一种安全的半分布式P2P系统体系结构及关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
Peer-to-Peer(P2P)系统是一种利用参与者的计算、存储和传输能力进行资源共享、数据计算的分布式系统。它在文件共享、流媒体服务和分布式计算领域得到了广泛的应用。P2P系统在发展同时也面临着安全挑战,它遭受着女巫攻击、free-riding(搭便车)资源污染、蠕虫病毒传播等多种攻击的侵害。在P2P系统的三种结构中,半分布式P2P系统,因具有多个超级节点,使得系统稳定性较高,且易于实现安全策略而成为较为流行一种结构。本文以解决P2P系统中的安全问题为研究动机,以半分布式P2P系统为研究对象,以研究分析该系统中的安全缺陷为基础,提出一套适合半分布式P2P系统的安全体系结构并深入研究该体系结构中的关键技术。
     本文通过研究分析恶意用户攻击P2P系统所利用的安全缺陷,提出了P2P系统中广泛存在的三大安全问题:身份管理问题、激励机制反应速度问题以及用户路由表问题。以研究解决这三大安全问题为出发点,提出了一套以用户身份数量的有穷性为保障,以激励机制为手段,以统一的系统服务为接口,适用于半分布式P2P系统的安全的体系结构。能有效地阻止恶意用户进入系统,缩小了系统遭受攻击的损失。
     针对半分布式P2P系统中的身份管理问题,本文提出一种基于用户设备向量的身份管理机制。该方法通过参考犯罪成本理论,分析了恶意用户为攻击系统而更换计算设备的可能。以不均衡的犯罪收益/成本比率为支撑,以用户所能持有的设备数量有穷为基础,限定了用户能够产生的身份识别符号数量。该机制将用户的所有设备归纳成集合,通过用户当前所登录系统的设备对用户的身份进行识别,达到自动识别用户身份的目标。这一身份管理机制使得恶意用户不再能无限地产生身份,从而有效地降低了恶意用户对系统的影响,约束了恶意用户的攻击行为,使得激励机制有了可靠的底层服务。实验结果表明,对比目前主流的谜题破解方案,提出的身份管理机制更能有效地限制恶意用户身份的总数量。
     针对激励机制反应速度不足的问题,本文提出基于恶意行为记忆因子的激励机制。通过对用户之间最近一段时期内发生的不满意服务情况进行积累和全局统筹,提出了恶意行为记忆因子的概念。以恶意行为记忆因子为基础,改进了现有的激励机制,使得恶意用户对系统产生的负面影响能够被系统进行记录,从而导致更换了新身份的恶意用户或者其他恶意用户将受到以往负面行为的影响,加快这些用户信任值扣除的速度,达到加速恶意用户死亡的目的。改进后的激励机制,增强了系统对攻击的反应能力与反应速度,彼此独立的恶意用户对系统实施的攻击行为将由恶意行为记忆因子进行关联,使得后续的攻击行为所遭受的惩罚力度加大,从而保证了系统安全。实验结果表明,通过引入恶意行为记忆因子,激励机制能够更快速地驱逐恶意用户。此外,当与身份管理机制进行配合时能够将恶意用户的身份数量控制在更低的水平。
     针对用户路由表安全问题,本文提出了基于来源可信度的节点交换机制。节点交换是目前半分布式P2P系统中更新邻居节点列表最流行的方式。通过引入来源可信度的概念,突出了来源节点的重要性,使得系统目前的节点交换算法具有了量化的选择标准。通过改进系统现有的节点交换算法,筛选掉不合格的邻居节点,增强了系统节点交换功能的安全性,使得恶意用户难以通过节点交换对系统产生进一步影响。实验结果表明,对比系统原有节点交换方案,本文提出的方案更能有效地避免恶意用户被选入交换集中。
Peer-to-Peer (abbr. P2P) system is a distributed system which uses users’ leisurebandwidth and storage to share resources. P2P system has vast application family infile sharing, streaming and distribution computing. Along with the development, P2Psystem faces many challenges: the sybil attack, resource pollution and worms. Amongthree of P2P system structure, Semi-P2P showed its advantage. The supernode-peerstructure makes it more stable and easy to realize security strategy. In the motivationof solving security issues in Semi-P2P system, this dissertation mainly focuses onproposing a secure architecture for Semi-P2P and its key technology.
