期刊文献+

P2P网络安全监控系统的设计与实现 被引量:1

Design and Implementation of P2P Network Security Monitoring System
在线阅读 下载PDF
导出
摘要 针对P2P技术带来新的网络安全问题,以国内某一广泛应用的P2P系统为对象,设计并实现了对P2P用户有效监控,对有害信息传播进行封堵过滤,对危害行为进行布控定位,保障了P2P系统健康运行.目前,该系统已经在实际中得到成功应用. Aiming at new network security problems brought by P2P technology, with the object of P2P system applied in domestic field, this paper designs and implements a network security monitoring system, which can monitor P2P user actions, jam and filtrate hannful information, control and orientate hannful actions. This system has been applied to P2P security monitoring successfully.
出处 《华东交通大学学报》 2008年第4期25-29,共5页 Journal of East China Jiaotong University
关键词 P2P 网络安全 封堵过滤 布控定位 P2P network security jamming and filtrating controlling and orientating
  • 相关文献

参考文献3

二级参考文献12

  • 1俞燕燕,李绍滋.eMule系统的协议分析[J].合肥工业大学学报(自然科学版),2006,29(9):1096-1100. 被引量:4
  • 2周健,洪佩琳,李津生.DHT网络中一种基于树型结构的负载均衡方案[J].小型微型计算机系统,2006,27(11):2042-2046. 被引量:7
  • 3Schneier B.Applied Cryptography:protocols,algorithms,and source code in C[M].2nd Rev edition.John Wiley,1996.
  • 4FIPS PUB 180-1,Secure Hash Standard (SHA-1)[S].National Institute of Standards and Technology (NIST),1995.
  • 5Bosselaers A,Govaerts R,Vandewalle J.SHA:A design for parallel architectures?[C].Fumy W.Advances in Cryptology-EUROCRYPT '97.Heidelberg:Springer-Verlag,1997:348-362.
  • 6Sklavos N,Kitsos P,Alexopoulos E,et al.Open Mobile Alliance (OMA) Security Layer:Architecture,Implementation and Performance Eva-luation of the Integrity Unit[C].New Generation Compu-ting:Computing Paradigms and Computational Intelligence,Springer-Verlag,2004.
  • 7Sklavos N,Alexopoulos E,Koufopavlou O.Networking Data Integrity:High Speed Architectures and Hardware Implementations[J].IAJIT Journal,2003,1:54-59.
  • 8Harris Michail,Athanasios P Kakarountas,Odysseas Koufopavlou,et al.A Low-Power and High-Throughput Implementation of the SHA-1 Hash Function[C].ISCAS 2005.IEEE International Symposium on Circuits and Systems,2005,4:4096-4089.
  • 9CAST Inc.SHA-1 Processor[EB/OL].[2002].http://www.xinlinx.com/products/logicore/alliance/cast/cast_sha_1.pdf.
  • 10Napster.http://www.napster.com/.

共引文献12

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部