scispace - formally typeset
G

Guillaume Doyen

Researcher at Centre national de la recherche scientifique

Publications -  70
Citations -  599

Guillaume Doyen is an academic researcher from Centre national de la recherche scientifique. The author has contributed to research in topics: The Internet & Scalability. The author has an hindex of 12, co-authored 66 publications receiving 518 citations. Previous affiliations of Guillaume Doyen include University of Technology of Troyes.

Papers
More filters
Journal ArticleDOI

A Survey and Synthesis of User Behavior Measurements in P2P Streaming Systems

TL;DR: A comparison and a synthesis of measurements of user behavior in Peer-to-Peer systems, followed by a survey on the user behavior measurements in these architectures are proposed.
Proceedings ArticleDOI

An optimal statistical test for robust detection against interest flooding attacks in CCN

TL;DR: The goal is to design a reliable, low resources-consuming detection method against Interest flooding attack in CCN, and like no other detectors in proposed solutions, this detector is based on statistical hypotheses testing theory.
Proceedings ArticleDOI

Content Poisoning in Named Data Networking: Comprehensive characterization of real deployment

TL;DR: This paper proposes three realistic attack scenarios relying on both protocol design and implementation weaknesses and analyzes their impact on the different ICN nodes composing a realistic topology.
Proceedings ArticleDOI

Detection of interest flooding attacks in Named Data Networking using hypothesis testing

TL;DR: This paper focuses on the detection against Interest flooding - one of the most threatening attacks in NDN and a linear parametric model is proposed to estimate unknown parameters and to design a practical test for which the statistical performance is also provided.
Journal ArticleDOI

Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking

TL;DR: It is demonstrated in this paper through experimental assessments that there are still some ways to mount such an attack, and especially in the context of coupling NDN with IP, which can hardly be addressed by current solutions.