期刊文献+

基于P2P泛洪DDoS攻击的防范研究 被引量:1

Defending P2P from flooding-based DDoS
下载PDF
导出
摘要 提出了基于马尔可夫过程的信任和信誉模型,在节点间构建信任关系,利用节点间信任与信誉信息的交互对恶意节点进行识别,阻断对恶意消息的转发传播,从而增强抵御DDoS攻击的效能。仿真实验结果表明,提出的模型能有效地隔离恶意节点的消息数,提高网络抵御这种基于应用层的DDoS攻击的容忍度。 This paper proposed a trust and reputation model based on Markov process, which constructed trust relationship among peers. In this model, well-behavior peers possessed ability to identify bad-behavior peers to intermit transmission of malicious message through the interaction of trust and reputation information established among peers, so that the networks could resist on the DDoS attack. Simulation result shows that the model of provides an efficient isolation on malicious message amount and promotion on tolerance of the DDoS attack resisting on the application layer.
作者 耿技 马新新
出处 《计算机应用研究》 CSCD 北大核心 2009年第6期2116-2118,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60473090)
关键词 对等网 GNUTELLA协议 分布式拒绝服务攻击 可信和信誉 P2P Gnutella protocol DDoS trust and reputation
  • 相关文献

参考文献10

  • 1李晓戈,杨寿保.对等网络DoS攻击的防御机制[J].计算机工程,2004,30(2):66-67. 被引量:4
  • 2乐光学.基于Gnutella协议的P2P网络中DoS攻击防御机制[J].微电子学与计算机,2005,22(8):26-31. 被引量:2
  • 3FEINSTEIN L, SCHNACHENBERG D, BALUPARI R, et al. Statistical approaches to DDoS attack detection and response [ C ]//Proc of DARPA Information Survivability Conference and Exposition. 2003 : 303-314.
  • 4MIRKOVIC J, DIETRICH S, DITTRICH D, et al. Intemet denial of service:attack and defense mechanisms[ S ]. Upper Saddle River, N J: Prentice Hall ,2004.
  • 5XIANG Y, LIU Y, LEI W L, et al. Detecting DDoS attack based on network self similarity[ J ]. Intel Communication ,2004,15 ( 3 ) :292- 295.
  • 6SIATERLIS C, MAGLARIS V. Detecting incoming and outgoing DDoS attack at the edge using a single set of network characteristics[ C]//Proc of the 10th IEEE Symposium on Computers and Communication. Washington DC : IEEE Computer Society ,2005:469-475.
  • 7LIU Yun-hao, WANG Xiao-mei, LI Xiao-chen, et aL Defending P2Ps from overlay flooding-based DDoS [ C ]//Proc of International Conference on Parallel Processing ( ICPP 2007 ). Washington DC : IEEE Computer Society ,2007.
  • 8NAOUMOV N,ROSS K W. Exploiting P2P systems for DDoS attacks [C ]//Proc of International Workshop on Peer-to-Peer Information Management. New York : ACM Press,2006.
  • 9DASWANI N, GARCIA-MOLINA H. Query-flood DoS attacks in Gnutella[ C]//Proc of ACM Computer and Communications Security. New York :ACM Press,2002 : 181-192.
  • 10LEE K W, CHARI S, SHAIKH A, et al. Improving the resilience of content distribution networks to large scale distributed denial of service attacks[ J]. Computer Networks ,2007,151 (10) :2753-2770.

二级参考文献16

  • 1乐光学.基于Gnutella协议的分布式Peer-to-Peer网络连接管理策略及改进研究[J].计算机工程与应用,2004,40(29):109-112. 被引量:3
  • 2[1]Seti@Home. http://setiathome.ssl.berkely.edu
  • 3[2]Groove Networks website. http://www.groove.net
  • 4[3]CERT. http://www.cert.org/
  • 5[4]Gnutella. www.gnutella. com
  • 6[5]Yang B,Garcia-molina H.Designing a Super-Peer Network. In ICDE,2003
  • 7[6]Daswani N,Garcia-molina H.Query-Flood DoS Attacks in Gnutella. In ACM CCS, 2002
  • 8[7]Sripanidkulchai K.The Popularity of Gnutella Queries and Its Implications on Scalability. Featured on O'Reilly's) www.openp2p.com website,2001-02
  • 9[8]Daswani N,Garcia-molina H,Yang B.Open Problems in Data-sharing Peer-to-Peer Systems. In ICDT, 2003
  • 10Fox G. Peer-to-Peer networks. [J].Computing in Science & Engineering. 2001.3(3): 75-77.

共引文献4

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部