A Confidential and Efficient Query in the Large Scale Attack
P. Jayalakshmi1
Section:Research Paper, Product Type: Journal Paper
Volume-06 ,
Issue-02 , Page no. 34-37, Mar-2018
Online published on Mar 31, 2018
Copyright © P. Jayalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: P. Jayalakshmi , “A Confidential and Efficient Query in the Large Scale Attack,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.34-37, 2018.
MLA Citation
MLA Style Citation: P. Jayalakshmi "A Confidential and Efficient Query in the Large Scale Attack." International Journal of Computer Sciences and Engineering 06.02 (2018): 34-37.
APA Citation
APA Style Citation: P. Jayalakshmi , (2018). A Confidential and Efficient Query in the Large Scale Attack. International Journal of Computer Sciences and Engineering, 06(02), 34-37.
BibTex Citation
BibTex Style Citation:
@article{Jayalakshmi_2018,
author = {P. Jayalakshmi },
title = {A Confidential and Efficient Query in the Large Scale Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {34-37},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=201},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=201
TI - A Confidential and Efficient Query in the Large Scale Attack
T2 - International Journal of Computer Sciences and Engineering
AU - P. Jayalakshmi
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 34-37
IS - 02
VL - 06
SN - 2347-2693
ER -




Abstract
YouTube, with large number of content creators, has turn into the ideal destination for watching videos online. Through the associate program, YouTube allows pleased creators to monetize their popular videos. Of significant consequence for content creators is which meta-level features (e.g. title, tag, thumbnail) are most receptive for promoting video status. The attractiveness of videos also depends on the social dynamics, i.e. the interface of the content creators (or channels) with YouTube users. The peer to peer (P2P) file distribution applications have owed a considerable amount of today’s Internet traffic. Along with various P2P file sharing protocols, BitTorrent is the mainly widespread and trendy one that attracts monthly a quarter of a billion users from all over the world. Comparable to other P2P file sharing protocols, BitTorrent is frequently used for unlawful sharing of copyright protected files such as movies, music and TV series. To obstruct this enormous amount of illegal file distributions, anti-P2P companies have arisen to place against these applications (specially the BitTorrent). And our proposed approach Diffie Hellman algorithm ensures the secure transmission of data over a secure channel and enhances the performance of this proposed approach.
Key-Words / Index Term
References
[1] (2014, March 16) An estimate of infringing use of the internet. [Online]. Available: http://documents.envisional.com/docs/ Envisional-Internet Usage-Jan2011.pdf
[2] (2014, March 16) Google trends. [Online].Available:http://www.google.com/trends/explore#q=BitTorrent,kazaa,gnutella,edonkey,opennap&date=today%2012-m&cmpt=q
[3] (2014, Jan 5) BitTorrent. [Online]. Available: http://en. wikipedia.org/wiki/ Bit Torrent
[4] (2014, March 16) The eclipse foundation open source community website. [Online]. Available: http://eclipse.org
[5] (2014, March 16) Linux.org website. [Online]. Available: http://linux.org
[6] (2014, March 16) Comparison of BitTorrent clients. [Online]. Available: http://en.wikipedia.org/wiki/Comparison of BitTorrent clients
[7] P. Dhungel, D. Wu, and K. W. Ross, “Measurement and mitigation of Bit Torrent leecher attacks,” Computer Communications, vol. 32, no. 17, pp. 1852–1861, 2009.
[8] G. Siganos, J. M. Pujol, and P. Rodriguez, “Monitoring the BitTorrent monitors: A bird’s eye view,” in Passive and Active Network Measurement. Springer, 2009, pp. 175–184.
[9] (2014, March 16) Media defenders official website.[Online].Available: http://www.mediadefender.com
[10] (2014, March 16) Copyright at mit. [Online].Available:http://web.mit.edu/copyright/dmca-notices.html