P2P文件共享系统测量及其安全性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
作为过去十几年里最具影响力的互联网技术之一,P2P技术引起互联网应用系统结构和用户行为模式的巨大改变,从原来中心式共享的C/S结构变为用户直接共享的分布式P2P结构,这增强了系统服务能力和可扩展性,并催生了多种基于P2P技术的互联网应用,吸引了规模庞大的用户群体。P2P技术的不断进步使现有P2P应用系统不断优化改进,性能大幅提升,然而,这些改进也使现有系统结构更加复杂,对其进行全面认识和评估也变得更加困难。此外,由于P2P系统本身的匿名性、开放性、动态性等特点,一些性能上的改进更可能会带来新的安全上的隐患,P2P系统中的盗版问题也成为制约P2P发展和广泛应用的重要因素。本文以BitTorrent这一应用最广泛的P2P文件共享系统为例,通过测量的方法进一步加深了对现行P2P系统的理解和认识,发现系统存在的安全问题,并提出了相应的解决方案。本文的主要工作和贡献包括:
     设计主被动相结合的测量系统,对BitTorrent网络进行了快速全面的测量,并分析了资源分布情况和用户的行为特征,测量结果显示:BitTorrent网络中资源分布呈现明显的不均衡性和“热点”现象,共享资源大部分为未授权的音视频内容。本文在不同时间尺度对Swarm演化规律进行建模,改进了现有节点到达模型和离开模型,发现用户兴趣和日周期性是影响BT系统Swarm演化的主要因素。这些测量结果也为后续分析和设计模拟器以对改进方法进行评估提供了基础。
     对BitTorrent网络拓扑及相关的性能特征进行了测量,分析了节点的度特征、小世界特性、节点下载速度以及下载完成度等,并从协议设计和客户端实现的角度对测量结果进行了分析,发现BT网络具有较强的健壮性,节点距离较短,稳定阶段BT网络拓扑不是全连通的,BT网络更接近于随机网络而不是一个Scale-free网络,且不具有小世界特征。此外,本文还发现节点连接数和节点下载速度之间没有显著的相关性。
     针对测量过程中发现的利用BitTorrent系统节点来源交换协议(Peer Ex-change,PEX)进行DDoS攻击的可能性,从协议设计和用户行为角度分析了PEX协议的脆弱性,并在可控环境中证实该漏洞可被利用发动持续的连接消耗型DDoS攻击。对此,本文章提出了基于评分的信誉机制(ReputationExchange)来增强系统的安全性,在节点评价时考虑了资源情况、数据有效性和传输效率、推荐信誉和历史信誉等因素,并通过PEX消息实现高效地信誉分发,理论分析和实验结果均证明REX能够有效对抗DDoS攻击。该机制也可应用于其他P2P文件共享系统中。
     为能够利用P2P系统高效地分发版权内容,对抗盗版问题,本文提出了一种基于随机加密的P2P版权文件分发机制。针对现有版权保护系统存在的问题,本文通过加密来防止未授权用户获取明文内容,利用P2P系统的随机性增加了密钥空间对抗共谋攻击,并对文件块校验机制进行改进防止内容污染攻击。理论分析和模拟实验证明了该机制是安全的,系统开销可接受且易于部署。
During the last decades, as one of the most influential Internet technologies, P2PTechnology causes a revolution in the system architecture and user behavior of Internetapplications: changing from pure centralized C/S architecture to various distributed P2Parchitectures, from sharing by servers to sharing directly among users. This increases theservice capability of the system and brings good scalability, hence a variety of P2P-basedapplications have been designed, attracting enormous users. The rapid development ofP2P technologies bring lots of promotions to P2P systems and improve the performanceHowever, these improvements also make the system more complex, and it is more difcultto get a comprehensive understanding and evaluation to the P2P systems. Moreover, dueto characteristics such as anonymous, openness and dynamic, new features and extensionsused to improve performance of P2P systems may also lead to new security problems.The privacy issue has also become an important factor in restricting the development andwidely use of P2P technologies. This dissertation takes the BitTorrent, the most widelyused P2P file sharing system, as an example, gives more understandings to current P2Psystems by the measurement approach, discovers security issues and presents appropriatesolutions. The main work and contributions in this dissertation include:
     We perform a rapid and comprehensive measurement on the BitTorrent system bydesigning a new measurement system combing active and passive approaches. By themeasurement results, we analyze the resource distributions and user behaviors. We findthat the resources in BitTorrent system appear obvious unbalanced distribution and hot-spot phenomenon. Most of the shared files are unauthorized video and audio content.Wealso analyze the BT swarm evolution in diferent time scales, and improve existing peerarrival model and peer leaving model. We find user interest and diurnal periodicity are themain factors influencing swarm evolution. These measurement results provide a founda-tion for subsequent analysis and designing simulator to evaluate our proposed methods.
     We study the BitTorrent network topology and its performance-related character-istics (peer degree, peer distance, clustering coefcient, peer download speed and peerdownload percentage, etc.) by measurement, and analyze the results from the protocoldesign and client software implementation perspective. We find the BT network is robustto the peer departure and has short peer distances. The network in the steady stage is not fully connected. BT network is closed to a random network other than a scale-freenetwork, and it does not exhibit the small-work character. There is no strong correlationbetween peer connection degree and download speed.
     Considering the possibility of exploiting the BitTorrent Peer Exchange (PEX) proto-col to launch DDoS attacks, we analyze the vulnerabilities of PEX from protocol designand user behavior, and confirm that these vulnerabilities can be used to launch a persis-tent connection-exhaustive DDoS attack by controlled-experiments. To enhance the sys-tem security, we proposed a score-based reputation mechanism, referred to as ReputationExchange, REX. We take resource completeness, data validation, transmission efciency,recommend reputation and historical reputation as main factors, and use the PEX mes-sage to efectively distribute reputation score. Theoretical analysis and experiment resultsshow REX can efectively mitigate the efect of the attack. This mechanism can be usedin other P2P file-sharing systems.
