基于探测和仿真的P2P用户和网络行为分析建模及安全性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,P2P技术作为一种网络计算机之间的资源整合和分配技术,伴随着网络接入带宽的爆炸式增长和互联网新应用的蓬勃发展,无论在商业运营、学术研究、还是社会道德领域都掀起了巨大的波澜。这种全新的网络架构,试图利用接入网络中的每一台计算机的空闲能力(包括空闲的CPU时间、存储空间、网络带宽等),通过彼此的帮助和合作,在突破了传统网络中性能瓶颈的同时,也能够高效的、可靠的、安全的完成传统网络阶段所面临的许多“不可能完成的任务”。同时,坐在计算机之前的广大网民,以多种多样的P2P应用为纽带,在虚拟世界建立起信息交互和资源共享的平台,使得冰冷的机器被赋予了某种“社会性”。充分掌握当前各种P2P应用的发展现状,挖掘P2P用户的行为模式,了解协议设计对于覆盖层网络特征的影响,发现目前P2P网络中存在的安全问题,不仅能够为P2P网络的设计改进、协议完善提供依据和方向,而且能够为商业运营领域的P2P流量评估监控、管理维护提供方法论基础。
     本文中,基于互联网中实际采集的P2P应用数据,并结合模拟P2P网络机制和特征的仿真程序,通我们过数据挖掘分析和理论建模,主要对当前最流行的两种类型的P2P系统(文件共享系统和直播流媒体系统)进行了一系列的研究:
     ·通过采自BitTorrent(简称BT)系统中心服务器的用户数据,我们对该系统内的用户特征进行了提取和建模。测量发现,无论用户发布行为还是下载行为,其分布均存在类似于“至多只取一次”的“头部平坦”特征,基于两种行为特征的成因不同,我们提出了“非直接”选择原理来解释用户发布行为中出现的这类现象。此外,我们还揭示了文件寿命与用户兴趣度方面的关联特征,以及用户在文件共享过程中表现出的长期共享特征等。
     ·通过自行编写爬虫程序,我们对以PPStream(简称PPS)为代表的直播流媒体系统中的大量用户进行了实时的跟踪和监测,与其它类型的P2P应用相比,由于流媒体系统播放的实时性要求,系统设计的独特性会导致系统中的普通用户呈现出一定的独特性。通过实际数据,我们试图揭示PPS系统中的用户在地理分布、连接稳定性、用户加入离开模式、共享特征以及拓扑构造等方面的特征。结果表明,系统设计通过牺牲公平性来换取效率,系统整体共享效率较高,基本能够满足多数用户播放的实时性要求。
     ·由于P2P系统中用户具有一定的自治性和社会性,所以,如何设计相应的激励机制来促进用户更多的参与网络共享,是目前一些系统在设计实现时需要考虑的问题。激励机制的不同,所造成的直接结果就是用户的组织方式的差异,最直接的表现在覆盖层网络拓扑的构造上面。通过模拟BT系统和CoolStreaming系统的连接管理机制,我们编写仿真程序,揭示了这两种不同类型的P2P系统在拓扑结构方面的一些特征。
     ·在P2P直播流媒体系统中,用户缓冲区的建立和更新特征,直接影响着系统整体的共享效率。通过理论推导,我们研究了不同用户启动起始点的选择对于系统用户播放延迟分布的影响特性。测量发现,用户在选择演播起始点时,一般会遵守基于“线性放置”的策略,这种策略的采用会直接影响到用户的播放进度分布。此外,我们还揭示了用户延迟与系统重要设计参数的关系,通过改进设计参数,系统的性能能够进一步得到提升。
     ·P2P系统的安全问题也是P2P网络设计中需要重点考虑的问题。在基于数据分片传输的流媒体播送系统的场景之下,如果不采取任何的防御措施,几个“恶意污染者”相互合作,就能够导致多数用户播放出错,甚至引起整个系统的瘫痪。我们提出一个校验机制,利用不同数据分片之间的互相关特性,通过在普通用户的多个“邻居”之间建立监督网络,有效的识别和及时切断污染源。仿真显示该机制能够有效防止污染数据片的扩散。该机制开销很小,且非常容易实施,可以投入实用。
Recently,with the explosive increase of the access bandwidth and the new applications in Internet,as the tool for idle resource integration and reallocation, Peer-to-Peer technology influenced us very much not only in commercial and industries field,but also in the academic and social field.The new-born infrastructure intends to make full use of spare capacity(including the idle CPU cycles,disk spaces,and bandwidths, etc) of each PCs which have access to the Internet.By mutual cooperation and assistance,these PCs can break through the performance bottlenecks of traditional infrastructure and deal with the "mission impossible" which once faced by traditional Internet efficiently,reliably,and safely.At the same time,the surfers,who sit in front of these PCs,can establish the information exchange and resource sharing platform in the virtual world connected by all kinds of P2P applications.That is,these cold PCs can gradually gain some social property under the control of humans.Mastering the situation of various P2P applications,mining the behavior model of P2P users,understanding the network characteristics incurred by protocol implementation,discovering the security problems,they all contribute to improve the design principle and protocols of P2P systems.In addition,they will also provide the methodology for P2P flow monitoring and maintenance.
