首页 | 本学科首页   官方微博 | 高级检索  
     

P2P网络中抑制恶意节点的研究综述
引用本文:吕兴凤,高扬.P2P网络中抑制恶意节点的研究综述[J].信息技术,2012(8):36-39.
作者姓名:吕兴凤  高扬
作者单位:黑龙江大学计算机科学技术学院,哈尔滨,150080
基金项目:黑龙江大学青年科学基金项目(201044)
摘    要:随着P2P网络的迅速发展,它在各个领域被广泛应用,但由于P2P网络自身开放性、匿名性等特点,使网络中存在许多欺骗性、合谋性以及策略性的恶意节点,影响其有效性和可用性.目前存在许多信任模型都分别给出了抑制各种恶意节点的方法,文中从恶意节点出发,总结了典型信任模型中抑制恶意节点的主要方法.

关 键 词:P2P网络  信任模型  恶意节点

Research on the inhibition of malicious nodes in P2P network
LV Xing-feng , GAO Yang.Research on the inhibition of malicious nodes in P2P network[J].Information Technology,2012(8):36-39.
Authors:LV Xing-feng  GAO Yang
Affiliation:(School of Computer Science and Technology,Heilongjiang University,Harbin 150080,China)
Abstract:With the rapid development of P2P network,it is widely used in various fields.Because of its openness,anonymity and so on,there are many deceptive,collusive and strategy type of malicious nodes,which affect the effectiveness and availability of P2P network.At present there are a lot of trust models are given to inhibit a variety of malicious nodes.This article summarizes the main methods to inhibit malicious nodes in the typical trust models.
Keywords:P2P network  trust model  malicious nodes
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号