     In order to take the advantage of P2P to efectively distribute copyrighted contentand resist privacy, we propose a stochastic-encryption-based copyrighted content deliv-ery scheme for P2P networks. By analyzing existing copyright protection system, in thispaper, we use encryption to avoid accessing plaintext content without authorization, ap-ply the random character of P2P system to enlarge key space to resist collusion attacks,and modify existing piece hash scheme to prevent content poisoning attacks. Theoreticalanalysis and simulation experiments show the security of the scheme. It is easy to deployand its overhead is acceptable.
引文
[1] Napster[EB/OL].[2011-03-03]. http://www.napster.com.
    [2] Gnutella[EB/OL].[2011-03-03]. http://rfc-gnutella.sourceforge.net.
    [3] BitTorrent and uTorrent Software Surpass150Million User Milestone[EB/OL].[2013-03-14]. http://www.bittorrent.com/intl/es/company/about/ces2012150musers.
    [4]40Million People: How Far We’ve Come[EB/OL].[2013-03-14]. http://blogs.skype.com/2012/04/10/40-million-people-how-far-weve/#fbid=Yc4ZsQGgC38.
    [5] ipoque: Internet Study2008/2009[EB/OL].[2013-03-14]. http://www.ipoque.com/sites/default/files/mediafiles/documents/internet-study-2008-2009.pdf.
    [6] CNNIC:第31次《中国互联网络发展状况统计报告》[EB/OL].[2013-03-14]. http://www.cnnic.cn/hlwfzyj/hlwxzbg/hlwtjbg/201301/P020130122600399530412.pdf.
    [7] The True Picture of Peer-To-Peer File-Sharing[EB/OL].[2004]. www.cachelogic.com/research/slide1.php.
    [8]中国电信[EB/OL].[2010-05-06]. http://www.cnbeta.com/articles/110395.htm.
    [9] Naoumov N, Ross K. Exploiting P2P Systems for DDoS attacks[C]//Proceedingsof the1st international conference on Scalable information systems. New York,NY, USA: ACM,2006.
    [10] Steiner M, En-Najjary T, Biersack E W. Exploiting KAD: Possible Uses and Mis-uses[J]. SIGCOMM Comput. Commun. Rev.,2007,37(5):65–70.
    [11] Sun X, Torres R, Rao S G. On the Feasibility of Exploiting P2P Systems to LaunchDDoS Attacks[J]. Peer-to-Peer Networking and Applications,2010,3(1):36–51.
    [12] Jian G, Yang Y, Zheng K, et al. Research of an Innovative P2P-Based Bot-net[C]//Proceedings of the2010International Conference on Machine Vision andHuman-machine Interface. Washington, DC, USA: IEEE Computer Society,2010:214–218.
    [13] Sun D, Li X, Liu W, et al. The New Architecture of P2P-Botnet[C]//Proceedings ofthe2010Second Cybercrime and Trustworthy Computing Workshop. Washington,DC, USA: IEEE Computer Society,2010:34–40.
    [14] Dittrich D, Dietrich S. P2P as Botnet Command and Control: A Deeper In-sight[C]//Proceedings of the3rd International Conference on Malicious and Un-wanted Software (MALWARE2008). Alexandria, VA, United states: IEEE Com-puter Society,2008:41–48.
    [15] Hughes D, Coulson G, Walkerdine J. Free Riding on Gnutella Revisited: The BellTolls?[J]. IEEE Distributed Systems Online,2005,6(6):1–18.
    [16] Adar E, Huberman B A. Free riding on Gnutella[J].2000,5(10):1–22.
    [17] Dhungel P, Wu D, Ross K W. Measurement and Mitigation of BitTorrent LeecherAttacks[J]. Comput. Commun.,2009,32(17):1852–1861.
    [18] Douceur J R. The Sybil Attack[C]//Proceedings of the First International Workshopon Peer-to-Peer Systems (P2P’02). London, UK, UK: Springer-Verlag,2002:251–260.
    [19] Singh A, Ngan T W, Druschel P, et al. Eclipse Attacks on Overlay Networks:Threats and Defenses[C]//Proceedings of25th IEEE International Conference onComputer Communications (INFOCOM2006). Barcelona, Spain: Institute ofElectrical and Electronics Engineers Inc,2006:1–12.
    [20] Liang J, Kumar R, Xi Y, et al. Pollution in P2P File Sharing Sys-tems[C]//Proceedings of24th IEEE International Conference on Computer Com-munications (INFOCOM2005). Miami, FL, United states: Institute of Electricaland Electronics Engineers Inc,2005,2:1174–1185vol.2.
    [21] Dhungel P, Hei X, Ross K W, et al. The Pollution Attack in P2P Live Video Stream-ing: Measurement Results and Defenses[C]//Proceedings of the2007workshop onPeer-to-peer streaming and IP-TV (P2P-TV’07). New York, NY, USA: ACM,2007:323–328.
    [22] Liang J, Naoumov N, Ross K W. The Index Poisoning Attack in P2P File Shar-ing Systems[C]//Proceedings of25th IEEE International Conference on ComputerCommunications (INFOCOM2006). Barcelona, Spain: Institute of Electrical andElectronics Engineers Inc,2006:1–12.
    [23] cnBeta[EB/OL].[2011-03-25]. http://www.cnbeta.com/articles/138227.htm.
    [24] ThePirateBay[EB/OL].[2012-12-25]. http://thepiratebay.se/.
    [25] LimeWire[EB/OL].[2010-10-26]. http://www.limewire.com/.