     In the thesis,based on the P2P datasets captured in Internet and simulation programs, we have done some research on two of the most popular P2P applications:file sharing systems and live media streaming systems.
     ●By collecting the users profiles of BitTorrent,we retrieved and modeled the users behavior in the system.It's revealed there exist obvious flat-head phenomenon which is similar to "fetch-at-most-once" behaviors no matter for publishing and for downloading activities.We proposed the "Indirect Selection Principle" to explain the characteristics in users issuing behaviors.Furthermore,we also present the relationship between the file life span and the users' interests,and the sharing properties of users.
     ●After developing our crawler,we traced and monitored most users of PPStream system in real time.Due to the rigid real-time requirements,the unique policies implemented in the system will definitely result in the unique characteristics of users.Based on the datasets,we tried to reveal users behaviors on geographical distribution,connection stability,users arrival/departure pattern,sharing and topology.It's proved the system pay fairness for efficiency.
     ●Because of the autonomous and social property of users,it's a vital concern how to design the incentive mechanisms to promote users share more in the system. Different mechanisms will incur the different organization patterns among users, and the topology varies consequently.By simulating the connection policies in BitTorrent and CoolStreaming Systems respectively,we tried to disclose some characteristics on topology of them.
     ●In P2P live system,the buffer establishing and update paces will affect the sharng ratio of the whole system.From our measurement,we find out the "linear placement" mechanism adopted in PPLive System,and we think the strategy will influence the playback process directly.By rigid theoretic analysis,it's revealed the relationship between playback latency and some vital design parameters.By optimizing these parameters,the performance will be increased further.
     ●Security problems is of vital importance in P2P systems.In the chunk-based live streaming systems,several notorious "polluters" will destroy the whole systems by inserting the fake chunks to the system.By utilizing the relationship among different data chunks,we propose a mesh-based mechanism to prevent the peers from polluted.The mechanism is lightweight and easy to be implemented.
引文
[1]S.Simon.Peer-to-peer network management in an ib;sna network.IEEE Network Magazine.
    [2]K.Young.Look no server.Network.
    [3]S.Wray,T.Glauert,and A.Hopper.The medusa applications environment.Multimedia Computing and Systems.
    [4]Meta Computing.Peer-to-peer architecture proposal legion - an integrated architecture for secure resource sharing.White paper.
    [5]L.Thomas,S.Suchter,and A.Rifkin.Developing peer-to-peer applications on the internet:the distributed editor,simuledit.Dr.Dobb's Journal.
    [6]M.Singh.Peering at peer-to-peer computing.IEEE Internet Computing,5.
    [7]S.Rudiger.A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications.In Proc.IEEE P2P'01,2001.
    [8]http://www.napster.com/.
    [9]http://www.ppcn.net/n1367c39.aspx.
    [10]S.Ratnasamy,P.Francis,M.Handley,R.Karp,and S.Shenker.A scalable content addressable network.In Proc.ACM SIGCOMM'01,San Diego,California,USA,Aug.2001.
    [11]I.Stoica,R.Morris,D.Karger,M.E Kaashoek,and H.Balakrishnan.Chord:A scalable peer-to-peer lookup protocol for internet applications.ACM Trans.on Networking,11:17-32.
    [12]B.Y.Zhao,L.Huang,J.Stribling,S.C.Rhea,A.D.Joseph,and J.D.Kubiatowicz.Tapestry:A resilient global-scale overlay for service deployment.IEEE Journal on Selected Areas in Communications,22:41-53,Jan 2004.
    [13]A.Rowstron and P.Druschel.Pastry:Scalable,distributed object location and routing for large-scale peer-to-peer systems.In Proceedings of the Middleware.
