首页 | 本学科首页   官方微博 | 高级检索  
     

对抗P2P蠕虫的邻居选择机制
引用本文:刘昕,贾春福,胡志超,刘国友,王冬. 对抗P2P蠕虫的邻居选择机制[J]. 天津大学学报(自然科学与工程技术版), 2012, 0(11): 1030-1038
作者姓名:刘昕  贾春福  胡志超  刘国友  王冬
作者单位:中国石油大学(华东)计算机与通信工程学院;南开大学计算机与信息安全系;南京大学计算机软件新技术国家重点实验室
基金项目:国家自然科学基金资助项目(60973141);天津市自然科学基金资助项目(09JCYBJ00300);高等学校博士学科点专项科研基金资助项目(20100031110030)
摘    要:P2P网络中节点的邻居列表为蠕虫提供了快速传播的途径.网络中节点系统的漏洞情况各异,致使它们抵抗蠕虫的能力不同.无结构P2P网络中节点的位置影响着蠕虫围堵策略的效果,甚至影响整个网络的安全.为了对抗P2P蠕虫,在区分漏洞级别的基础上定义节点之间距离的计算方法,根据节点抵抗蠕虫的能力为其选择邻居,使得P2P网络中的节点分布更利于抵抗蠕虫的攻击;并将这种邻居选择机制应用到无结构P2P网络KaZaA中.实验结果表明,该选择机制明显提高了P2P网络对抗蠕虫的能力.

关 键 词:P2P覆盖网络  邻居选择  蠕虫围堵  漏洞

Neighbor Selection Scheme Against P2P Worms
LIU Xin,JIAChun-fu,HU Zhi-chao,LIU Guo-you,WANG Dong. Neighbor Selection Scheme Against P2P Worms[J]. Journal of Tianjin University(Science and Technology), 2012, 0(11): 1030-1038
Authors:LIU Xin  JIAChun-fu  HU Zhi-chao  LIU Guo-you  WANG Dong
Affiliation:1.College of Computer and Communication Engineering,China University of Petroleum(East China),Qingdao 266580,China;2.Department of Computer and Information Security,Nankai University,Tianjin 300071,China;3.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,China)
Abstract:The neighbor lists of peers in P2P networks provide an easy way for the propagation of worms. The vulner abilities of peers in P2P networks always vary from one another, so their abilities against worms are different. And the peers' positions in the unstructured P2P network affect the worm containment and even the security of the whole P2P network. For countering P2P worms, based on the vulnerability rating, the distance between peers was defined, and the neighbors for a peer were selected according to its ability against worms to make the distribution of peers have an advantage in resisting the worm attacks. The neighbor selection scheme was applied to the unstructured P2P system KaZaA. Experiment results show that this scheme improves the capability of resistance against worms in P2P network observably.
Keywords:P2P overlay network  neighbor selection  worm containment  vulnerability
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号