Defending Peer to Peer Network System Against Pollution Using a Reputation Model

Defending Peer to Peer Network System Against Pollution Using a Reputation Model

论文摘要

P2P文件系统是当今因特网上一个最重要的应用之一,例如KaZaa和BitTorrent。由于无需基础设施,P2P系统能够快速地建立,成为一个高效的共享文件和分发文件的平台。P2P文件共享网络比传统的C/S模式在数据的传播上有更多的好处,包括健壮性、可扩展性和数据传递。然而,由于P2P网络的开放性和匿名性等本质特征,用户在共享文件时缺乏责任心,容易受到恶意节点的攻击,在网络上传播恶意文件。在现在流行的P2P网络中,可以看到很多匿名的恶意节点攻击。例如,恶意节点将病毒散发在网络中,导致VBS.Gnutella worm蠕虫病毒的流行。最近的研究发现了一种新的恶意行为,叫作污染,恶意节点在网络中注入大量的虚假文件,试图阻止用户下载某个主题的文件。在Kazaa网络中,有超过80%的音频文件是被污染的,这严重减低了系统的可用性。目前有大量的文献工作研究了怎样减少污染文件的传播。前人的工作主要集中在两个方面。一个是通过建立流模型来分析不同污染机制的文件扩散情况;另一个是建立信誉系统来抑制污染文件的传播。但是,这些方法很少能够具体实施,而且从性能评价上看也存在很多的局限性。因此,本研究的目的设计一个有效的方法,来识别恶意节点,阻止恶意节点传播污染文件,提高P2P文件共享系统的可用性。在本文中,我们提出了一个混合信誉系统,来帮助减少污染文件的数量,并避免其在P2P系统的扩散。首先,我们计算了节点的信誉,来帮助我们得到正确的索引信息。其次,我们筛选节点数据库,将恶意节点从系统中删除。最后,我们计算文件对象的信誉,它采用一种新的投票制度,加权网络中节点的评价值,并引入了良好的激励机制和系统动力学研究。这保证了诚实节点提供可信文件并进行正确的评价。该系统结合了节点的信誉和文件对象的信誉,可以阻止恶意节点的积极活动,并减少系统中污染文件的传播,同时还能抵抗女巫攻击。仿真实验表明,该信誉系统能够有效地对抗污染攻击,同时具有很好的健壮性。

论文目录

  • Abstract
  • 摘要
  • LIST OF FIGURES
  • CHAPTER 1:INTRODUCTION
  • 1.1. Motivation
  • 1.2. Thesis Contribution
  • 1.3. Thesis Organization
  • CHAPTER 2:BACKGROUND AND RELATED WORKS
  • 2.1. Peer To Peer network
  • 2.1.1 Unstructured P2P network
  • 2.1.2 Structured network
  • 2.2. Pollution
  • 2.2.1 Attacks of P2P files sharing
  • 2.2.2 Attack against reputation system
  • 2.3. Distributed hash table
  • 2.3.1 Chord
  • 2.4. Previous work
  • 2.5. Summary
  • CHAPTER 3:THE NEW REPUTATION MODEL
  • 3.1. Reputation System
  • 3.1.1. Peer reputation
  • 3.1.2. Object reputation
  • 3.2. The new reputation model
  • 3.3. Summary
  • CHAPTER 4:EXPERIMENTS,RESULTS AND ANALYSIS
  • 4.1. Simulation environment
  • 4.2. Simulation result and analysis
  • 4.2.1 Detection of the malicious and good peers
  • 4.2.2. Correlation between peers
  • 4.2.3 Resistance to decoy attacks
  • 4.2.4 Files voting popularity
  • 4.3 Comparison between our reputation model and scrubber
  • 4.4 Summary
  • CHAPTER 5:CONCLUSION AND FUTURE WORKS
  • REFERENCES
  • ACKNOLEDGEMENTS
  • APPENDIX
  • 相关论文文献

