참고문헌
- H. Schulze and K. Mochalski. "iPoq Internet Study 2007," http://www.ipoque.com/userfiles/file/ internet_study_2007.pdf, Dec. 2007.
-
"BitTorrent Acquires
$\mu Torrent$ ," http://www.bittorrent.com/pressreleases/2006/12/06/bittorrent -acquires-%C2%B5torrent, Dec. 2006. - T. Claburn. "Fake mp3 Trojan detected on 27% of PCs," http://www.informationweek.com/story/show.jhtml? ID=207600502, May 2008.
- L. Page, S. Brin, R. Motwani and T. Winograd, "The PageRank citation ranking: Bring order to the Web," in Proc. of the 7th International World Wide Web Conf., Apr. 1998.
- A. Cheng and E. Friedman, "Sybilproof reputation mechanisms," in SIGCOMM 05 Workshop, Aug. 2005.
- M. Oiaga. "eBay Bot Fraud - positive feedback is used as an incentive to attract victims," http://news.softpedia.com/news/eBay-Bot-Fraud-31711.shtml, Aug. 2006.
- H. Yu, M. Kaminsky, B. P. Gibbons and A. Flaxman, "SybilGuard: Defending against sybil attacks via social networks," in ACM SIGCOMM, Sept. 2006.
- H. Yu, P. Gibbons, M. Kaminsky and F. Xiao, "SybilLimit: A near-optimal social network defense against sybil attacks," in Proc. of the 2008 IEEE Symposium on Security and Privacy, May 2008.
- G. Danezis, C. Lesniewski-Laas, F. M. Kaashoek and R. Anderson, "Sybil-resistant DHT routing," in ESORICS, Sept. 2005.
- H. Rowaihy, W. Enck, P. McDaniel and L. T. Porta, "Limiting sybil attacks in structured p2p networks," in INFOCOM Mini-Symposium, May 2007.
- D. S. Kamvar, T. M. Scholosser and H. Garcia-Molina, "The EigenTrust algorithm for reputation management in P2P networks," in Proc. of the 12th International Conference on World Wide Web, May 2003.
- D. S. Kamvar, T. M. Scholosser and H. Garcia-Molina, "The EigenTrust algorithm for reputation management in P2P networks," in Proc. of the 12th International Conference on World Wide Web, May 2003.
- N. B. Levine, C. Shields and B. N. Margolin, "A survey of solutions to the sybil attack," Univ. of Massachusetts Amherst, Tech report 2006-052, Oct. 2006.
- B. N. Margolin and N. B. Levine, "Informant: detecting sybils using incentives," in Proc. of Financial Cryptography (FC), Feb. 2007.
- T. Kohno, A. Broido and K. Claffy, "Remote physical device fingerprinting," in Proc. of IEEE Symposium on Security and Privacy, May 2005.
- C. Hota, J. Lindqvist, K. Karvonen, A. Yla-Jaaski and J. C.K. Mohan, "Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing," in Proc. of International Conf. on Networking, Architecture, and Storage, Aug. 2007.
- Qinyuan Feng and Yafei Dai, "LIP: A LIfetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems," in Proc. of International Workshop on Peer-To-Peer Systems, Feb. 2007.
- S. Saroiu, P. K. Gummadi and S. D. Gribble, "A measurement study of peer-to-peer file sharing systems," in Proc. of Multimedia Computing and Networking (MMCN), Jan. 2002.
- N. Sarshar, O. P. Boykin and P. V. Roychowdhury, "Percolation search in power law networks: Making unstructured peer-to-peer networks scalable," in Proc. of the 4th International Conf. on Peer-to-Peer Computing (P2P), Aug. 2004.
- C. Gkantsidis, M. Mihail and A. Saberi, "Random walks in peer-to-peer networks," in Proc. of Thenty-third Annual Joint Conf. of the INFOCOM, Mar. 2004.
- Q. Lv, P. Cao, E. Cohen, K. Li and S. Shenker, "Search and replication in unstructured peer-to-peer networks," in Proc. of International Conf. on Supercomputing, June 2002.
- Y. Chawathe, S. Ratnasamy, N. L. B. Lanham and S. Shenker, "Making gnutella-like p2p systems scalable," in Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications, Aug. 2003.
- C. Gkantsidis, M. Mihail and A. Saberi, "Random walks in peer-to-peer networks: Algorithms and evaluation," Performance Evaluation, vol. 63, no. 3, pp. 241-263, Mar. 2006. https://doi.org/10.1016/j.peva.2005.01.002
- D. Tsoumakos and N. Roussopoulos, "Adaptive probabilistic search for peer-to-peer networks," in Proc. of the 3rd International Conf. on Peer-to-Peer Computing (P2P), Sept. 2003.
- S. Jin and H. Jiang, "Novel approaches to efficient flooding search in peer-to-peer networks," The International Journal of Computer and Telecommunications Networking, vol. 51, no. 10, pp. 2818-2832, July 2007.
- L. Adamic, R. Lukose and B. Huberman, "Search in power-law networks," Physical Review, vol. 64, no. 4, p. 046135, Sept. 2001.
- Michalis Faloutsos, Petros Faloutsos and Christos Faloutsos, "On power-law relationships of the Internet topology," in Proc. of ACM SIGCOMM, Aug. 1999.
- Lazaros K Gallos, Reuven Cohen, Panos Argyrakis, Armin Bunde and Shlomo Havlin, "Stability and Topology of Scale-Free Networks under Attack and Defense Strategies," Physical Review Letters, vol. 94, no. 18, p. 188701, May 2005. https://doi.org/10.1103/PhysRevLett.94.188701
- M. R. Christley, L. G. Pinchbeck, G. R. Bowers, D. Clancy, P. N. French, R. Bennett and J. Turner, "Infection in Social Networks: Using Network Analysis to Identify High-Risk Individuals," American Journal of Epidemiology, vol. 162, no. 10, pp. 1024-1031, Sept. 2005. https://doi.org/10.1093/aje/kwi308
- M. Ripeanu, "Peer-to-peer architecture case study: Gnutella network," in Proc. of the 1st International Conf. on Peer-to-Peer Computing (P2P), Aug. 2001.
- T. M. Schlosser, E. T. Condie and D. S. KIamvar, "Simulating a file-sharing p2p network," in Porc. of Workshop in Semantics in Peer-to-Peer and Grid computing, Dec. 2002.
- A. Barabasi and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, Oct.1999. https://doi.org/10.1126/science.286.5439.509
- A. Fast, Jensen D. and N. B. Levine, "Creating social networks to improve peer-to-peer networking," in Proc. of the eleventh International Conf. on Knowledge Discovery in Data Mining (SIGKDD), Aug. 2005.
- "OpenNap: Open source napster server," http://opennap.sourceforge.net, September 2001.
- A. Iamnitchi, M. Ripeanu and I. Foster, "Small-world file-sharing communities," in Proc. of The 23rd Conf. of the IEEE Communication Society (INFOCOM), Mar. 2004.