首页 | 本学科首页   官方微博 | 高级检索  
     检索      

互联网时延稀疏估计中恶意节点的贪婪性识别
引用本文:王聪.互联网时延稀疏估计中恶意节点的贪婪性识别[J].科学技术与工程,2017,17(5).
作者姓名:王聪
作者单位:四川师范大学影视与传媒学院
基金项目:国家自然科学,基于社交网络模型的视频分享关键技术研究(61202445);四川省教育厅科研项目,基金网络时延矩阵分布式稀疏重建安全性研究(15zb0033)
摘    要:为了增强基于坐标的互联网时延稀疏估计算法遭受恶意攻击的生存能力,提出了一种分布式环境下的恶意节点识别算法。攻击者总是试图以尽可能小的代价实现显著的攻击效果。在分别利用l_1和l_2损失函数计算坐标以进行时延估计时,这种贪婪特征体现为估计误差的显著差异。分别以SMACOF和增量次梯度下降法代入不同损失函数计算临时坐标,利用给定阈值,清洗在不同临时坐标下的估计误差差异过大的参考节点;并二次代入l_1损失函数计算最终坐标。仿真实验证明,该方法能够在不影响时延估计精度的前提下,实现对恶意节点的有效识别。

关 键 词:时延估计  网络坐标  网络安全  最优化  网络测量  中图分类号:  TP393.1
收稿时间:2016/5/12 0:00:00
修稿时间:2016/6/24 0:00:00

Greedy Feature Identification against Malicious Nodes in Internet Latency Sparse Estimation
Wang Cong.Greedy Feature Identification against Malicious Nodes in Internet Latency Sparse Estimation[J].Science Technology and Engineering,2017,17(5).
Authors:Wang Cong
Abstract:To enhance the survival of coordinate-based Internet latency sparse estimation methods while attacks are launched, a malicious nodes classification algorithm in full decentralized environment is presented. Attackers always try to get theShighest possible effects of theSattacksSatStheSlowestSpossibleScost. The greedy nature is shown the significantSdifferences between the estimation errors while the l1 and l2 loss functions is adopted specifically to get the coordinates for latency estimating. By introducing SMACOF and incremental sub-gradient descending algorithms to optimizing the l1 and l2 loss functions severally, a couple of temporary coordinates can be obtained. While this couple of temporary coordinates are both adopted, the malicious nodes can be rejected by a specific threshold for their excessive estimation error difference levels. Thus other benign reference nodes can be accepted to get a final coordinate by optimizing the l1 loss function again. Simulations and experiments show that malicious can be identified effectively without losing latency estimation accuracy.
Keywords:Latency estimation  Network coordinate  Network security  Optimization  Network measurement
本文献已被 CNKI 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号