{"title":"A long track on backbone nodes of content sharing networks","authors":"Qiang Lu, Bo Liu, Huaping Hu","doi":"10.1109/ICCSNT.2017.8343728","DOIUrl":null,"url":null,"abstract":"As a kind of sharing platform for files, information and resources, Content Sharing Networks (CSNs) are faced with a serious security situation of swarming malicious files, illegal information and spywares, especially the mainstream P2P (Peer-to-Peer) CSNs. Apart from the familiar importance for the rapid development and wide application of CSNs, backbone nodes should have been paid more attention for their significance to monitor and mitigate malicious sharing contents. In this paper, we proposed a comprehensive and effective determining method named MED to distinguish backbone nodes during the longest ever tracking and in-depth analysis of CSNs for nearly four years.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSNT.2017.8343728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As a kind of sharing platform for files, information and resources, Content Sharing Networks (CSNs) are faced with a serious security situation of swarming malicious files, illegal information and spywares, especially the mainstream P2P (Peer-to-Peer) CSNs. Apart from the familiar importance for the rapid development and wide application of CSNs, backbone nodes should have been paid more attention for their significance to monitor and mitigate malicious sharing contents. In this paper, we proposed a comprehensive and effective determining method named MED to distinguish backbone nodes during the longest ever tracking and in-depth analysis of CSNs for nearly four years.