期刊文献+

基于Gnutella协议的P2P网络中DoS攻击防御机制研究

The Study on DoS Attacks the Mechanism of Defending in P2P Network Based on Gnutella Agreement
在线阅读 下载PDF
导出
摘要 对基于Gnutella协议的P2P计算网络实施DoS攻击的特征进行了详细分析,通过设置攻击容忍度和防御起点,提出了一种简单的基于特征的DoS攻击防御策略,运用基于贝叶斯推理的异常检测方法发现攻击,使系统能根据DoS攻击的强弱,自适应调整防御机制,维持网络的服务性能。仿真结果表明,本文提出的防御策略能有效防御恶意节点对网络发动的DoS攻击,使网络服务的有效性达到98%,正常请求包被丢弃的平均概率为1.83%,预防机制平均时间开销仅占网络总开销的6.5%。 This paper calculate to based on Gnutella agreement P2P network implement characteristic that DoS attack go on in detail analyzing. By setting up tbe attack tolerating degree and starting point with defending, a new kind of simple DoS attacks the tactics of defending based on characteristic is proposed. Use the abnormality detection method to find attack based on Bayes reasoning, he power enabled system to attack according to DoS, adjust the mechanism of defending in self-adaptation and maintain the service performance of the network. The simulation result shows, this paper put forward defend tactics can effective defend hostile node attack to DoS that network mobilize, and making the service efficiency of the network more than 98%, it is 1.83% that normal request packets the average probability abandoned, prevent mechanism average time expenses account for network of overhead only 6.5%.
作者 乐光学
出处 《微电子学与计算机》 CSCD 北大核心 2005年第7期92-98,共7页 Microelectronics & Computer
基金 国家自然科学基金项目(60273075) 资助湖南省教育厅重点基金(03A036)资助
关键词 对等网 DOS攻击 自适应攻击防御 贝叶斯推理 防御起点 攻击容忍度 Peer to peer network, Denial of service attacker, Self-adaptation attacks the defend, Starting point with defend, Attack and tolerate degree
  • 相关文献

参考文献8

  • 1Fox G. Peer-to-Peer networks[J]. Computing in Science & Engineering. 2001, 3(3): 75-77.
  • 2Jovanovic MA. Modeling Large-scale Peer-to-peer Networks and a Case Study of Gnutella [MS. Thesis].University of Cincinnati, 2001.
  • 3Faloutsos M, Faloutsos P, Faloutsos C. On Power-law Relationships of the Intemet Topology. In: Chapin L, Sterbenz JPG, Parulkar G, Turner JS, eds. Proc. of the ACM SIGCOMM'99. New York: ACM Press, 1999: 251-262.
  • 4http://www.jxta.org/docs/trust.pdf Poblano A Distributed Trust Model for Peer-to-Peer Networks.
  • 5http://www-106.ibm.com/developerworks/java/library/jp2ptrust/The Practice of Peer-to-Peer Pomputing: Trust and Security in Peer-to-Peer Networks.
  • 6乐光学.基于Gnutella协议的分布式Peer-to-Peer网络连接管理策略及改进研究[J].计算机工程与应用,2004,40(29):109-112. 被引量:3
  • 7L unt, T F, Tamaru A, Gilham F, et al. A real-time Intrusion Detection Expert System (IDES). Technical Report,Computer Science Laboratory, SR I International, Menlo Park, California, 1992.
  • 8李晓戈,杨寿保.对等网络中搜索策略的研究[J].计算机科学,2003,30(9):94-96. 被引量:14

二级参考文献13

  • 1Sundsted T. The practice of peer-to-peer computing : Introduction and history A new-fangled name, hut an old and useful approach to computing, http://www-900. ihm. com/developerWorks/cn/java/j-p2p/partl/index-eng. shtml.
  • 2Gnutella's website : www. gnutella. com.
  • 3Sundsted T. The practice of peer-to-peer computing: Discovery.http://www-900. ibm. com/developerWorks/cn/java/j-p2p/partS/index-eng. shtml.
  • 4Sundsted T. The practice of peer-to-peer computing: IP Multicast-cast-based discovery, http://www-900. ibm. com/developerWorks/cn/java/j-p2p/part 6/index- eng. shtml.
  • 5Yang B, Garcia-Molina H. Improving Search in Peer-to-Peer Networks, http://www-db. stanford. edu/peers/.
  • 6Oram A. Gnutella and Freenet Represent True Technological Innovation http: //www. oreillynet. com/pub/a/network/2000/05/12/magazine/gnutella. html.
  • 7Peer-to-Peer:Harnessing the Power of Disruptive Technologies. O'Reilly. Andy Oram.
  • 8Jon M Kleinberg,Ravi Kumar,Prabhakar Raghavan et al.The web a graph:measurements,models,and methods[C].In:the 5th Annual international conference on computing and combinatorics, 1999 :volume 1627,1~7
  • 9F-Measure.http://www.sims.berkeley.edu/academics/courses/is202/f97/lecture21/sld012.htm
  • 10San Jose. The Emergence of Distributed Content Management and Peer-to-Peer Content Networks[M].Gartner Group Inc,2001

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部