期刊文献+

P2P网络资源传播模型分析及监测 被引量:8

Analysis and Supervision of P2P Network Resource Diffusion Model
原文传递
导出
摘要 P2P网络传输是当今互联网中最主要的应用之一,它的流行使得互联网上资源的共享变得十分便捷,同时也使得传播控制和信息监管变得十分困难。这里以经典的病毒传播模型为基础,提出了一个复杂、快速及大范围网络的传播模型,实现了一个针对BT和eMule下载的传播监测系统,该系统可以对某个资源的网络传播进行扩散趋势预测和节点定位。该传播模型配合监测系统能够对P2P网络资源传播进行有效的监控和预测分析,使管理者能对网络进行更加有力的监管。 P2P network is one of the most important applications on the Internet.Its popularity makes resource sharing much easier,while the control and supervision of the information much harder on the Internet.Based on the classic diffusion model of virus,this paper proposes a diffusion model of a complicated,quick,large-scale network,thus implementing a supervision system for the diffusion of BT download and eMule download.This system could predict the diffusion trend of the resources and locate all the nodes related to this diffusion.With the diffusion model and the supervision system,the supervision and prediction of resource diffusion through P2P network becomes possible,and this makes it easier for the administrators to effectively control and supervise the network.
出处 《信息安全与通信保密》 2011年第5期56-58,共3页 Information Security and Communications Privacy
关键词 P2P网络 传播模型 BT EMULE P2P network diffusion model BT eMule
  • 相关文献

参考文献5

二级参考文献19

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2张基温,董瑜.大规模P2P网络下蠕虫攻击的研究[J].微计算机信息,2006,22(08X):245-246. 被引量:4
  • 3Bijit Hore, SharadMehrotra, and Gene Tsudik. A Privacy2Preserving In2 dex for Range Queries[J]. In Proc of 30 th International Conference on Very Large Databases, Toronto, Canada, 2004(30): 720 -731.
  • 4D.J. Daley and J. Gani. Epidemic Modelling: An Introduction [M]. Cambridge University Press, Cambridge, UK, 1999.
  • 5Zhou Lidong, Zhang Lintao, McSherry F. A First Look at Peer- to-Peer Worms: Threats and Defenses[C]//Proc. of IPTPS'05. 2005 (02).
  • 6Wei Yu, BOYER C, CFIELLAPPAN S, Dong Xuan. Peer- to - peer system- based active worm attacks. modeling and analysis[J ]. Proe of the IEEE International Conference on Communications, 2005:295 - 300.
  • 7Gu Qiiun, Bai Kun, Wang Hai, et al. Modeling of pollution in P2P file sharing systmes[C]//Proc of 3rd IEEE Consumer Communications and Networking Conference, 2006:1033 - 1037.
  • 8GUMMADI K P, DUNN R J, SAROIU S. Measurement modeling and analysis of a peer - to - peer file - sharing workload[ C]//Proc of the ACM SOSP, 2003: 314 - 329.
  • 9STREFTARIS G, GIBSON GJ. Statistical inference for stochastic epidemic models[C]//Proc of the int workshop on Statistical Modeling, 2002: 609 - 616.
  • 10GUPTA R, and SOMANI A. Reputation management framework and its use as currency in large- scale peer- to-peer networks[J].//Proc of the 4th International Conference on Peer- to- Peer Computing, 2004:124 - 132.

共引文献45

同被引文献48

  • 1杨胜刚,何靖.反洗钱领域大额与可疑信息报告制度的经济学分析[J].金融研究,2004(10):113-119. 被引量:38
  • 2池亚平,方勇,吴艺园.构建可信计算网络的研究[J].北京电子科技学院学报,2005,13(4):19-21. 被引量:2
  • 3张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:119
  • 4贾德礼,方勇.非集中式P2P系统信任值安全管理的研究[J].信息安全与通信保密,2007,29(2):83-85. 被引量:4
  • 5DOUCEUR J R.The Sybil Attack[C] //Proc.of the1st International Workshop on Peer-to-Peer Systems.Cambridge,MA,USA:[s.n.] ,2002:251-260.
  • 6YU H,KAMINSKY M,GIBBONS P B,et al.SybilGuard:Defending Against Sybil Attacks Viasocial Networks[J].IEEE/ACM Transactions on Networking,2008,16(3):576-589.
  • 7YU H,GIBBONS P,KAMINSKY M,et al.SybilLimit:Anear-optimal Social Network Defense Against Sybil Attacks[C] //IEEE Symposium on Security and Privacy(2008).[s.l.] :IEEE Comoputer Society,2008:3-17.
  • 8MORSELLI R,BHATTACHARJEE B,SRINIVASAN A,et al.Efficient Lookup on Unstructured Topologies[C] //ACM PODC.[s.l.] :ACM,2005.
  • 9CHENG A,FRIEDMAN E.Sybilproof Reputation Mechanisms[C] //The2006International Conference on P2PEcon.[s.l.] :ACM,2006:128-132.
  • 10ROWAIHY H,ENCK W,MCDANIEL P,et al.Limiting Sybil Attacks in Structured P2P Networks[C] //Proc.26th INFOCOM Conference(St.Louis,MO).Anchorage,AK:IEEE Computer Society Press,2596-2600.

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部