     Based on analysis of leaks exploited by the attacker, this dissertation proposesthree prime security problems, which are identity management problem, the slowreaction speed of incentive mechanism and peer router problem. For solving theseproblems, a Semi-P2P orient secure architecture is proposed. The architecture makesthe finite of number of users’ identities as backbone; uses incentive mechanism asmethod for identifying attacker; provides a unified interface to upper layerapplications. The architecture can prevent malicious user from entering systemeffectively whereby avoid compromising system performance.
     To solving identity management problem, this dissertation proposes an identitymanagement mechanism base on user’s device vector. By introducing crime theory,this dissertation analyzes the possibility of purchasement of a new device for anattacker after an attack. Due to the imbalance between profit and cost, making thefinite of number of users’ devices as basic assumption, the mechanism effectivelylimits the number of identities one single user can gain. The mechanism collectsdevices of a user into a set. By using the set and the device user logged on, the modelcan automatically recognize the user. Due to the finite of identities number, attackercannot attack the system easily. As a result, the reliable backbone of incentivemechanism is established. Experiment results showed that, comparing with puzzle,which is the popular identity management method in P2P, the mechanism proposed inthis dissertation can limit the number of users’ identities into a reasonable finitenumber.
     To improve incentive mechanism reaction speed, this dissertation proposes animproved incentive mechanism based on malicious action memory factor. By accumulating of dissatisfying service received by system users, the concept ofmalicious action memory factor is proposed. Based on the factor, this dissertationimproves current incentive mechanism. The factor works as memory of attacked log.Every attack would increase the factor whereby further attacking behavior gains moresevere punishment. The improved incentive mechanism showed its speedy whenencounter an attack. The attack come from different attackers would be linked,making further attack receive harsh punishment. Experimental results showed that, byusing the factor, the improved incentive mechanism expel attacker quicker. By thehelp of identity management, the improved incentive mechanism can control thecount of attackers to a lower level.
     To solving peer router problem, this dissertation proposes an improve peerexchange mechanism base on the source trust. Peer exchange is the most used peerrouter update method in P2P system. Based introducing the source trust, the importantof the source of a peer is emphasized. Source trust works as a ruler in peer exchangeoperation. By expelling low source trust value peers from the exchange set, thesecurity of peers’ route table can be guaranteed. Experiment results showed that,comparing with the current peer exchange approach, the approach proposed in thisdissertation can reduce the attackers’ peer from being exchanged.
引文
[1]陆志伟.对等网络Chord协议的改进及应用[D].南京:南京理工大学.2008.
    [2] Jin Li. Xin Zhang, Zuo Xiao-Liang,等. Using packet size distribution to identify P2P-TVtraffic[C]//2nd International Conference on Cyber-Enabled Distributed Computing andKnowledge Discovery, CyberC2010. October10-12,2010, Huangshan, China, NJ:IEEEComputer Society,2012,150-155.
    [3] Byun Haesun, Lee Meejeong. A tracker-based P2P system for live multimedia streamingservices[C]//13th International Conference on Advanced Communication Technology: SmartService Innovation through Mobile Interactivity, ICACT2011, Proceeding. February13-16,2011. Gangwon-Do, Korea, Republic of. NY: Institute of Electrical and ElectronicsEngineers Inc,2011,1608-1613.
    [4]鲁刚,张宏莉,叶麟. P2P流量识别[J].软件学报,201122(6):1281–1298.
    [5] Mochalski K, Schulze H. Ipoque internet study2008/2009[R/OL].2009,http://www.ipoque.com/resources/internet-studies/internet-study-2008_2009
    [6] MacManus R. Trend watch: P2P traffic much bigger than Web traffic[R/OL].2006,http://www.readwriteweb.com/archives/p2p_growth_trend_watch.php
    [7]孙知信,宫婧.一种基于流特性描述的P2P流量模糊识别方法[J].计算机学报,2008,31(7):1251–1260.
    [8] Xu Ke, Zhang Ming, Ye Ming-jiang,等. Identify P2P traffic by inspecting data transferbehavior[J]. Computer Communications,33(10):1141-1150.
    [9] Lee. Hyunyong, Nakao, Akihiro. ISP-driven delay insertion for P2P traffic localization[J],IEICE Transactions on Communications,2013, E96-B(1):40-47.
    [10]王丹奇.P2P流媒体中覆盖网优化和数据传输机制的研究[D].中国科学院计算技术研究所.2008.