    [26]网易[EB/OL].[2010-05-07]. http://tech.163.com/10/0507/02/6622IO2M000915BF.html.
    [27] Lua E K, Crowcroft J, Pias M, et al. A Survey and Comparison of Peer-to-PeerOverlay Network Schemes[J]. Commun. Surveys Tuts.,2005,7(2):72–93.
    [28] Wang C, Li B. Peer-to-Peer Overlay Networks: A Survey[R].2003. http://www.csun.edu/~andrzej/COMP529-S05/papers/TR-P2P.pdf.
    [29] Fletcher G H L, Sheth H A, Bo¨rner K. Unstructured Peer-to-Peer networks:topological properties and search performance[C]//Proceedings of the Third inter-national conference on Agents and Peer-to-Peer Computing. Berlin, Heidelberg:Springer-Verlag,2005:14–27.
    [30] Clarke I, Sandberg O, Wiley B, et al. Freenet: A Distributed Anonymous In-formation Storage and Retrieval System[C]//International workshop on Designingprivacy enhancing technologies: design issues in anonymity and unobservability.New York, NY, USA: Springer-Verlag New York, Inc.,2001:46–66.
    [31] Lv Q, Cao P, Cohen E, et al. Search and Replication in Unstructured Peer-to-PeerNetworks[C]//Proceedings of the16th international conference on Supercomput-ing. New York, NY, USA: ACM,2002:84–95.
    [32] Chen Z, Guo S, Yang Y, et al. Research of the Apriority Policy-based Multi-hopBFS Search Algorithm in P2P Network[C]//Proceedings of the2007IFIP Interna-tional Conference on Network and Parallel Computing Workshops. Washington,DC, USA: IEEE Computer Society,2007:471–476.
    [33] Kalogeraki V, Gunopulos D, Zeinalipour-Yazti D. A Local Search Mechanism forPeer-to-Peer Networks[C]//Proceedings of the eleventh international conference onInformation and knowledge management. New York, NY, USA: ACM,2002:300–307.
    [34] Gkantsidis C, Mihail M, Saberi A. Random Walks in Peer-to-Peer Networks: Al-gorithms and Evaluation[J]. Perform. Eval.,2006,63(3):241–263.
    [35] Beverly Yang B, Garcia-Molina H. Designing a Super-Peer Net-work[C]//Proceedings of19th International Conference on Data Engineering. Ban-galore, India:[s.n.],2003:49–60.
    [36] Ratnasamy S, Francis P, Handley M, et al. A Scalable Content-Addressable Net-work[J]. SIGCOMM Comput. Commun. Rev.,2001,31(4):161–172.
    [37] Stoica I, Morris R, Karger D, et al. Chord: A Scalable Peer-to-Peer LookupService for Internet Applications[J]. SIGCOMM Comput. Commun. Rev.,2001,31(4):149–160.
    [38] Zhao B Y, Kubiatowicz J D, Joseph A D. Tapestry: An Infrastruc-ture for Fault-tolerant Wide-area Location and Routing[R].2001.http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail&id=oai%3Ancstrlh%3Aucb%3AUCB%2F%2FCSD-01-1141.
    [39] Rowstron A I T, Druschel P. Pastry: Scalable, Decentralized Object Location, andRouting for Large-Scale Peer-to-Peer Systems[C]//Proceedings of the IFIP/ACMInternational Conference on Distributed Systems Platforms Heidelberg. London,UK, UK: Springer-Verlag,2001:329–350.
    [40] Maymounkov P, Mazie`res D. Kademlia: A Peer-to-Peer Information System Basedon the XOR Metric[C]//Revised Papers from the First International Workshop onPeer-to-Peer Systems.2002. London, UK, UK: Springer-Verlag, IPTPS’01.
    [41] Zhou M, Dai Y, Li X. A Measurement Study of the Structured Overlay Network inP2P File-Sharing Systems[J]. Adv. MultiMedia,2007,2007(1):10–10.
    [42] Li B, Ma M, Jin Z, et al. Topology Investigation of A Large-Scale P2P VoD OverlayNetwork Based on Active Measurement[C]//2010IEEE GLOBECOM Workshops(GC Wkshps). Miami,FL,USA: IEEE Computer Society,2010:519–523.
    [43] Chen Y, Qin T, Huang X, et al. Active Measurement on P2P Swarm Based onCoupon Collector Model[C]//Proceedings of the2012International Conference onComputer Science and Service System. Washington, DC, USA: IEEE ComputerSociety,2012:999–1002.
    [44] Stutzbach D, Rejaie R, Sen S. Characterizing Unstructured Overlay Topologies inModern P2P File-Sharing Systems[J]. IEEE/ACM Trans. Netw.,2008,16(2):267–280.
    [45] Sha Y, Zhang Z, Tan J. Measuring the Influence of Active Measurement on Un-structured Peer-to-Peer Network[C]//Proceedings of the200915th InternationalConference on Parallel and Distributed Systems. Washington, DC, USA: IEEEComputer Society,2009:764–769.
    [46]郭振滨,裘正定. P2P资源流行度测量与建模[J].通信学报,2009,30(3):65–74.
    [47] Pouwelse J, Garbacki P, Epema D, et al. The Bittorrent P2P File-Sharing System:Measurements and Analysis[C]//Proceedings of the4th international conferenceon Peer-to-Peer Systems.2005. Berlin, Heidelberg: Springer-Verlag, IPTPS’05.
    [48] Varvello M, Steiner M, Laevens K. Understanding BitTorrent: A Reality Checkfrom the ISP’s Perspective[J]. Comput. Netw.,2012,56(3):1054–1065.
    [49] Yoshida M, Nakao A. Deep Inspection of Unreachable BitTorrent Swarms[J]. IE-ICE Transactions on Information and Systems,2013, E96.D(2):249–258.