    [14]P.Maymounkov and D.Mazieres.Kademlia:A peer-to-peer information system based on the xor metric.In Proc.IPTPS'02,Cambridge,MA,USA,Feb.2002.
    [15]D.Malkhi,M.Naor,and D.Ratajczak.Viceroy:a scalable and dynamic emulation of the butterfly.In Proc.ACM PODC'02,Monterey,CA,USA,Jul.2002.
    [16]http://www.gnutelliums.com/.
    [17]http://www.fasttrack.nu/.
    [18]http://www.kazaa.com/.
    [19]http://www.overnet.com/.
    [20]http://www.edonkey2000.com.
    [21]http://www.bittorrent.com.
    [22]I.Clarke,O.Sandberg,B.Wiley,and T.W.Hong.Freenet:a distributed anonymous information storage and retrieval system.In Freenet White Paper.
    [23]http://setiathome.ssl.berkeley.edu/.
    [24]W.Sullivan Ⅲ,D.Werthimer,S.Bowyer,J.Cobb,D.Gedye,and D.Anderson.A new major seti project based on project serendip data and 100,000 personal computers.In Proceedings of the 5th International Conference on Bioastronomy.
    [25]A.Grimshaw.Avaki data grid-secure transparent access to data.In Grid Computing:A Practical Guide To Technology And Applications.
    [26]http://www.popularpower.com/.
    [27]http://genomeathome.stanford.edu/.
    [28]P.Bernstein,F.Giunchiglia,A.Kementsietsidis,J.Mylopoulos,L.Serafini,and I.Zaihrayeu.Data management for peer-to-peer computing:A vision.In Proceedings of the Workshop on the Web and Databases.
    [29]R.Huebsch,J.Hellerstein,N.Lanham,and B.Thau Loo.Querying the internet with pier.In Proceedings of the 29th VLDB Conference,Berlin.Germany.
    [30]A.Halevy,Z.Ives,P.Mork,and I.Tatarinov.Piazza:Data management infrastructure for semantic web applications.In Proceedings of the 12th International Conference on World Wide Web,Budapest,Hungary.
    [31]T.Berners-Lee,J.Hendler,and O.Lassila.The semantic web.In Scientific American.
    [32]W.Nejdl,B.Wolf,C.Qu,S.Decker,M.Sintek,A.Naeve,M.Nilsson,M.Palmer,and T Risch.Edutella:A p2p networking infrastructure based on rdf.In Proceedings of the 12th International Conference on World Wide Web,Budapest,Hungary.
    [33]http://www.w3.org/.
    [34]http://www.qq.com/.
    [35]http://uc.sina.com.cn/.
    [36]http://cn.msn.com/.
    [37]http://www.jabber.org/.
    [38]http://www.pplive.com.
    [39]http://www.ppstream.com.
    [40]http://www.uusee.com/.
    [41]http://tv.qq.com/.
    [42]https://jxta.dev.java.net/.
    [43]http://office.microsoft.com/zh-cn/groove/default.aspx.
    [44]R.Janakiraman,M.Waldvogel,and Q.Zhang.Indra:A peer-to-peer approach to network intrusion detection and prevention.In Proc.IEEE WET ICE Workshop on Enterprize Security 2003,Linz,Austria.
    [45]A.Keromytis and D.Rubenstein.Sos:Secure overlay services.In ProcACM SIGCOMM'02,Pittsburgh,PA,USA,Aug.2002.
    [46]Michael K.Reiter and Aviel D.Rubin.Crowds:Anonymity for web transactions.ACM Trans,on Information and System Security,1:66-92,Nov 1998.
    [47]Emin Gun Sirer,Milo Polte,and Mark Robson.Cliquenet:A self-organizing,scalable,peer-to-peer anonymous communication substrate.
    [48]http://www.dslreports.com/shownews/89140.
    [49]http://blog.wired.com/monkeybites/2007/08/its-comcastic-i.html.
    [50]http://blog.wired.com/monkeybites/2007/08/does-comcast-br.html.
    [51]http://www.dslreports.com/shownews/comcast-invisicaps-rediscovered-87000.
    [52]http://torrentfreak.com/comcast-wrongfully-denies-interfering-with-bittorrent/.
    [53]http://www.dcia.info/activities/p4p.
    [54]J.Sens,Wang.Analyzing peer-to-peer traffic across large networks.IEEE/ACM Transactions on Networking,12:219-232.