    [11]张涵.集中式P2P网络的拓扑发现客户端测量模块的设计与实现[D].北京:北京工业大学.2008.
    [12]刘辰. BT流量监控系统研究[D].北京:北京工业大学.2008.
    [13]姜志宏,王晖,樊鹏翼.基于爬行器的大规模P2P IPTV测量[J].软件学报,2011,22(6):1373-1388.
    [14] iRearch.2012年4月下载工具软件行业排名Top10.[DB/OL]http://www.199it.com/archives/11733.html
    [15] iRearch.2012年10月下载工具软件行业排名Top10[DB\OL].http://www.199it.com/archives/81570.html
    [16] Feng Liju, Yang Jie, Zhou Wen-li. Research on active monitoring based QQLive real-timeinformation acquisition system[C]\\Proceedings of2009IEEE International Conference onNetwork Infrastructure and Digital Content, IEEE IC-NIDC2009. November6-8,2009,Beijing, China.307-311.NJ:IEEE Computer Society,2009,307-311.
    [17] Yang Jie, Li Yin-Zhou, Dong Chao. The impact of typical applications on network traffic[J],Journal of China Universities of Posts and Telecommunications,2012,19(2):98-103+181.
    [18] Spoto Salvatore, Gaeta Rossano, Grangetto Marco,等. Analysis of PPLive through activeand passive measurements[C]\\IPDPS2009-Proceedings of the2009IEEE InternationalParallel and Distributed Processing Symposium. May23-29,2009, Rome, Italy. NJ:IEEEComputer Society,2009.
    [19]胡超,陈鸣,许博,等.一种基于爬虫的分布式PPLive流实时检测系统[J].解放军理工大学学报(自然科学版),2008,9(5):512–516.
    [20]皮皮影视[OL], http://www.pipi.cn/
    [21] Liu Zimu, Wu Chuan2, Li Baochun,等. UUSee: Large-scale operational on-demandstreaming with random network coding[C]\\Proceedings-IEEE INFOCOM, March14-19,2010, San Diego, CA, United states. NJ:Institute of Electrical and Electronics Engineers Inc,2010.
    [22] Ketmaneechairat Hathairat. A survey and comparison of some popular IPTVapplications[C]\\Proceedings-20128th International Conference on Computing Technologyand Information Management, ICCM2012, April24-26,2012, Seoul, Korea, Republic of.Washington, DC:IEEE Computer Society,2012,58-63.
    [23] Liu Zimu, Wu Chuan, Li Baochun,等. Distilling superior peers in large-scale P2P streamingsystems[C]\\Proceedings-IEEE INFOCOM, April19-25,2009, Rio de Janeiro, Brazil. NJ:Institute of Electrical and Electronics Engineers Inc,2009,82-90.
    [24] Adami Davide, Callegari Christian, Giordano Stefano,等. Skype-Hunter: A real-time systemfor the detection and classification of Skype traffic[J]. International Journal ofCommunication Systems.2012,25(3),386-403.
    [25]毛军鹏,崔艳莉,马祥杰,等. Skype网络流量测量及特征发现[J].计算机工程,2008,34(18):142-144.
    [26] John L. Miller. Jon Crowcroft. The Near-Term Feasibility of P2P MMOG’s[J/OL], Microsoftresearch.2010.
    [27]360杀毒软件. http://www.360.cn
    [28]郭振滨,裘正定. P2P资源流行度测量与建模[J].通信学报,2009,30(3):66-74.
    [29]郜文彬.基于BitTorrent协议的P2P网络主动测量的研究与实现[D].北京:北京工业大学.2008.
    [30]杨明亮,陈兴蜀,王文贤,等. BitTorrent网络主动测量技术与特性分析[J].计算机应用研究,2010,27(6):2232-2235.
    [31] Hu Guang-Jun, Xu Guo-Ai, Shi Jian-Kun,等. BitTorrent network topology activemeasurement method[C]\\2011International Conference on Consumer Electronics,Communications and Networks, CECNet2011-Proceedings, April16-18,2011, XianNing,China. NJ:IEEE Computer Society,2011,127-129.
    [32] Yang Jia, Ma Hao, Song Wei-jia,等. Crawling the eDonkey network[C]\\Proceedings-FifthInternational Conference on Grid and Cooperative Computing, GCC2006-Workshops,October21-23,2006, Hunan, China. NJ:Inst. of Elec. and Elec. Eng. Computer Society.2006,133-136.
