摘要 |
<p>The method involves receiving a filtering request of a data flow from malicious presumed terminals (20, 21) belonging to an overlapping network e.g. peer-to-peer network, superimposed to underlying communication networks (1, 2), where the request is transmitted by another terminal (10) belonging to an overlapping network. Nodes i.e. routers (30-33), of the communication networks are determined, where the nodes filter the data flow. A filtering control of the data flow is sent to the determined nodes. Independent claims are also included for the following: (1) an undesirable data flow controlling system comprising a terminal (2) a program comprising a set of instructions to perform a method of controlling unwanted data flow (3) a recording medium comprising a set of instructions to perform a method of controlling unwanted data flow.</p> |