    • [1].Trusted GPSR protocol without reputation faking in VANET[J]. The Journal of China Universities of Posts and Telecommunications 2015(05)
    • [2].Engineering Corporation Contributes To the Belt and Road Initiative[J]. Beijing Review 2017(19)
    • [3].Notice to Contributor from the RULR[J]. 人大法律评论 2016(04)
    • [4].RRM:An incentive reputation model for promoting good behaviors in distributed systems[J]. Science in China(Series F:Information Sciences) 2008(11)
    • [5].ResIoT: An IoT Social Framework Resilient to Malicious Activities[J]. IEEE/CAA Journal of Automatica Sinica 2020(05)
    • [6].Negative Binomial Distribution Based Reputation Direct Update for Wireless Sensor Networks[J]. Journal of Electronic Science and Technology 2011(02)
    • [7].A Formal Reputation System for Trusting Wireless Sensor Network[J]. Wuhan University Journal of Natural Sciences 2008(02)
    • [8].MALE OUTCAST TAXONOMY[J]. The World of Chinese 2014(05)
    • [9].A Novel Negative Multinomial Distribution Based Energy-Efficient Reputation Modeling for Wireless Sensor Networks(WSNs)[J]. Journal of Donghua University(English Edition) 2012(02)
    • [10].A Mechanism Based on Reputation in P2P Networks to Counter Malicious Packet Dropping[J]. Wuhan University Journal of Natural Sciences 2011(05)
    • [11].Energy-Saving Reputation Method for Wireless Sensor Networks[J]. Journal of Shanghai Jiaotong University(Science) 2012(02)
    • [12].喜剧地带(英文)[J]. 英语沙龙(实战版) 2010(04)
    • [13].Accruals quality,underwriter reputation,and corporate bond underpricing:Evidence from China[J]. China Journal of Accounting Research 2017(04)
    • [14].出版新潮流——作家与读者零距离(英文)[J]. The World of Chinese 2011(06)
    • [15].A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution[J]. Science China(Information Sciences) 2017(04)
    • [16].SLCRM:无线网格网络中一种墓于主观逻辑的跨层信誉机制(英文)[J]. 中国通信 2012(10)
    • [17].Protect Your Online Reputation[J]. 新高考(高三英语) 2012(Z1)
    • [18].A Review-Based Reputation Evaluation Approach for Web Services[J]. Journal of Computer Science & Technology 2009(05)
    • [19].Reputation evaluation method for open multi-agent systems[J]. Journal of Beijing Institute of Technology 2013(01)
    • [20].THE SHUSONG NUNNERY IN DECHEN OF YUNNAN[J]. China's Tibet 2016(04)
    • [21].On Desideratum for B2C E-Commerce Reputation Systems[J]. Journal of Computer Science & Technology 2009(05)
    • [22].Evaluating Group Formation in Virtual Communities[J]. IEEE/CAA Journal of Automatica Sinica 2020(04)
    • [23].China’s Mobile Interent App Idnustry Lrues Foreign Entrepreneurs[J]. China's Foreign Trade 2012(07)
    • [24].Narcissism in Miss Brill[J]. 校园英语 2016(05)
    • [25].DIRA: Enabling decentralized data integrity and reputation audit via blockchain[J]. Science China(Technological Sciences) 2019(04)
    • [26].购买学101[J]. 广告大观(标识版) 2009(07)
    • [27].Manuscripts Southern Ethnology and Archaeology[J]. 南方民族考古 2015(00)
    • [28].Manuscripts Southern Ethnology and Archaeology[J]. 南方民族考古 2011(00)
    • [29].Reputation,Accounting Information and Debt Contracts in Chinese Family Firms[J]. China Journal of Accounting Research 2010(Z1)
    • [30].Understanding China's Role In Africa[J]. China & Africa 2012(11)

    标签:;  ;  ;  ;  

    Defending Peer to Peer Network System Against Pollution Using a Reputation Model
    下载Doc文档

    猜你喜欢