    [50] Hu C L, Lu Z X. Downloading Trace Study for BitTorrent P2P PerformanceMeasurement and Analysis[J]. Peer-to-Peer Networking and Applications,2012,5(4):384–397.
    [51] Hei X, Liang C, Liang J, et al. A Measurement Study of a Large-Scale P2P IPTVSystem[J]. IEEE Transactions on Multimedia,2007,9(8):1672–1687.
    [52] Zheng Y, Huang D, Zhu W, et al. A Measurement Study of P2P VoD Sys-tem[C]//Proceedings of the2009International Conference on Research Challengesin Computer Science (ICRCCS’09). Washington, DC, USA: IEEE Computer So-ciety,2009:174–177.
    [53] Yu Y, Liu D, Li J, et al. Trafc Identification and Overlay Measurement ofSkype[C]//Proceedings of2006International Conference on Computational Intel-ligence and Security. Guangzhou, China: IEEE Press,2006,2:1043–1048.
    [54] Wei T, Chen C. Study of PPStream Based on Measurement[C]//Proceedings of the2008Second International Symposium on Intelligent Information Technology Ap-plication-Volume02(IITA’08). Washington, DC, USA: IEEE Computer Society,2008:900–905.
    [55] Ye Q, Chen C. A Study on Topology Model and Data Contribution Strategy ofPPLive[C]//Proceedings of the2010International Conference on Cyber-EnabledDistributed Computing and Knowledge Discovery (CYBERC’10). Washington,DC, USA: IEEE Computer Society,2010:301–304.
    [56] Zhang C, Dhungel P, Wu D, et al. Unraveling the BitTorrent Ecosystem[J]. IEEETrans. Parallel Distrib. Syst.,2011,22(7):1164–1177.
    [57] Christin N, Weigend A S, Chuang J. Content Availability, Pollution and Poisoningin File Sharing Peer-to-Peer Networks[C]//Proceedings of the6th ACM conferenceon Electronic commerce (EC’05). New York, NY, USA: ACM,2005:68–77.
    [58] Ye L, Zhang H l, Zhang W z, et al. Measurement and Analysis of BitTorrentAvailability[C]//Proceedings of the200915th International Conference on Paralleland Distributed Systems (ICPADS’09). Washington, DC, USA: IEEE ComputerSociety,2009:787–792.
    [59] Montassier G, Cholez T, Doyen G, et al. Content Pollution Quantification inLarge P2P Networks: A measurement Study on KAD[C]//2011IEEE InternationalConference on Peer-to-Peer Computing (P2P’11). Kyoto, Japan: IEEE ComputerSociety,2011:30–33.
    [60] Steiner M, En-Najjary T, Biersack E W. Long Term Study of Peer Behavior in theKAD DHT[J]. IEEE/ACM Trans. Netw.,2009,17(5):1371–1384.
    [61] Klemm A, Lindemann C, Vernon M K, et al. Characterizing the Query Behaviorin Peer-to-Peer File Sharing Systems[C]//Proceedings of the4th ACM SIGCOMMconference on Internet measurement.2004. New York, NY, USA: ACM, IMC’04.
    [62] Qiu D, Srikant R. Modeling and Performance Analysis of BitTorrent-like Peer-to-Peer Networks[C]//Proceedings of the2004conference on Applications, technolo-gies, architectures, and protocols for computer communications (SIGCOMM’04).New York, NY, USA: ACM,2004:367–378.
    [63] Petrovic S, Brown P. Fluid Model for eMule File Sharing System[C]//Proceedingsof the Fourth European Conference on Universal Multiservice Networks (ECUMN’07). Washington, DC, USA: IEEE Computer Society,2007:273–282.
    [64] Guo L, Chen S, Xiao Z, et al. Measurements, Analysis, and Modeling ofBitTorrent-like systems[C]//Proceedings of the5th ACM SIGCOMM conferenceon Internet Measurement (IMC’05). Berkeley, CA, USA: USENIX Association,2005:4–4.
    [65] Gummadi K P, Dunn R J, Saroiu S, et al. Measurement, Modeling, and Analy-sis of a Peer-to-Peer File-sharing Workload[J]. SIGOPS Oper. Syst. Rev.,2003,37(5):314–329.
    [66] Saroiu S, Gummadi K P, Gribble S D. Measuring and Analyzing the Characteristicsof Napster and Gnutella Hosts[J]. Multimedia Syst.,2003,9(2):170–184.
    [67] Ye L, Zhang H, Li F, et al. A Measurement Study on BitTorrent System[J]. Int’l J.of Communications, Network and System Sciences,2010,3(12):916–924.
    [68] Li P, Lui J C, Xu Y. A Stochastic Model for BitTorrent-like Systems[J]. SIGMET-RICS Perform. Eval. Rev.,2008,36(2):116–118.
    [69] Erman D, Ilie D, Popescu A. BitTorrent Trafc Characteristics[C]//Proceedings ofthe International Multi-Conference on Computing in the Global Information Tech-nology (ICCGI’06). Washington, DC, USA: IEEE Computer Society,2006:42–48.
    [70] Fan B, Chiu D M, Lui J. Stochastic Diferential Equation Approach to ModelBitTorrent-like P2P Systems[C]//IEEE International Conference on Communica-tions (ICC’06). Istanbul, Turkey: IEEE Computer Society,2006:915–920.
    [71] Saleh O, Hefeeda M. Modeling and Caching of Peer-to-Peer Traf-fic[C]//Proceedings of the Proceedings of the2006IEEE International Conferenceon Network Protocols (ICNP’06). Washington, DC, USA: IEEE Computer Soci-ety,2006:249–258.
    [72] Bellissimo A, Levine B N, Shenoy P. Exploring the Use of BitTorrent as the Basisfor a Large Trace Repository[R].2004. https://www-old.comp.nus.edu.sg/~bleong/p2pft/related/bellissimo04exploring.pdf.