    [55]Constantinouf and P.Mavrommatis.Identifying known and unknown peer-to-peer traffic.In Proc.Fifth IEEE International Symposium on Network Computing and Applications,Cambridge,MA,USA,Jul.2006.
    [56]Thomas Karagiannis,Andre Broido,Michalis Faloutsos,and Kc claffy.Transport layer identification of p2p traffic.In Proc.4th ACM S1GCOMM Conference on Internet Measurement,Taormina,Italy,Oct.2004.
    [57]F.Homgmong,C.CHEN,and C.Chuang.Identification and analysis of p2p traffic - an example of bittorrent.In Proceedings of International Conference on Innovative Computing,Information and Control(ICICIC2006),Beijing,China,Aug.2006.
    [58]L.Zhou,Z.Li,and B.Liu.P2p traffic identification by tcp flow analysis.In Proceedings of International Workshop on Networking,Architecture,and Storages,Shenyang,China,Sep.2006.
    [59]F.Shuk and J Kurose.Characterizing and detecting skype-relayed traffic.In Proceedings of IEEE Conference on Computer Communications(INFOCOM 2006),Barcelona,Spain,Aug.2006.
    [60]Sens,O.Spatscheck,and D Wang.Accurate,scalable in-network identification of p2p traffic using application signatures.In Proceedings of the 13th International Conference on World Wide Web,New York,NY,USA,May.2004.
    [61]R.Wang,Y.Liu,and Y Yang.Solving the app-level classification problem of p2p traffic via optimized support vector machines.In Proceedings of Sixth International Conference on Intelligent Systems Design and Applications(ISDA'06),Jinan,China,Oct.2006.
    i62]Madhukara and C Williamson.A longitudinal study of p2p traffic classification.In Proceedings of 14th IEEE International Symposium on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems,Monterey,CA,USA,Sep.2006.
    [63]Ohzahatas,Y.Hagiwara,and M Terada.A traffic identification method and evaluations for a pure p2p application.In Proceedings of 2005 Passive and Active Measurement(PAM'05),Boston,MA,USA,Mar.2005.
    [64]H.Kang,M.Kim,and J.Hong.Streaming media and multimedia conferencing traffic analysis using payload examination.ETRI Journal,26:203-217.
    [65]刘琼,徐鹏,杨海涛,彭芸.Peer-to-peer文件共亨系统的测量研究.软件学报,17:2131-2140.Oct 2006.
    [66]http://www.cachelogic.com.
    [67]http://www.verycd.com/.
    [68]B Cohen.Incentives build robustness in bittorrent.In Workshop on Economics of Peer-to-Peer System,Berkeley,USA,May.2003.
    [69]D Qiu and R Srikant.Modeling and performance analysis of bittorrent-like peer-to-peer networks.In Proc.ACM SIGCOMM'04,Portland,OR,USA,Aug.2004.
    [70]L et al Guo.Measurements,analysis,and modeling of bittorrent-like systems.In Proc.ACM IMC'05,Berkeley,CA,USA,Oct.2005.
    [71]Ziqian Liu and Changjia Chert.Modeling bittorrent-like peer-to-peer systems.IEEE Communications Letters,10.
    [72]M et al Izal.Dissecting bittorrent:Five months in a torrent's lifetime.In Proc.5th annual Passive and Active Measurement Workshop(PAM'04),Boston,MA,USA,Apr.2004.
    [73]J.A.Pouwelse and P et al Garbacki.The bittorrent p2p file-sharing system:Measurements and analysis.In Proc.4th International Workshop on Peer-to-Peer Systems,New York,USA,Feb.2005.
    [74]N.Andrade and M Mowbray.Influences on cooperation in bittorrent communities.In Proc.ACM SIGCOMM'O5(P2P-ECON),Philadelphia,PA,USA,Aug.2005.
    [75]A.R.Bharambe and C Herley.Analyzing and improving a bittorrent network' s performance mechanisms.In Proc.IEEE Infocom'06,Barcelona,Spain,Apr.2006.
    [76]http://www.5qzone.net/.
    [77]http://bt.icefish.org/.
    [78]K.P.Gummadi,Dunn R.J.,S.Saroiu,and S.D.et al Gribble.Measurement,modeling,and analysis of a peer-to-peer file-sharing workload.In Proc.ACM SOSP' 03,New York,USA,Oct.2003.