    [33]刘祥涛,程学旗,李洋,等. eMule网络最佳节点标识[J].软件学报,2011,22(9):2121-2135.
    [34]俞燕燕,李绍滋. eMule系统的协议分析[J].合肥工业大学学报(自然科学版),2006,29(9):1096–1110.
    [35] Sheng Li-jie, Song Jian-feng; Dong Xue-wen,等. eMule simulator: A practical way to studythe eMule system[C]\\9th International Conference on Networks, ICN2010, April11-16,2010, Menuires, France. NJ:IEEE Computer Society,83-88.
    [36]谈广云,许华虎,高珏. P2P流媒体直播系统的组播树构建及设计[J].上海大学学报(自然科学版),2010,16(1):91-96.
    [37] Good Nathaniel S., Krekelberg Aaron. Usability and privacy: A study of KaZaA P2Pfile-sharing[C]\\Conference on Human Factors in Computing Systems-Proceedings, April5-10,2003, Ft. Lauderdale, FL, United states. NY:Association for Computing Machinery,2003,137-144.
    [38]黄道颖,张安琳,黄建华等.P2P网络Gnutella0.6模型研究[J].计算机应用与软件,2008,25(6):208-210.
    [39] http://zh.wikipedia.org/wiki/Gnutella[OL]
    [40]霍英,施宜. NeuroGrid中Gnutella0.6协议的扩展实现[J].《微电子学与计算机》,2006,24(6):126-128.
    [41]杨峰,李凤霞,余宏亮,等.一种基于分布式哈希表的混合对等发现算法[J].软件学报,2007,18(3):714-721.
    [42] Wu Qi; Chen Xing-shu. Advanced distributed crawling system for KAD network[J], Journalof Computational Information Systems.2011,7(3):677-684.
    [43]刘斯伟.基于测量的eMule/Kad网络k桶特性研究[D].北京:北京交通大学.2008.
    [44] Stoica Ion, Morris Robert, Karger David,等. Chord: A scalable peer-to-peer lookup servicefor internet applications[C]\\ACM SIGCOMM2001-Applications, Technologies,Architectures, and Protocols for Computers Communications, August27-31,2001, SanDiego, CA, United states. NY:Association for Computing Machinery,2001,149-160
    [45] Jünemann Konrad, Andelfinger Philipp, Dinger Jochen,等. BitMON: A tool for automatedmonitoring of the BitTorrent DHT[C]\\2010IEEE10th International Conference onPeer-to-Peer Computing, P2P2010-Proceedings, August25-27,2010, Delft, Netherlands.NJ:IEEE Computer Society,2010.
    [46] Ye Lin, Zhang Hongli, Zhang Zhaoxin,等. A study of DHT measurement based on themetric of peers' distance[J]. Chinese High Technology Letters.2011,21(9):934-940.
    [47]赵晨.基于博弈论的P2P网络激励机制的研究[D].南京:南京邮电大学.2007.
    [48] E. Adar, B. A. Huberman. Free riding on Gnutella[J]. First Monday.2000,5(10):134–139.
    [49] D. Hughes, G. Coulson, J. Walkerdine. Free riding on Gnutella revisited: the bell tolls[J/OL].IEEE Distributed Systems Online.2005,6(6).
    [50]余一娇,金海.对等网络中的搭便车行为分析与抑制机制综述[J].计算机学报,2008,31(1):1-15.
    [51] John R. Douceur. The Sybil Attack[J/OL]. Microsoft Research.
    [52]姜雪,郑骏,王平.高white washing防御力的P2P全局信任模型[J].华东师范大学学报(自然科学版),2010,(1):111-117
    [53] Kudtarkar Arun M., Umamaheswari S. Avoiding white washing in P2P networks[C]\\1stInternational Conference on Communication Systems and Networks and Workshops,COMSNETS2009, January5-10,2009, Bangalore, India. NJ:Inst. of Elec. and Elec. Eng.Computer Society,2009.
    [54] Feldman Michal, Papadimitriou Christos, Chuang John. Free-riding and whitewashing inpeer-to-peer systems[C]\\Proceedings of the ACM SIGCOMM2004Workshops, August30-September3,2004, Portland, OR, United states. NY:Association for ComputingMachinery,2004,228-235.