    [73] Izal M, Uroy-Keller G, Biersack E, et al. Dissecting BitTorrent: Five Months inTorrent’s Lifetime[C]//Proc. of the5th Annual Passive and Active MeasurementWorkshop. Antibes Juan-les-Pins, France: Springer,2004:1–11.
    [74] Gummadi P K, Saroiu S, Gribble S D. A measurement study of Napster andGnutella as Examples of Peer-to-Peer File Sharing Systems[J]. SIGCOMM Com-put. Commun. Rev.,2002,32(1):82–82.
    [75] Yang M, Zhang Z, Li X, et al. An Empirical Study of Free-Riding Behavior in theMaze P2P File-sharing System[C]//Proceedings of the4th international conferenceon Peer-to-Peer Systems. Berlin, Heidelberg: Springer-Verlag,2005:182–192.
    [76] Mol J J D, Pouwelse J A, Epema D H J, et al. Free-Riding, Fairness, and Fire-walls in P2P File-Sharing[C]//Proceedings of the2008Eighth International Confer-ence on Peer-to-Peer Computing. Washington, DC, USA: IEEE Computer Society,2008:301–310.
    [77] Saroiu S, Gummadi P K, Gribble S D. A Measurement Study of Peer-to-Peer FileSharing Systems[C]//Proceedings of The International Society for Optical Engi-neering. San Jose, CA, United states: SPIE,2002:156–170.
    [78] Karakaya M, Korpeoglu I, Ulusoy O. Free Riding in Peer-to-Peer Networks[J].IEEE Internet Computing,2009,13(2):92–98.
    [79] Ramaswamy L, Liu L. Free Riding: a New Challenge to Peer-to-Peer File SharingSystems[C]//Proceedings of the36th Annual Hawaii International Conference onSystem Sciences. Athens, Greece: Inst. of Elec. and Elec. Eng,2003.
    [80] Kong J, Cai W, Wang L. The Evaluation of Index Poisoning in BitTor-rent[C]//Proceedings of the2010Second International Conference on Communica-tion Software and Networks (ICCSN’10). Washington, DC, USA: IEEE ComputerSociety,2010:382–386.
    [81] Harrington J, Kuwanoe C, Zou C C. A BitTorrent-driven Distributed Denial-of-Service Attack[C]//Third International Conference on Security and Privacyin Communications Networks and the Workshops (SecureComm2007). Nice,France: Inst. of Elec. and Elec. Eng. Computer Society,2007:261–268.
    [82] El Defrawy K, Gjoka M, Markopoulou A. BotTorrent: Misusing BitTorrent toLaunch DDoS Attacks[C]//Proceedings of the3rd USENIX workshop on Stepsto reducing unwanted trafc on the internet (SRUTI’07). Berkeley, CA, USA:USENIX Association,2007:1–6.
    [83] Kong J, Cai W, Wang L, et al. A study of Pollution on BitTorrent[C]//The2nd In-ternational Conference on Computer and Automation Engineering (ICCAE2010).Singapore, Singapore: IEEE Computer Society,2010,3:118–122.
    [84] Athanasopoulos E, Anagnostakis K G, Markatos E P. Misusing Unstructured P2PSystems to Perform DoS Attacks: the Network that Never Forgets[C]//Proceedingsof the4th international conference on Applied Cryptography and Network Security.Berlin, Heidelberg: Springer-Verlag,2006:130–145.
    [85] Sia K C. DDoS vulnerability analysis of BT protocol[R].2006. http://oak.cs.ucla.edu/~sia/pub/cs239spring06.pdf.
    [86] Yu J, Li Z, Chen X. Misusing Kademlia Protocol to Perform DDoS At-tacks[C]//Proceedings of the2008IEEE International Symposium on Parallel andDistributed Processing with Applications (ISPA’08). Washington, DC, USA: IEEEComputer Society,2008:80–86.
    [87] Koo H, Lee Y, Kim K, et al. A DDoS Attack by Flooding Normal Control Messagesin Kad P2P Networks[C]//14th International Conference on Advanced Communi-cation Technology (ICACT2012). PyeongChang, Korea: Institute of Electricaland Electronics Engineers Inc.,2012:213–216.
    [88] Lee Y, Kim K, Roh B H. DDoS Attack by File Request Redirection in Kad P2PNetwork[C]//International Conference on Cyber-Enabled Distributed Computingand Knowledge Discovery (CyberC2012). Sanya, China: IEEE Computer Society,2012:497–500.
    [89] Sun X, Torres R, Rao S. DDoS Attacks by Subverting Membership Management inP2P Systems[C]//Proceedings of the20073rd IEEE Workshop on Secure NetworkProtocols. Washington, DC, USA: IEEE Computer Society,2007:1–6.
    [90] Sun X, Torres R, Rao S G. On the Feasibility of Exploiting P2P Systems to LaunchDDoS Attacks[J]. Peer-to-Peer Networking and Applications,2010,3(1):36–51,2010-05-19.
    [91] Lou X, Hwang K, Zhou R. Integrated Copyright Protection in Peer-to-Peer Net-works[C]//Proceedings of the27th International Conference on Distributed Com-puting Systems Workshops. Washington, DC, USA: IEEE Computer Society,2007:28–42.
    [92] IFPI Digital Music Report2011[EB/OL].[2011-10-06]. http://www.ifpi.org/content/section resources/dmr2011.html.
    [93] Watters P A, Layton R, Dazeley R. How much material on BitTorrent is infringingcontent? A case study[J]. Inf. Secur. Tech. Rep.,2011,16(2):79–87.
