | 2015-08-29 | 2017-03-09 | 华为技术有限公司 | Distributed denial of service attack detection method and associated device |
CN108809923A (en) * | 2017-04-28 | 2018-11-13 | 卡巴斯基实验室股份制公司 | The system and method for traffic filtering when detecting ddos attack |
CN108809923B (en) * | 2017-04-28 | 2020-12-25 | 卡巴斯基实验室股份制公司 | System and method for filtering flow in DDoS attack detection |
Also Published As
Publication number | Publication date |
---|---|
CN101212302B (en) | 2012-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Karakaya et al. | Counteracting free riding in Peer-to-Peer networks | |
CN101212302B (en) | Method of defense against DDoS attacks in P2P stream media system | |
KR101200906B1 (en) | High Performance System and Method for Blocking Harmful Sites Access on the basis of Network | |
Gao et al. | Internet cache pollution attacks and countermeasures | |
CN110191116A (en) | Malicious node partition method and system calculate power verifying terminal and P2P network | |
Navaz et al. | An efficient intrusion detection scheme for mitigating nodes using data aggregation in delay tolerant network | |
Chen et al. | Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems | |
Li et al. | The new threat to internet: DNP attack with the attacking flows strategizing technology | |
Lagesse et al. | AREX: An adaptive system for secure resource access in mobile P2P systems | |
Yue et al. | P2P attack taxonomy and relationship analysis | |
Wang et al. | Further analyzing the sybil attack in mitigating peer-to-peer botnets | |
Pan et al. | FCAN: Flash crowds alleviation network using adaptive P2P overlay of cache proxies | |
CN106603429A (en) | Overload protection method for ACS (access control system) based on token bucket | |
Liang et al. | An effective and secure epidemic routing for disruption-tolerant networks | |
Kang et al. | An in-network collaborative verification mechanism for defending content poisoning in named data networking | |
CN112311798A (en) | Data block exchange method based on peer-to-peer hypermedia distribution protocol | |
Pecori et al. | A Balanced Trust‐Based Method to Counter Sybil and Spartacus Attacks in Chord | |
Bocek et al. | CompactPSH: An efficient transitive TFT incentive scheme for Peer-to-Peer Networks | |
CN101436926B (en) | Method, network node and system for preventing aggression in P2P network | |
He et al. | Reduction of Quality (RoQ) attacks on structured peer-to-peer networks | |
Yu et al. | A simple effective scheme to enhance the capability of web servers using p2p networks | |
Ghandar et al. | Performance analysis of observation based cooperation enforcement in ad hoc networks | |
Mäenpää et al. | Performance of REsource LOcation and Discovery (RELOAD) on mobile phones | |
Wang et al. | Ddos mitigation in content distribution networks | |
Kadobayashi | Achieving heterogeneity and fairness in Kademlia |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120912 Termination date: 20121221 |