Open Access   Article Go Back

A Confidential and Efficient Query in the Large Scale Attack

P. Jayalakshmi1

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 34-37, Mar-2018

Online published on Mar 31, 2018

Copyright © P. Jayalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Jayalakshmi , “A Confidential and Efficient Query in the Large Scale Attack,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.34-37, 2018.

MLA Style Citation: P. Jayalakshmi "A Confidential and Efficient Query in the Large Scale Attack." International Journal of Computer Sciences and Engineering 06.02 (2018): 34-37.

APA Style Citation: P. Jayalakshmi , (2018). A Confidential and Efficient Query in the Large Scale Attack. International Journal of Computer Sciences and Engineering, 06(02), 34-37.

BibTex Style Citation:
@article{Jayalakshmi_2018,
author = {P. Jayalakshmi },
title = {A Confidential and Efficient Query in the Large Scale Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {34-37},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=201},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=201
TI - A Confidential and Efficient Query in the Large Scale Attack
T2 - International Journal of Computer Sciences and Engineering
AU - P. Jayalakshmi
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 34-37
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

YouTube, with large number of content creators, has turn into the ideal destination for watching videos online. Through the associate program, YouTube allows pleased creators to monetize their popular videos. Of significant consequence for content creators is which meta-level features (e.g. title, tag, thumbnail) are most receptive for promoting video status. The attractiveness of videos also depends on the social dynamics, i.e. the interface of the content creators (or channels) with YouTube users. The peer to peer (P2P) file distribution applications have owed a considerable amount of today’s Internet traffic. Along with various P2P file sharing protocols, BitTorrent is the mainly widespread and trendy one that attracts monthly a quarter of a billion users from all over the world. Comparable to other P2P file sharing protocols, BitTorrent is frequently used for unlawful sharing of copyright protected files such as movies, music and TV series. To obstruct this enormous amount of illegal file distributions, anti-P2P companies have arisen to place against these applications (specially the BitTorrent). And our proposed approach Diffie Hellman algorithm ensures the secure transmission of data over a secure channel and enhances the performance of this proposed approach.

Key-Words / Index Term

References

[1] (2014, March 16) An estimate of infringing use of the internet. [Online]. Available: http://documents.envisional.com/docs/ Envisional-Internet Usage-Jan2011.pdf
[2] (2014, March 16) Google trends. [Online].Available:http://www.google.com/trends/explore#q=BitTorrent,kazaa,gnutella,edonkey,opennap&date=today%2012-m&cmpt=q
[3] (2014, Jan 5) BitTorrent. [Online]. Available: http://en. wikipedia.org/wiki/ Bit Torrent
[4] (2014, March 16) The eclipse foundation open source community website. [Online]. Available: http://eclipse.org
[5] (2014, March 16) Linux.org website. [Online]. Available: http://linux.org
[6] (2014, March 16) Comparison of BitTorrent clients. [Online]. Available: http://en.wikipedia.org/wiki/Comparison of BitTorrent clients
[7] P. Dhungel, D. Wu, and K. W. Ross, “Measurement and mitigation of Bit Torrent leecher attacks,” Computer Communications, vol. 32, no. 17, pp. 1852–1861, 2009.
[8] G. Siganos, J. M. Pujol, and P. Rodriguez, “Monitoring the BitTorrent monitors: A bird’s eye view,” in Passive and Active Network Measurement. Springer, 2009, pp. 175–184.
[9] (2014, March 16) Media defenders official website.[Online].Available: http://www.mediadefender.com
[10] (2014, March 16) Copyright at mit. [Online].Available:http://web.mit.edu/copyright/dmca-notices.html