共查询到20条相似文献,搜索用时 15 毫秒
1.
Propagation of passive worms in unstructured peer-to-peer (P2P) networks can result in significant damages and the loss of network security. This paper obtains the average delay for all peers in the entire transmitting process, and proposes a mathematical model for simulating unstructured P2P networks-based passive worms' propagation taking into account network throughput. According to the file popularity which follows the Zipf distribution, we propose a new healthy file dissemination-based defense strategy. Some parameters related to the propagation of passive worms are studied based on the proposed model. Finally, the simulation results verify the effectiveness of our model, which can provide an important guideline in the control of passive worms in unstructured P2P networks. 相似文献
2.
3.
A number of worms, named P2P (peer-to-peer) passive worms, have recently surfaced, which propagate in P2P file-sharing networks and have posed heavy threats to these networks. In contrast to the majority of Internet worms, it is by exploiting users’ legitimate activities instead of vulnerabilities of networks in which P2P passive worms propagate. This feature evidently slows down their propagation, which results in them not attracting an adequate amount of attention in literature. Meanwhile, this feature visibly increases the difficulty of detecting them, which makes it very possible for them to become epidemic. In this paper, we propose an analytical model for P2P passive worm propagation by adopting epidemiological approaches so as to identify their behaviors and predict the tendency of their propagation accurately. Compared with a few existing models, dynamic characteristics of P2P networks are taken into account. Based on this proposed model, the sufficient condition for the global stability of the worm free equilibrium is derived by applying epidemiological theories. Large scale simulation experiments have validated both the proposed model and the condition. 相似文献
4.
5.
依赖结构化对等网传播的P2P僵尸是未来互联网面临的重要威胁.详细分析了两种典型的结构化P2P协议Chord和Kademlia的工作原理,在此基础上,使用数学建模的方法建立了结构化P2P僵尸网络的传播模型.该模型将Kademlia,Chord协议与双因子免疫机制、主机在线率等因素相结合,较为全面地研究了两种典型的结构化P2P网络中僵尸的传播机理,并使用软件仿真的方法模拟了节点超过百万时,结构化P2P网络中僵尸的传播行为,通过软件仿真得出的数据与理论数据进行对比,验证了模型的正确性.从实验结果可以看出:对于Kademlia和Chord两种结构化P2P网络,僵尸传播无论是双因子免疫模型还是结合双因子与主机在线率的模型,理论模型与仿真结果都非常吻合,体现了模型的准确性,为僵尸的检测与防御提供了理论依据. 相似文献
6.
随着P2P(Peer to Peer)技术的广泛使用,判断请求节点是否可信变得非常重要。介绍了一种基于信誉的P2P的评价模型,用于计算在P2P过程中各个节点之间所产生的信誉度,从而判断请求节点是否可信。这种模型综合考虑了自身以往经验以及其它节点对请求节点的意见。通过实验,发现此模型不仅可以阻止恶意节点对正常节点的攻击,还可以有效地提高正常节点对有组织攻击的抵抗能力。 相似文献
7.
《Information Security Journal: A Global Perspective》2013,22(4):191-203
ABSTRACT P2P networks and the computations they enable hold great potential in creating the next generation of large-scale distributed applications. However, the P2P phenomenon has largely left untouched large organizations and businesses that have stringent security requirements and are uncomfortable with the anonymity and lack of centralized control/censorship which are the features of P2P systems. Hence, there is an urgent need to address the security concerns in deploying P2P systems which can leverage the underutilized compute resources in organizations across the world. This article proposes a containment-based security model (CBSM) for cycle-stealing P2P applications, based on the Secure Linux (SE Linux) Operating System, which alleviates existing security concerns, allowing peers to host untrusted or even hostile applications. Our approach is suitable for pure P2P applications and requires no message exchanges or trust computations in ensuring security. Testing via deployment of potentially malicious remote code proves the effectiveness of the proposed system. 相似文献
8.
在目前已广泛应用的P2P网络中,由于缺乏信任机制,存在着许多欺诈等恶意行为,节点的资源共享处于自愿,可能随时退出,系统的有效性和可用性难以保证。由于P2P网络节点的匿名性和贡献资源的自愿性,绝大多数节点缺乏提供服务积极性,从而引发了P2P网络中的搭便车问题。提出了一种新的激励机制,可有效解决一部分问题。 相似文献
9.
针对现有的信任模型不能很好地处理P2P网络环境中恶意节点提供虚假服务的欺作行为,及不积极提供诚实推荐的问题,提出了一种激励相容的P2P信誉模型(简称ICRM)。该模型使用时间区间的概念来标示经验和推荐的时间特性,利用直接信任度、推荐信任度及推荐可信度等机制来精确描述节点的实际信任等级,并引入参与层次来度量节点提供推荐的积极程度,从而有效地识别与抑制不同类型的恶意节点,激励节点积极提供诚实推荐。仿真实验表明,ICRM能够有效地抑制恶意节点的欺作行为及不诚实反馈行为,并能有效解决节点推荐积极性不高的问题。 相似文献
10.
在结构化点对点(P2P)模型中,节点异构性会引起系统的不稳定。针对该问题,结合混合P2P模型的优点,构造一个基于Chord协议的混合P2P模型,将节点按处理能力分为超节点和普通节点,多个超节点被组织到同一个群组中,由超节点管理普通节点以提高系统稳定性。该模型采用基于拓扑感知的搜索算法,能较好地解决分布式哈希表(DHT)技术的路由绕路问题。实验证明,该模型在一定程度上降低查询延时,可提高查询效率。 相似文献
11.
12.
一种适用于嵌入式系统的P2P下载模型* 总被引:1,自引:0,他引:1
提出了一种基于BitTorrent协议的嵌入式BT下载模型。该模型对BitTorrent思想进行了深化和应用,针对于快速BT网络,在嵌入式系统应用中进行了改进,有效提高了下载速度,甚至可以在嵌入式系统上快速下载多媒体视频文件进行播放。 相似文献
13.
14.
15.
随着技术的不断发展和广泛应用,P2P现已成为网络应用的新热点,本文首先简要概述了P2P技术,探讨了常用的四种网络模型,然后指出P2P技术目前存在的一些缺点,并在文末给出了一些改进措施。 相似文献
16.
17.
18.
19.