R. Badonnel, R. State, I. Chrisment, and O. Festor, A Management Platform for Tracking Cyber Predators in Peer-to-Peer Networks, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), 2007.
DOI : 10.1109/ICIMP.2007.2

URL : https://hal.archives-ouvertes.fr/inria-00153620

T. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, AIMS 2009: 3rd International Conference on Autonomous Infrastructure, Management and Security, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

J. R. Douceur, The Sybil Attack, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

F. , L. Fessant, A. Kermarrec, and L. Massouli, Clustering in peer-topeer file sharing workloads, Proceedings of IPTPS, 2004.

M. Latapy, O. Allali, and C. Magnien, Measurement of edonkey activity with distributed honeypots Sixth International Workshop on Hot Topics in Peer-to-Peer Systems, HOTP2P 2009, 2009.

S. Le-blond, J. Guillaume, and M. Latapy, Clustering in P2P Exchanges and Consequences on Performances, IPTPS, pp.193-204, 2005.
DOI : 10.1007/11558989_18

URL : https://hal.archives-ouvertes.fr/hal-00016820

H. Lee and T. Nam, P2P Honeypot to Prevent Illegal or Harmful Contents From Spreading in P2P network, The 9th International Conference on Advanced Communication Technology, pp.497-501, 2007.
DOI : 10.1109/ICACT.2007.358403

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

S. Saroiu, K. P. Gummadi, and S. D. Gribble, A measurement study of peer-to-peer file sharing systems, MMCN '02, 2002.

S. Sen and J. Wang, Analyzing Peer-To-Peer Traffic Across Large Networks, IEEE/ACM Transactions on Networking, vol.12, issue.2, pp.219-232, 2004.
DOI : 10.1109/TNET.2004.826277

M. Steiner, T. E. Najjary, and E. W. Biersack, A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007.
DOI : 10.1145/1298306.1298323

M. Steiner, T. E. Najjary, and E. W. Biersack, Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007.
DOI : 10.1145/1290168.1290176

D. Stutzbach and R. Rejaie, Capturing accurate snapshots of the gnutella network, 8th IEEE Global Internet Symposium, 2005.

D. Stutzbach and R. Rejaie, Improving lookup performance over a widelydeployed dht, INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006.

D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.189-202, 2006.
DOI : 10.1145/1177080.1177105

P. Wang, J. Tyra, E. Chan-tin, T. Malchow, D. Foo-kune et al., Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008.
DOI : 10.1145/1460877.1460907

J. Yang, H. M. , W. Song, J. Cui, and C. Zhou, Crawling the eDonkey Network, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops, pp.133-136, 2006.
DOI : 10.1109/GCCW.2006.29

I. Centre-de-recherche, I. Nancy, ?. Est, and L. , Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-lès