    [79]http://azureus.sourceforge.net/.
    [80]http://en.wikipedia.org/wiki/power_law.
    [81]http://news.xinhuanet.com/newmedia/2005-03/17/content_2710396.htm.
    [82]B.Gu and S Jarvenpaa.Are contributions to p2p technical forums private or public goods?-an empirical investigation.In Proc.WEPPS' 03.
    [83]http://www.econport.org:8080/econport/.
    [84]S.Deering and D Cheriton.Multicast routing in datagram internetworks and extended lans.ACM Trans.on Computer Systems.
    [85]Y.Chu,S.G.Rao,and H Zhang.A case for end system multicast.In Proc.ACM SIGMETRICS 2000,Santa Clara,California,USA,Jun.2000.
    [86]V.N.Padmanabhan,H.J.,P.A.Wang,Chou,and K.Sripanidkulchai.Distributing streaming media content using cooperative networking.In Proc.ACM NOSSDAV'02,Miami Beach,FL,USA,May.2002.
    [87]D.A.Tran,K.A.Hua,and T.T.Do.A peer-to-peer architecture for media streaming.IEEE Journal on Select.Areas in Communications,22.
    [88]S.Banerjee,B.Bhattacharjee,and C.Kommareddy.Scalable application layer multicast.In Proc.ACM SIGCOMM'02,Pittsburgh,PA,USA,Aug.2002.
    [89]P M.Castro,A.-M Druschel,A Kermarrec,A Nandi,Rowstron,and A.Singh.Splitstream:High-bandwidth multicast in cooperative environments.In Proc.ACM SOSP' 03,New York,USA,Oct.2003.
    [90]L.Kontothanassis,R.Sitaraman,J.Wein,D.Hong,R.Kleinberg,B.Mancuso,D.Shaw,and D Stodolsky.A transport layer for live streaming in a content delivery network.Proceedings of the IEEE,92:1408-1419,Sep 2004.
    [91]S.Q.Zhuang,B.Y.Zhao,and A.D.Joseph.Bayeux:An architecture for scalable and fault-tolerant wide-area data dissemination.In Proc.ACM NOSSDAV'O1,New York,USA,Jun.2001.
    [92]L.Guo,S.Chen,S.Ren,X.Chen,and S.Jiang.Prop:a scalable and reliable p2p assisted proxy streaming system.In Proc.ICDCS'04,Tokyo,Japan,Mar.2004.
    [93]M.Hefeeda,B.Bhargava,and D.K.-Y.Yau.A hybrid architecture for cost-effective on-demand media streaming.ACM,The International Journal of Computer and Telecommunications Networking,44:353-382,Feb 2004.
    [94]S.Shi and J.Turner.Routing in overlay multicast networks.In Proc.IEEE Infocom'02,New York,USA,Jun.2002.
    [95]Y.Chawathe,S.McCanne,and E.A.Brewer.An architecture for internet content distribution as an infiastmcture service,http://yatin.chawathe.com/-yafin/papers/scattercast.ps.
    [96]X.Zhang,J.Liu,and B.Li.Coolstreaming/donet:A data-driven overlay network for peer-to -peer live media streaming.In Proc.IEEE Infocom '05,Miami,USA,Mar.2005.
    [97]and Xiaojun Hei Jian Liang and etal Ross,K.W.A measurement study of a large-scale p2p iptv system.IEEE Transactions on Multimedia,9.
    [98]S.Ali,A.Mathur,and H Zhang.Measurement of commercial peer-to-peer live video streaming.In Proc.of Recent Advances in Peer-to-Peer Streaming,Aug.2006.
    [99]N.Magharej and R Rejaje.Understanding mesh-based peer-to-peer streaming.In ACM Proc.NOSSDAV' 06,Rhode Island.
    [100]http://www.maxmind.com/.
    [101]Bradley Huffaker and k claffy et al.Distance metrics in the internet.In Proc.of IEEE International,Telecommunications Symposium(ITS2002),Sep.2002.
    [102]Feldman M and Chuang C.Overcoming free-riding behavior in peer-to-peer systems.ACM SIGecom Exchanges,4:41-50,May 2005.
    [103]Adar E and Huberman B.Free riding on gnutella.First Monday,10:42-68,May 2000.
    [104]Golle P,Leyton brown K,and Mironov I.Incentives for sharing in peer-to-peer networks.In Proc.ACM Conference on Electronic Commerce 2001,2001.
