[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163-166.
 ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(01):163-166.
点击复制

P2P网络的信任评估安全模型研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年01期
页码:
163-166
栏目:
安全与防范
出版日期:
2014-01-31

文章信息/Info

Title:
Research of a Safe Model of Trust Evaluation for P2 P Network
文章编号:
1673-629X(2014)01-0163-04
作者:
张祖昶王诚
南京邮电大学 通信与信息工程学院
Author(s):
ZHANG Zu-changWANG Cheng
关键词:
对等网络安全模型防御攻击
Keywords:
peer-to-peersafe modeldefenseattack
分类号:
TP309
文献标志码:
A
摘要:
文中针对当前P2 P网络安全的需要,提出了一种信任评估网络安全模型,给出了新的信任评估计算方法和仿真实验。文中提出的信任评估模型是属于对等信任模型,该模型适合P2 P网络的分布式结构,也适应于P2 P网络对节点保持对等、独立、自由和异构的要求。实验结果表明,在P2 P网络中建立起对等的信任评估模型,其效果是明显的。 P2 P网络中的节点能通过模型算法来判断来访节点的情况,通过对来访者真实情况的甄别和判断,能拒绝恶意节点的入侵,有效地抑制了网络中恶意节点的攻击成功次数。
Abstract:
According to the requirement of P2P network security,propose a network security model based on the trust evaluation for P2P network,give a new calculation method of the trust evaluation,and the model's simulation experiment. In this paper,the proposed trust e-valuation model is a peer-to-peer trust model. The model is suitable for the distributed structure of the P2P network,but also adapts to the requirements of maintaining equal,independent,free and heterogeneous for the nodes. The experimental results show that,to build up trust evaluation model of peers in P2P network,the effect is obvious. A node in the P2P network can determine the visiting nodes by the model algorithm,screen and judge the visitor,reject the invasion of malicious nodes,effectively restraining the number of success attack of malicious nodes.

相似文献/References:

[1]李程程 张永胜 刘广钰.一种安全的语义Web服务模型研究[J].计算机技术与发展,2010,(02):171.
 LI Cheng-cheng,ZHANG Yong-sheng,LIU Guang-yu.Research on a Secure Semantic Web Services Model[J].,2010,(01):171.
[2]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
 SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(01):126.
[3]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
 LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(01):188.
[4]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(01):181.
[5]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
 WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(01):151.
[6]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
 GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(01):102.
[7]乔加新.多方数据通信安全模型研究[J].计算机技术与发展,2007,(06):179.
 QIAO Jia-xin.Research on Security Model Used for Multi- Communication[J].,2007,(01):179.
[8]乔加新.OPC XML数据通信安全模型的研究[J].计算机技术与发展,2007,(07):148.
 QIAO Jia-xin.Research on Security Model Used for OPC XML Data Communication[J].,2007,(01):148.
[9]许加兴 汪厚新 周艳 金炜东.P2P网中基于IP组播的发现机制研究[J].计算机技术与发展,2006,(06):32.
 XU Jia-xing,WANG Hou-xin,Zhou yah,et al.Discovery Implementation by IP Multicast in Peer to Peer Network[J].,2006,(01):32.
[10]杨文俊.P2P网络系统中节点自组织管理机制[J].计算机技术与发展,2006,(07):57.
 YANG Wen-jun.A Novel Self-Organization Mechanism for Nodes Management in P2P Networks[J].,2006,(01):57.

更新日期/Last Update: 1900-01-01