首页 | 本学科首页   官方微博 | 高级检索  
     

BitTorrent网络的搭便车及恶意攻击研究
引用本文:李晓义,李治军,姜守旭.BitTorrent网络的搭便车及恶意攻击研究[J].计算机工程,2011,37(7):163-165.
作者姓名:李晓义  李治军  姜守旭
作者单位:哈尔滨工业大学计算机科学与技术学院,哈尔滨,150001
基金项目:国家自然科学基金资助项目
摘    要:通过分析BitTorrent网络中BitThief、BitTyrant、Large View exploit、Sybil、声称自己拥有文件块、仅连接种子这6种搭便车攻击和发布虚假块、不合作、Eclipse这3种恶意攻击的主要策略和攻击方法,总结搭便车攻击和恶意攻击的特点与相同之处以及BitTorrent存在的问题,为改进BitTorrent网络协议提供参考。

关 键 词:BitTorrent网络  搭便车攻击  恶意攻击  Large  view  exploit攻击  Sybil攻击

Research of Free-riding and Malicious Attacks on BitTorrent Network
LI Xiao-yi,LI Zhi-jun,JIANG Shou-xu.Research of Free-riding and Malicious Attacks on BitTorrent Network[J].Computer Engineering,2011,37(7):163-165.
Authors:LI Xiao-yi  LI Zhi-jun  JIANG Shou-xu
Affiliation:(School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001,China)
Abstract:By analyzing the main strategies and methods of six free-riding attacks including BitThief,BitTyrant,Large View exploit,Sybil,advertising pieces it does not have,downloading only from seed and three malicious attacks including advertising false piece,Noncooperation and Eclipse in BitTorrent network,this paper compares the similarities of free-riding attacks and malicious attacks,and concludes the problems in BitTorrent,which can provide reference for improving the BitTorrent network protocol.
Keywords:BitTorrent network  free-riding attack  malicious attack  Large view exploit attack  Sybil attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号