    [105]Yang A and Garcia molina H.Ppay:micropayments for peer-to-peer systems.In Proc.ACM 10th Conference on Computer and Communications Security.
    [106]Wei K and Chen Y.Whopay:a scalable and anonymous payment system for peer-to-peer environments.In Proc.IEEE 26th International Conference on Distributed Computing Systems.
    [107]宿建宗,李秉智.P2p文件共享框架中激励机制的研究.重庆邮电学院学报:自然科学版,18:123-125.
    [108]O'hearn B.Experiences deploying a large-scale emergent network.In First International Workshop on Peer-to-peer Systems,Cambridge.
    [109]Ngan T,Wallach D,and Druschel P.Incentive-compatible peer-to-peer multicast.In Proc.1st Workshop on Economics of P2P Systems,California,USA.
    [110]Feldman A.Robust incentive techniques for peer-to-peer networks.In Proc.5th ACM conference on Electronic Commerce,San Diego,California,USA.
    [111]Feldman M and Papadimitriou C.Free-riding and whitewashing in peer-to-peer systems.IEEE Journal on Selected Areas in Communications,24:228-236.
    [112]Xiong L and Liu L.A reputation-based trust model for peer-to-peer ecommerce communities.In Proc.4th ACM Conference on Electronic Commerce.
    [113]Z.Manaf and G.Kostas.On the impact of p2p incentive mechanisms on user behavior.In Proc.ACM Conference on Electronic Commerce(EC'07),San Diego,California,USA,Jun.2007.
    [114]S.Jun and M Ahamad.Incentives in bittorrent induce free tiding.In Proc.ACM SIGCOMM'05(P2P-ECON),Philadelphia,PA,USA,Aug.2005.
    [115]http://www.caida.org/tools/utilities/netgeo/.
    [116]http://www.bitcomet.com.
    [117]Long Vu,Indranil Gupta,Jin Liang,and Klara Nahrstedt.Mapping the pplive network:Studying the impacts of media streaming on p2p overlays.In UIUC Technical Report.
    [118]Yensy James Hall,Patrick Piemonte,and Matt Weyant.Joost:A measurement study.In http://www.patrickpiemonte.com/15744-Joost.pdf
    [119]Xiaojun Hei,Yong Liu,and Keith Ross.Inferring network-wide quality in p2p live streaming systems.IEEE JSAC special issue on advances in P2P streaming,25.
    [120]Chunxi Li and Changjia Chen.Modeling the startup process of p2p live streaming systems by a measurement based reverse engineering.In Submitted to IEEE/ACM Trans.Networking.
    [121]A.Vlavianos,M.Iliofotou,and M.Faloutsos.Bitos:Enhancing bittorrent for supporting streaming applications.In Global Internet Workshop in conjunction with IEEE INFOCOM'06,Barcelona,Spain.
    [122]V.N.Padmanabhan,H.J.Wang,and P.A.Chou.Resilient peer-to-peer streaming.In IEEE Proc.ICNP'03.
    [123]R.Kumar,Y.Liu,and K.W.Ross.Stochastic fluid theory for p2p streaming systems.In Proc.IEEE Infocom'07,Anchorage,Alaska,USA,May.2007.
    [124]Jian Liang,Rakesh Kumar,Yongjian Xi,and Keith W.Ross.Pollution in p2p file sharing systems.In Proc.IEEE Infocom '05,Miami,USA,Mar.2005.
    [125]Uichin Lee,Min Choi,Junghoo Cho,M.Y.Sanadidi,and Mario Gerla.Understanding pollution dynamics in p2p file sharing.In Proc.IPTPS'06,Santa Barbara,CA,USA,Feb.2006.
    [126]Rakesh Kumar,David D.Yao,Amitabha Bagchi,keith W.Ross,and Dan Rubenstein.Fluid modeling of pollution proliferation in p2p networks.In Proc.ACM SIGMETRICS'06,Saint-Malo,France,Jun.2006.
    [127]Richard Thommes and Mark Coates.Epidemiological modelling of peer-to-peer viruses and pollution.In Proc.IEEE Infocom '06,Barcelona,Spain,Apr.2006.
    [128]Prithula Dhungel,Xiaojun Hei,Keith W.Ross,and Nitesh Saxena.The pollution attack in p2p live video streaming systems:Measurement results and defenses.In Proc.ACM SIGCOMM'07(P2P-TV'07),Kyoto,Japan,Aug.2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700