    [55] Zou Wei, Zhang Yuan, Zhang Jianyu,等. Survey of eclipse attacks on DHT networks[J].Journal of Tsinghua University.2011,51(10),1306-1311.
    [56] Singh Atui, Ngan Tsuen-Wan. Eclipse attacks on overlay networks: Threats anddefenses[C]\\Proceedings-IEEE INFOCOM, April23-29,2006, Barcelona, Spain. NJ:Institute of Electrical and Electronics Engineers Inc.2006.
    [57]李晓义,李治军,姜守旭. BitTorrent网络的搭便车及恶意攻击研究[J].计算机工程,2011,37(7):163-165.
    [58] Locher, Thomas, Mysicka, David, Schmid Stefan. Poisoning the Kad network[C]\\LectureNotes in Computer Science, January3-6,2010, Kolkata, India. Heidelberg,2010,195-206.
    [59] http://baike.baidu.com/view/568936.htm
    [60] Meng Xian-Fu, Tan Juan. Field theory based anti-pollution strategy in p2pnetworks[C]\\Communications in Computer and Information Science, July29-31,2011,Kunming, China. Heidelberg,2011,107-111.
    [61]左敏. P2P对等网系统软安全若干关键问题研究[D].上海:上海交通大学.2008.
    [62] Min Zuo, Ma Ying-Hua, Chbeir Richard,等. Combating P2P file pollution withco-alerting[C]\\Proceedings-International Conference on Signal Image Technologies andInternet Based Systems, SITIS2007, December16-18,2007, Jiangong Jinjiang, Shanghai,China. NJ: Inst. of Elec. and Elec. Eng. Computer Society,2007,289-297.
    [63]左敏,李建华,蒋兴浩. P2P文件污染的建模与仿真分析[J].上海交通大学学报,2008,42(2):239–244.
    [64] Liang Jian, Kumar Rakesh, Xi Yongjian. Pollution in P2P file sharingsystems[C]\\Proceedings-IEEE INFOCOM, March13-17,2005, Miami, FL, United states.NJ:Institute of Electrical and Electronics Engineers Inc,2005,1174-1185.
    [65] Borges Alex, Almeida Jussara, Campos Sergio. Fighting pollution in P2P live streamingsystems[C]\\2008IEEE International Conference on Multimedia and Expo, ICME2008-Proceedings, June23-26,2008, Hannover, Germany. NJ:Inst. of Elec. and Elec. Eng.Computer Society,2008,481-484.
    [66] Tauhiduzzaman Md., Wang Mea. A system analysis of reputation-base defences againstpollution attacks in P2P streaming[C]\\2012IEEE31st International Performance Computingand Communications Conference, IPCCC2012, December1-3,2012, Austin, TX, Unitedstates. Washington, DC:IEEE Computer Society,2012,152-161.
    [67] Lin Eric, De Castro Daniel Medeiros Nunes, Wang Mea. SPoIM: A close look at pollutionattacks in P2P live streaming[C]\\IEEE International Workshop on Quality of Service,IWQoS, June16-18,2010, Beijing, China. NY:Institute of Electrical and ElectronicsEngineers Inc,2010.
    [68] Sun Xin, Torres Ruben. Preventing DDoS attacks on internet servers exploiting P2Psystems[J]. Computer Networks.2010,54(15):2756-2774.
    [69] Athanasopoulos Elias, Anagnostakis Kostas G., Markatos Evangelos P. Misusingunstructured P2P systems to perform DoS attacks: The network that neverforgets[C]\\Lecture Notes in Computer Science, June6-9,2006, Singapore, Singapore.Springer Verlag,2006,130-145.
    [70]乐光学.基于Gnutella协议的P2P网络中DoS攻击防御机制[J].微电子学与计算机,2005,22(8):26-31+35.
    [71]夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959.
    [72]冯朝胜,秦志光,劳伦斯·库珀特,等. P2P网络中沉默型蠕虫传播建模与分析[J].计算机研究与发展,2010,47(3):500-507.
    [73] Lu Chuiwei. Research on intrusion and defense of P2P-based worm[C]\\2009Second ISECSInternational Colloquium on Computing, Communication, Control, and Management, CCCM2009, August8-9,2009, Sanya, China. NJ:IEEE Computer Society,2009,540-543.
    [74] Chen Jun-Hua, Hu Chang-Zhen, Shi Feng. A random and scale-free hybrid P2P wormpropagation model[J]. Journal of South China University of Technology (Natural Science).2010,38(5):80-85.