    [94] Lu C, Li F, Cheng J, et al. Quantitative Analysis and Countermeasures Research ofP2P Routing Attacks[C]//Proceedings of2nd International Workshop on IntelligentSystems and Applications (ISA2010). Wuhan, China: IEEE Computer Society,2010:1–4.
    [95] Yu W, Boyer C, Chellappan S, et al. Peer-to-Peer System-based Active WormAttacks: Modeling and Analysis[C]//IEEE International Conference on Communi-cations (ICC2005). Seoul, Korea: IEEE Computer Society,2005,1:295–300.
    [96] Samreen A, Hussain S. Trust Management and Incentive Mechanism for P2P Net-works: Survey to Cope Challenges[C]//IEEE International Multitopic Conference(INMIC2008). Karachi, Pakistan: Inst. of Elec. and Elec. Eng.,2008:301–306.
    [97] Feldman M, Chuang J. Overcoming Free-riding Behavior in Peer-to-Peer Sys-tems[J]. SIGecom Exch.,2005,5(4):41–50.
    [98] Wu H, Shi C, Chen H, et al. A Trust Management Model for P2P File Shar-ing System[C]//Proceedings of the2008International Conference on Multimediaand Ubiquitous Engineering (MUE’08). Washington, DC, USA: IEEE ComputerSociety,2008:41–44.
    [99] Suomalainen J, Pehrsson A, Nurminen J K. A Security Analysis of a P2P Incen-tive Mechanisms for Mobile Devices[C]//Proceedings of the2008Third Interna-tional Conference on Internet and Web Applications and Services. Washington,DC, USA: IEEE Computer Society,2008:397–402.
    [100] Yang M, Feng Q, Dai Y, et al. A Multi-dimensional Reputation System Combinedwith Trust and Incentive Mechanisms in P2P File Sharing Systems[C]//Proceedingsof the27th International Conference on Distributed Computing Systems Work-shops. Washington, DC, USA: IEEE Computer Society,2007:29–44.
    [101] Ma R T B, Lee S C M, Lui J C S, et al. Incentive and service diferentiationin P2P networks: a game theoretic approach[J]. IEEE/ACM Trans. Netw.,2006,14(5):978–991.
    [102] Xiao X, Zhang Q, Shi Y, et al. How Much to Share: A Repeated Game Model forPeer-to-Peer Streaming under Service Diferentiation Incentives[J]. IEEE Trans.Parallel Distrib. Syst.,2012,23(2):288–295.
    [103] Huang Q, Huang S, Gao C. A Diferentiated Service Based Incentive Mechanismin P2P File-sharing Systems[C]//Proceedings of the2007IFIP International Con-ference on Network and Parallel Computing Workshops. Washington, DC, USA:IEEE Computer Society,2007:419–424.
    [104] Tan G, Jarvis S A. A Payment-Based Incentive and Service Diferentiation Schemefor Peer-to-Peer Streaming Broadcast[J]. IEEE Trans. Parallel Distrib. Syst.,2008,19(7):940–953.
    [105] Sirivianos M, Yang X, Jarecki S. Robust and Efcient Incentives for CooperativeContent Distribution[J]. IEEE/ACM Trans. Netw.,2009,17(6):1766–1779.
    [106] Zhao B Q, Lui J C S, Chiu D M. A Mathematical Framework for AnalyzingAdaptive Incentive Protocols in P2P Networks[J]. IEEE/ACM Trans. Netw.,2012,20(2):367–380.
    [107] Kamvar S D, Schlosser M T, Garcia-Molina H. The Eigentrust Algorithm for Repu-tation Management in P2P networks[C]//Proceedings of the12th international con-ference on World Wide Web (WWW’03). New York, NY, USA: ACM,2003:640–651.
    [108] Zhou R, Hwang K. PowerTrust: A Robust and Scalable Reputation System forTrusted Peer-to-Peer Computing[J]. IEEE Trans. Parallel Distrib. Syst.,2007,18(4):460–473.
    [109] Xiong L, Liu L. PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities[J]. IEEE Trans. on Knowl. and Data Eng.,2004,16(7):843–857.
    [110] Zhou R, Hwang K, Cai M. GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks[J]. IEEE Trans. on Knowl. and Data Eng.,2008,20(9):1282–1295.
    [111] Cornelli F, Damiani E, di Vimercati S D C, et al. Choosing Reputable Servents in aP2P Network[C]//Proceedings of the11th international conference on World WideWeb (WWW’02). New York, NY, USA: ACM,2002:376–386.
    [112] Gupta A, Malhotra D, Awasthi L. NeighborTrust: A trust-based scheme for coun-tering Distributed Denial-of-Service attacks in P2P networks[C]//16th IEEE Inter-national Conference on Networks (ICON2008). New Delhi, India: Inst. of Elec.and Elec. Eng. Computer Society,2008:1–6.
    [113] Jose J L, Js J, Thampi S M. Sybil Resilient Identity Distribution in P2P Net-works[C]//Proceedings of the International Conference on Advances in Comput-ing, Communications and Informatics (ICACCI’12). New York, NY, USA: ACM,2012:433–439.
    [114] Lu C. Detection and Defense of Identity Attacks in P2P Network[C]//Proceedingsof the4th International Symposium on Advances in Computation and Intelligence(ISICA’09). Berlin, Heidelberg: Springer-Verlag,2009:500–507.
    [115] Kohnen M. Applying trust and reputation mechanisms to a Kademlia-based Dis-tributed Hash Table[C]//2012IEEE International Conference on Communications(ICC2012). Ottawa, ON, Canada: Institute of Electrical and Electronics EngineersInc.,2012:1036–1041.
    [116] Fantacci R, Maccari L, Rosi M, et al. Avoiding Eclipse Attacks on Kad/Kademlia:an Identity Based Approach[C]//Proceedings of the2009IEEE internationalconference on Communications (ICC’09). Piscataway, NJ, USA: IEEE Press,2009:983–987.
