期刊文献+

针对节点度幂律分布对等覆盖网络的分散式目标免疫 被引量:2

A novel approach to local vaccination of P2P networks with power-law node degree distributions
原文传递
导出
摘要 P2P网络的节点度近似服从幂律分布的无标度特性导致了这类网络对随机故障的鲁棒性和对蓄意攻击的脆弱性.为提高其抵抗蓄意攻击的能力,提出了一种经济、高效的分散式目标免疫策略,针对(1)具有最高连接度的节点、(2)具有最高可用性的节点和(3)与具有最高负载的链路直接相连的节点这三类目标实施免疫,设计了基于NoN-indexing机制的熟人免疫方法,能够仅利用网络拓扑局部知识和仅免疫少量关键节点,即可大幅度提高P2P网络的抗蓄意攻击能力.仿真实验结果验证了该分散式免疫策略的经济性和高效性. The power-law node degree distributions of peer-to-poer overlay networks make them extremely robust to random failures whereas highly vulnerable under intentional targeted attacks. To enhance attack survivability of these networks, a novel immunization strategy, coupled with a NoN-indexing based acquaintances selection method, is proposed to conduct completely decentralized immunizations, by utilizing only domain heuristics locally, and by curing only those right nodes with ( 1 ) highest connectivity, (2) highest availability and (3) highest link-load. Extensive simulation results show that the proposed immunization strategy Outperforms its competitors, producing an arresting increase of the network attack tolerance,at a lower price of eliminating computer viruses or malicious attacks.
作者 黄新力
出处 《系统工程理论与实践》 EI CSCD 北大核心 2008年第11期135-141,共7页 Systems Engineering-Theory & Practice
基金 国家自然科学基金(60803127) 上海市重大科技攻关专项(07DZ15006)
关键词 对等覆盖网络 拓扑结构 幂律分布 蓄意攻击 分散式目标免疫 成本 效率 peer-to-peer overlay networks topology power-law intentional attacks decentralized targeted immunization cost efficiency
  • 相关文献

参考文献16

  • 1Gnutella[EB/OL]. http://www. gnutella. com.
  • 2Jovanovic M A, Annexstein F S, Berman K A. Modeling peer-to-peer network topologies through small-world models and power laws[C]//Ⅸ Telecommunications Forum, 2001.
  • 3Zhang H, Coel A, Govindan R. Using the small-world model to improve freenet performance[C]//Proceedings of IEEE Infocom, New York, 2002, 40-49.
  • 4Newman M E J. The structure and function of complex networks[J]. SIAM Review, 2003, 45: 167- 256.
  • 5Clarke I, Sandberg O, Wiley B,et al. Freenet: A distributed anonymous information storage and retrieval system in designing privacy enhancing technologies[C]//International Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, 2001.
  • 6Albert R, Jeong H, Barabasi A -L. Error and attack tolerance of complex networks[J]. Nature, 2000, 406: 378- 382.
  • 7Pastor-Satorras R, Vespignani A. Immunization of complex networks[J]. Phys Rev E, 2001, 65: 036134.
  • 8Cohen R, Havlin S, Ben-Avraham D. Efficient immunization strategies for computer networks and populations[J]. Phys Rev Lett, 2003, 91: 247901.
  • 9Gomez-C, ardenes J, Echenique P, Moreno Y. Immunization of real complex networks[J]. Eur Phys J B, 2006, 49: 259-264.
  • 10Hohne P, Kim B J, Yoon C N,et al. Attack vulnerability of complex networks[J]. Phys Rev E, 2002, 65.

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部