    [75]李志. BT下载与P2P技术应用引发的社会问题研究[J].武警学院学报,2010,26(5).
    [76]秦志光,黄科瑞.基于时空相关性的P2P网络信任模型[J].计算机应用研究,2011,28(1):80-84.
    [77] Adeel Muhammad, Tokarchuk Laurissa N. Analysis of mobile P2P malware detectionframework through Cabir&Commwarrior families[C]\\Proceedings-2011IEEEInternational Conference on Privacy, Security, Risk and Trust and IEEE InternationalConference on Social Computing, PASSAT/SocialCom2011, October9-11,2011, Boston,MA, United states. NJ:IEEE Computer Society,2011,1335-1343.
    [78] Lesueur Fran ois, Mé Ludovic, Tong Valérie Viet Triem. A sybilproof distributed identitymanagement for P2P networks[C]\\Proceedings-IEEE Symposium on Computers andCommunications, July6-9,2008. Marrakech, Morocco. NY:Institute of Electrical andElectronics Engineers Inc,2008,246-253.
    [79] Viswanath Bimal, Post Ansley, Gummadi Krishna P. An analysis of social network-basedSybil defenses[C]\\SIGCOMM'10-Proceedings of the SIGCOMM2010Conference, August30,2010-September3,2010, New Delhi, India. NY:Association for Computing Machinery,2010,363-374.
    [80] Rowaihy Hosam, Enck William, McDaniel Patrick. Limiting sybil attacks in structured P2Pnetworks[C]\\Proceedings-IEEE INFOCOM, May6-12,2007, Anchorage, AK, Unitedstates. NJ: Institute of Electrical and Electronics Engineers Inc.2007,2596-2600.
    [81] Jetter Oliver, Dinger Jochen, Hartenstein Hannes. Quantitative analysis of the sybil attack andeffective sybil resistance in peer-to-peer systems[C]\\IEEE International Conference onCommunications, May23-27,2010, Cape Town, South africa. NJ: Institute of Electrical andElectronics Engineers Inc.,2010.
    [82] Yu Haifeng, Kaminsky Michael, Gibbons Philip B. SybilGuard: Defending against sybilattacks via social networks[J], IEEE/ACM Transactions on Networking,2008,16(3).
    [83] Jyothi B.S., Janakiram Dharanipragada. SyMon: Defending large structured P2P systemsagainst sybil attack[C]\\IEEE P2P'09-9th International Conference on Peer-to-PeerComputing, September9-11,2009, Seattle, WA, United states. NJ: IEEE Computer Society,2009,21-30.
    [84] Ng, T.S. Eugene, Zhang, Hui. Predicting internet network distance with coordinates-basedapproaches[C]\\Proceedings-IEEE INFOCOM, June23-27,2002, New York, NY, Unitedstates. NJ: Institute of Electrical and Electronics Engineers Inc.,2002,170-179.
    [85] Min Su-Hong, Holliday Joanne, Cho Dong-Sub. Optimal super-peer selection for large-scaleP2P system[C]\\Proceedings-2006International Conference on Hybrid InformationTechnology, ICHIT2006, November9-11,2006, Cheju Island, Korea, Republic of. NJ:Inst.of Elec. and Elec. Eng. Computer Society,2006,588-593.
    [86]杨寿保,许通,胡云.用户需求适应的P2P超级节点选取机制[J].电子科技大学学报,2009,38(3):385-388.
    [87]许通. P2P网络超级节点选举机制研究[D].北京:中国科学技术大学.2008.
    [88] Zhang Kan, Antonopoulos Nick. A novel bartering exchange ring based incentive mechanismfor peer-to-peer systems[J]. Future Generation Computer Systems.2013,29(1):361-369.
    [89]刘洪涛,黄智兴,邱玉辉. P2P资源的拍卖激励机制[J].计算机科学,2007,34(11):71-73.
    [90]严华云,关佶红.基于Bloom Filter的安全P2P共享模型[J].计算机科学,2010,37(5):72-76
    [91] Sepandar D. Kamvar, Mario T. Schlosser, Hector GarciaMolina. The EigenTrust Algorithmfor Reputation Management in P2P Networks[C]\\Proc.ofthe12th Int l Cone on World WideWeb, Bakonyi P,2003. Budapes: ACM Press,2003,640-651.