    [117] Chen R, Lua E K, Crowcroft J, et al. Securing Peer-to-Peer Content SharingService from Poisoning Attacks[C]//Proceedings of the2008Eighth InternationalConference on Peer-to-Peer Computing. Washington, DC, USA: IEEE ComputerSociety,2008:22–29.
    [118] Sun X, Torres R, Rao S. Preventing DDoS Attacks on Internet Servers ExploitingP2P Systems[J]. Comput. Netw.,2010,54(15):2756–2774.
    [119] Levin D, Douceur J R, Lorch J R, et al. TrInc: Small Trusted Hardware forLarge Distributed Systems[C]//Proceedings of the6th USENIX symposium onNetworked systems design and implementation.2009. Berkeley, CA, USA:USENIX Association, NSDI’09.
    [120] Mee J, Watters P A. Detecting and Tracing Copyright Infringements in P2P Net-works[C]//Proceedings of the International Conference on Networking, Interna-tional Conference on Systems and International Conference on Mobile Communi-cations and Learning Technologies (ICNICONSMCL’06). Washington, DC, USA:IEEE Computer Society,2006:60–65.
    [121] Chow K P, Cheng K Y, Man L Y, et al. BTM-An Automated Rule-based BT Mon-itoring System for Piracy Detection[C]//Proceedings of the Second InternationalConference on Internet Monitoring and Protection (ICIMP’07). Washington, DC,USA: IEEE Computer Society,2007:2–7.
    [122] Sherman A, Stavrou A, Nieh J, et al. Adding Trust to P2P Distribution of Paid Con-tent[C]//Proceedings of the12th International Conference on Information Security(ISC’09). Berlin, Heidelberg: Springer-Verlag,2009:459–474.
    [123] Zhang X, Liu D, Chen S, et al. Towards Digital Rights Protection in BitTorrent-likeP2P Systems[C]//Proceedings of SPIE-IS and T Electronic Imaging-MultimediaComputing and Networking. San Jose, CA, United states: SPIE,2008:1–11.
    [124] Chen Y Y, Jan J K, Chi Y Y, et al. A Feasible DRM Mechanism for BT-LikeP2P System[C]//Proceedings of the2009International Symposium on InformationEngineering and Electronic Commerce (IEEC’09). Washington, DC, USA: IEEEComputer Society,2009:323–327.
    [125] Lou X, Hwang K. Collusive Piracy Prevention in P2P Content Delivery Net-works[J]. IEEE Trans. Comput.,2009,58(7):970–983.
    [126] Li X, Krishnan S, Ma N W. A Wavelet-PCA-based Fingerprinting Scheme forPeer-to-Peer Video File Sharing[J]. Trans. Info. For. Sec.,2010,5(3):365–373.
    [127] Sung J Y, Jeong J Y, Yoon K S. DRM Enabled P2P Architecture[C]//The8thInternational Conference Advanced Communication Technology (ICACT2006).Phoenix Park, Korea: Institute of Electrical and Electronics Engineers ComputerSociety,2006,1:487–490.
    [128] Qiu Q, Tang Z, Yu Y. A Decentralized Authorization Scheme for DRM in P2PFile-sharing Systems[C]//IEEE Consumer Communications and Networking Con-ference (CCNC2011). Las Vegas, NV, United states: IEEE Computer Society,2011:136–140.
    [129] Wu D, Dhungel P, Hei X, et al. Understanding Peer Exchange in BitTorrent Sys-tems[C]//IEEE Tenth International Conference on Peer-to-Peer Computing (P2P2010). Delft, Netherlands:[s.n.],2010:1–8.
    [130] Testa C, Rossi D. On the Impact of uTP on BitTorrent Completion Time[C]//IEEEInternational Conference on Peer-to-Peer Computing (P2P2011). Kyoto, Japan:IEEE Computer Society,2011:314–317.
    [131] Tian Y, Wu D, Ng K W. Modeling, Analysis and Improvement for BitTorrent-LikeFile Sharing Networks[C]//Proceedings of25th IEEE International Conference onComputer Communications (INFOCOM2006.). Barcelona, Spain: IEEE Com-puter Society,2006:1–11.
    [132] Suprnova[EB/OL].[2012-12-22]. http://www.suprnova.org/.
    [133] TorrentZ[EB/OL].[2012-12-22]. http://torrentz.eu/.
    [134] The5Most Popular BitTorrent Trackers[EB/OL].[2007-09-24]. http://torrentfreak.com/5-most-popular-bittorrent-trackers-070924/.
    [135] Wang H, Liu J, Xu K. On the Locality of BitTorrent-based Video File Swarm-ing[C]//Proceedings of the8th international conference on Peer-to-peer systems(IPTPS’09). Berkeley, CA, USA: USENIX Association,2009:12–12.
    [136] Liu J, Wang H, Xu K. Understanding Peer distribution in the Global Internet[J].Netwrk. Mag. of Global Internetwkg.,2010,24(4):40–44.
    [137] Hossfeld T, Lehrieder F, Hock D, et al. Characterization of BitTorrent Swarms andtheir Distribution in the Internet[J]. Comput. Networks,2011,55(5):1197–1215.
    [138] Liu Y, Liu X, Xiao L, et al. Location-aware Topology Matching in P2P Sys-tems[C]//Proceedings of IEEE Conference on Computer Communications (INFO-COM2004). Hongkong, China: Institute of Electrical and Electronics EngineersInc.,2004,4:2220–2230vol.4.
    [139] Liu B, Cui Y, Lu Y, et al. Locality-awareness in BitTorrent-like P2P Applica-tions[J]. Trans. Multi.,2009,11(3):361–371.
