[1]张涵 张建标 张涛.一种可对抗女巫攻击的激励模型研究[J].计算机技术与发展,2012,(12):164-166.
 ZHANG Han,ZHANG Jian-biao,ZHANG Tao.Research of a Incentive Model Resisting Sybil Attack[J].,2012,(12):164-166.
点击复制

一种可对抗女巫攻击的激励模型研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年12期
页码:
164-166
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research of a Incentive Model Resisting Sybil Attack
文章编号:
1673-629X(2012)12-0164-03
作者:
张涵 张建标 张涛
北京工业大学计算机学院
Author(s):
ZHANG Han ZHANG Jian-biao ZHANG Tao
College of Computer Science, Beijing University of Technology
关键词:
P2P女巫攻击激励机制
Keywords:
P2P Sybil attack incentive mechanism
分类号:
TP309
文献标志码:
A
摘要:
女巫攻击是peer—to—peer(P2P)系统中广泛遭受的攻击,而现有解决方案的作用均十分有限。文中结合现有主流的女巫攻击防范方案,提出一种可对抗女巫攻击的、具有全局惩罚因子的激励模型。通过利用惩罚因子记录系统遭受过的攻击,可以加速攻击节点的驱逐和隔离,并使得攻击者在一段时间内无法对系统产生影响。实验数据证明,文中提出的方案可以使得攻击者在一定时间内不能接人系统,而通过调整全局惩罚因子的幅度,甚至可以使得系统全局在一定时间内没有攻击节点的存在
Abstract:
Peer-to-peer (P2P) systems suffer from Sybil attack. Most defense mechanisms don't work well under such attack. Combining with advantages of main stream Sybil attack defense mechanism,propose a novel solution by introducing a global penalty factor into in centive mechanism. By using the penalty factor recording system suffered attack,can accelerate attack node out and isolation,and make the attacker in a period of time not to affect system. Experimental results show that,by using model proposed in this paper,attacker could not enter the system for a period of time and by adjusting penalty level of this factor there could be shortly no attacker in entire system

相似文献/References:

[1]宫博 王汝传.基于会话的局域网P2P流量识别方法的研究[J].计算机技术与发展,2010,(03):5.
 GONG Bo,WANG Ru-chuan.Research on Method of Session - Based P2P Network Traffic Identification[J].,2010,(12):5.
[2]范会波 张新有.基于P2P的文件共享系统的设计与实现[J].计算机技术与发展,2010,(03):48.
 FAN Hui-bo,ZHANG Xin-you.Design and Implementation of File - Sharing System Based on P2P[J].,2010,(12):48.
[3]黄益贵 王汝传.基于DM6446的P2P机顶盒OSD研究与实现[J].计算机技术与发展,2010,(04):220.
 HUANG Yi-gui,WANG Ru-chuan.Research and Implementation of OSD for P2P Set - Top - Box Based on DM6446[J].,2010,(12):220.
[4]徐苏磊 梁伟.基于Netfilter/Iptables内核扩展的P2P流量管理[J].计算机技术与发展,2010,(06):101.
 XU Su-lei,LIANG Wei.P2P Flow Control Based on Netfilter/Iptables Kernel Extension[J].,2010,(12):101.
[5]龚世忠 唐文忠.一种基于P2P的两阶段Web服务发现研究[J].计算机技术与发展,2010,(06):121.
 GONG Shi-zhong,TANG Wen-zhong.A Web Services Discovery Research of Two Stages Based on P2P[J].,2010,(12):121.
[6]李磊 董健全.基于博弈论的P2P激励机制的研究与设计[J].计算机技术与发展,2009,(05):5.
 LI Lei,DONG Jian-quan.Research and Design of An Incentive Mechanism of P2P Based on Game Theory[J].,2009,(12):5.
[7]万川龙 桑军 向宏 胡海波.基于P2P网络的视频点播系统设计[J].计算机技术与发展,2009,(06):17.
 WAN Chuan-long,SANG Jun,XIANG Hong,et al.A P2P Based Video- on- Demand System[J].,2009,(12):17.
[8]黄晟 刘海韬.基于WHOIS建立IP位置系统实现P2P拓扑感知[J].计算机技术与发展,2009,(07):80.
 HUANG Sheng,LIU Hai-tao.Build IP Location System Using WHOIS for P2P Network Topology - Aware Routing[J].,2009,(12):80.
[9]王春枝 李涛.基于双层特征的P2P流量检测[J].计算机技术与发展,2009,(07):238.
 WANG Chun-zhi,LI Tao.P2P Traffic Identification Based on Double Layer Characteristics[J].,2009,(12):238.
[10]黄烟波 周磊戈.基于流特征的P2P流量识别方法研究[J].计算机技术与发展,2009,(09):46.
 HUANG Yan-bo,ZHOU Lei-ge.Research of Identifying P2P Protocols Based on P2P Traffic Characteristics[J].,2009,(12):46.

备注/Memo

备注/Memo:
北京市属高等学校人才强教深化计划基金资助项目(PHR201008016)张涵(1982-),男,博士,CCF会员,主要研究领域为计算机网络、P2P系统、信息安全
更新日期/Last Update: 1900-01-01