首页 | 本学科首页   官方微博 | 高级检索  
     

点对点网络安全的信任模型研究
引用本文:黄坤,姚晋,雷静,董晓明. 点对点网络安全的信任模型研究[J]. 计算机与数字工程, 2011, 39(9): 79-83
作者姓名:黄坤  姚晋  雷静  董晓明
作者单位:中国舰船研究设计中心 武汉430064
摘    要:点对点(Peer-to-Peer)网络具有动态性、自组织性、匿名性等特点,但是它不能保证网络中所有的对等节点都提供可靠的资源和良好的服务,网络中某些节点甚至存在恶意行为,如:提供虚假信息、散播非法广告、传播木马和蠕虫等。为了解决这类问题,在点对点网络中引入信任机制,建立信任模型,使对等节点之间建立起信任关系。文章介绍了目前点对点网络中信任模型的研究热点及方向,对现有信任模型进行了分类,分析了其关键技术,并总结了主要算法。通过对模型的性能分析,指出了现有模型中存在的普遍问题,最后论述了信任模型的发展前景。

关 键 词:点对点网络  信任模型  网络攻击  访问控制  贝叶斯理论

Research of Trust Model Based on Peer-to-Peer Network Security
Huang Kun,Yao Jin,Lei Jing,Dong Xiaoming. Research of Trust Model Based on Peer-to-Peer Network Security[J]. Computer and Digital Engineering, 2011, 39(9): 79-83
Authors:Huang Kun  Yao Jin  Lei Jing  Dong Xiaoming
Affiliation:Huang Kun Yao Jin Lei Jing Dong Xiaoming(China Ship Design and Development Center,Wuhan 430064)
Abstract:P2P network is dynamic, self-organized, and anonymous and has some other features. PZP network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination oi" Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.
Keywords:peer-to-peer network   trust model   network attack   access control   Bayesian theory
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号