    [140] Ren S, Tan E, Luo T, et al. TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client[C]//Proceedings of IEEE Conference on ComputerCommunications (INFOCOM2010). San Diego, CA: IEEE Computer Society,2010:1–9.
    [141] Al-Hamra A, Legout A, Barakat C. Understanding the Properties of the BitTorrentOverlay[J]. INRIA Tech. Rep. inria-00162088, version1,2007,1(1):1–18. http://arxiv.org/pdf/0707.1820.pdf.
    [142] Urvoy-Keller G, Michiardi P. Impact of Inner Parameters and Overlay Structure onthe Performance of BitTorrent[C]//INFOCOM2006.25th IEEE International Con-ference on Computer Communications. Proceedings. Barcelona, Spain: Instituteof Electrical and Electronics Engineers Inc,2006:1–6.
    [143] Legout A, Liogkas N, Kohler E, et al. Clustering and sharing incentives in BitTor-rent systems[C]//Proceedings of the2007ACM SIGMETRICS international con-ference on Measurement and modeling of computer systems.2007. New York, NY,USA: ACM, SIGMETRICS’07, http://doi.acm.org/10.1145/1254882.1254919.
    [144] Dale C, Liu J, Peters J, et al. Evolution and Enhancement of BitTorrent NetworkTopologies[C]//Quality of Service,2008. IWQoS2008.16th International Work-shop on..[S.l.]:[s.n.],2008:1–10.
    [145] Farzad A, Rabiee H. Modeling Topological Characteristics of BitTorrent-LikePeer-to-Peer Networks[J]. Communications Letters, IEEE,2011,15(8):896–898.
    [146] Zhong L, Wang X, Kihl M. Topological Model and Analysis of the P2P BitTor-rent Protocol[C]//Proceedings of9th World Congress on Intelligent Control andAutomation (WCICA2011). Taipei, Taiwan:[s.n.],2011:753–758.
    [147] Kryczka M, Cuevas R, Guerrero C, et al. Unrevealing the structure of live Bit-Torrent swarms: Methodology and analysis[C]//2011IEEE International Confer-ence on Peer-to-Peer Computing (P2P). Kyoto, Japan: IEEE Computer Society,2011:230–239.
    [148] Fauzie M, Thamrin A, Van Meter R, et al. A temporal view of the topology ofdynamic Bittorrent swarms[C]//2011IEEE Conference on Computer Communi-cations Workshops (INFOCOM WKSHPS). Shanghai, China: IEEE ComputerSociety,2011:894–899.
    [149] Vu L, Gupta I, Nahrstedt K, et al. Understanding overlay characteristics of a large-scale peer-to-peer IPTV system[J]. ACM Trans. Multimedia Comput. Commun.Appl.,2010,6(4):31:1–31:24.
    [150] PlanetLab[EB/OL].[2012-09-13]. http://www.planet-lab.org/.
    [151] Rasterbar Libtorrent[EB/OL].[2013-03-04]. http://www.rasterbar.com/products/libtorrent/.
    [152] Wallach D S. A Survey of Peer-to-Peer Security Issues[C]//Proceedings of the2002Mext-NSF-JSPS international conference on Software security: theories andsystems (ISSS’02). Berlin, Heidelberg: Springer-Verlag,2003:42–57.
    [153] Gheorghe G, Cigno R L, Montresor A. Security and privacy issues in P2P stream-ing systems: A Survey[J]. Peer-to-Peer Networking and Applications,2011,4(2):75–91.
    [154] RFC5765:Security Issues and Solutions in Peer-to-Peer Systems[EB/OL].[2012-12-22]. http://tools.ietf.org/html/rfc5765.
    [155] Shah P, franc ois Pa ris J. Incorporating Trust in the BitTorrent Proto-col[C]//Proceedings of International Symposium on Performance Evaluation ofComputer and Telecommunication Systems. San Diego, California, USA: TheSociety for Modeling and Simulation International,2007:586–593.
    [156] BitTorrent Peer Exchange Conventions[EB/OL].[2012-12-22]. http://wiki.theory.org/BTPeerExchangeConventions.
    [157] BitTorrent Extension Protocol[EB/OL].[2012-12-22]. http://www.rasterbar.com/products/libtorrent/extensionprotocol.html.
    [158] Iwata T, Abe T, Ueda K, et al. A DRM System Suitable For P2P Content De-livery and The Study on Its Implementation[C]//The9th Asia-Pacific Conferenceon Communications (APCC2003). Penang, Malaysia: IEEE Computer Society,2003:806–811Vol.2.
    [159] Tsolis D, Sioutas S, Panaretos A, et al. Decentralized Digital Content Exchangeand Copyright Protection via P2P Networks[C]//Proceedings of the2011IEEESymposium on Computers and Communications (ISCC’11). Washington, DC,USA: IEEE Computer Society,2011:1056–1061.
    [160] Deng Y, Du M, Liang Y, et al. An Algorithm Designing for a DRM System Basedon P2P[C]//4th International Conference on Wireless Communications, Network-ing and Mobile Computing (WiCOM’08). Dalian, China: Inst. of Elec. and Elec.Eng. Computer Society,2008:1–4.
    [161] Wu W C, Chen Y M. TLMS: A Novel DRM Scheme for Multimedia Sharingin P2P Networks[C]//Proceedings of the2009Fifth International Conference onIntelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’09).Washington, DC, USA: IEEE Computer Society,2009:873–876.
    [162] El Gamal T. A Public Key Cryptosystem and a Signature Scheme Based on Dis-crete Logarithms[C]//Proceedings of CRYPTO84on Advances in cryptology. NewYork, NY, USA: Springer-Verlag New York, Inc.,1985:10–18.
    [163] Stinson D R. Cryptography Theory and Practice[M]. Boca Raton, FL: CRC Press,Inc.,2002:161–187.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700