G
Guillaume Doyen
Researcher at Centre national de la recherche scientifique
Publications - 70
Citations - 599
Guillaume Doyen is an academic researcher from Centre national de la recherche scientifique. The author has contributed to research in topics: The Internet & Scalability. The author has an hindex of 12, co-authored 66 publications receiving 518 citations. Previous affiliations of Guillaume Doyen include University of Technology of Troyes.
Papers
More filters
Journal ArticleDOI
A Survey and Synthesis of User Behavior Measurements in P2P Streaming Systems
TL;DR: A comparison and a synthesis of measurements of user behavior in Peer-to-Peer systems, followed by a survey on the user behavior measurements in these architectures are proposed.
Proceedings ArticleDOI
An optimal statistical test for robust detection against interest flooding attacks in CCN
TL;DR: The goal is to design a reliable, low resources-consuming detection method against Interest flooding attack in CCN, and like no other detectors in proposed solutions, this detector is based on statistical hypotheses testing theory.
Proceedings ArticleDOI
Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment
TL;DR: This paper proposes three realistic attack scenarios relying on both protocol design and implementation weaknesses and analyzes their impact on the different ICN nodes composing a realistic topology.
Proceedings ArticleDOI
Detection of interest flooding attacks in Named Data Networking using hypothesis testing
TL;DR: This paper focuses on the detection against Interest flooding - one of the most threatening attacks in NDN and a linear parametric model is proposed to estimate unknown parameters and to design a practical test for which the statistical performance is also provided.
Journal ArticleDOI
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking
Tan Nguyen,Hoang Long Mai,Remi Cogranne,Guillaume Doyen,Wissam Mallouli,Luong Nguyen,Moustapha El Aoun,Edgardo Montes de Oca,Olivier Festor +8 more
TL;DR: It is demonstrated in this paper through experimental assessments that there are still some ways to mount such an attack, and especially in the context of coupling NDN with IP, which can hardly be addressed by current solutions.