    [92]彭冬生,林闯,刘卫东.一种直接评价节点诚信度的分布式信任机制[J].软件学报,2008,19(4):946-955.
    [93] Rao Shen, Wang Yong, Tao Xiao-Ling. The comprehensive trust model in P2P based onimproved EigenTrust algorithm[C]\\2010International Conference on Measuring Technologyand Mechatronics Automation, ICMTMA2010, March13-14,2010, Changsha, China. NJ:IEEE Computer Society,2010,822-825.
    [94]李景涛,荆一楠,肖晓春,等.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167.
    [95]石志国,刘冀伟,王志良.基于时间窗反馈机制的动态P2P信任模型[J].通信学报,2010,31(2);120-129.
    [96] XIONG L, LIU L. PeerTrust: supporting reputation-base trust in peer-to-peer communities[J].IEEE Transaction on Data and Knowledge Engineering,2004,16(7):843-857.
    [97]常俊胜,王怀民,尹刚. DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307.
    [98] Hu Bo, Zhao H. Vicky. Pollution-resistant peer-to-peer live streaming using trustmanagement[C]\\Proceedings-International Conference on Image Processing, ICIP,November7-12,2009, Cairo, Egypt. NJ: IEEE Computer Society,2009,3057-3060.
    [99] AICH, http://www.emule.org.cn/faq/doc/corruption_handling.htm
    [100] Naoumov Naoum, Ross Keith. Exploiting P2P systems for DDoS attacks[C]\\ACMInternational Conference Proceeding Series, May30,2006-June1,2006, Hong Kong, China.NY: Association for Computing Machinery,2006.
    [101] Qi Man, Yang Yongqiang. P2P DDoS: Challenges and countermeasures[C]\\6th InternationalConference on Fuzzy Systems and Knowledge Discovery, FSKD2009, August14-16,2009,Tianjin, China. NJ: IEEE Computer Society,2009,265-268.
    [102]耿技,马新新.对等网络泛洪DDoS攻击的防御机制[J].电子科技大学学报,2009,38(6):987-992.
    [103] Yu Wei, Chellappan Sriram, Wang Xun. On defending peer-to-peer system-based activeworm attacks[C]\\GLOBECOM-IEEE Global Telecommunications Conference, November28,2005-December2,2005, St. Louis, MO, United states. NY: Institute of Electrical andElectronics Engineers Inc,2005,1757-1761.
    [104] Zhou Ying, Wu Zhong-Fu, Wang Hao. Breaking monocultures in P2P networks for wormprevention[C]\\Proceedings of the2006International Conference on Machine Learning andCybernetics, August13-16,2006, Dalian, China. NJ: Inst. of Elec. and Elec. Eng. ComputerSociety,2006,2793-2798.
    [105]吴国政,秦志光.基于节点自杀的对等网络蠕虫防治方法[J].电子科技大学学报,2012,41(1):125-130.
    [106]史建焘,张宏莉,方滨兴. BitTorrent假块污染攻击的对抗方法研究[J].计算机学报,2011,34(1):15-24.
    [107] Yu San-Chao, Li Yi-Chao. To inhibit DDoS attack for P2P overlay based on level model,Proceedings-1st International Symposium on Computer Network and MultimediaTechnology, CNMT2009, December18-20,2009, Wuhan, China. NJ: IEEE ComputerSociety,2009.
    [108]王汝传,徐小龙,韩志杰,等.对等(P2P)网络安全技术[G],北京:科学出版社,2012
    [109]赵泽良,陈兴蜀,刘益和,等. P2P应用的安全体系结构研究[J].四川大学学报(自然科学版),2006,4:811-815.
    [110]王珏,周莉.基于BitTorrent的P2P安全模型的设计[J].江西师范大学学报(自然科学版),2010,1:63-67.
    [111]胡建理,周斌,吴泉源. P2P网络中具有激励机制的信任管理研究[J].通信学报.2011,32(5):22-32.
    [112]李开,李瑞轩,章华娟. P2P网络中基于信任的风险计算方法[J].计算机科学.2010,37(10):102-104;
    [113]陆峰,郑康锋,钮心忻.构建风险敏感的对等网安全信任模型[J].北京邮电大学学报.2010,33(1):33-37.
    [114]赵慧娟,基于信任风险模糊评估的P2P网络访问控制研究[D],南京:南京邮电大学.2008.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700