期刊文献+

Kad网络节点资源探测分析 被引量:5

Peer Resource Measurement and Analysis in Kad Network
下载PDF
导出
摘要 Kad网络中存在数以亿计的共享资源,而其中有相当一部分可被评定为敏感资源。为深入了解Kad网络上资源尤其是敏感资源的特征,运用Kad网络采集器:Rainbow对节点拥有的文件资源进行探测分析。该文发现:1)文件流行度和文件所对应的文件名数量都近似符合Zipf分布;2)利用同一个"文件内容哈希"(即file-content-hash)的多个文件名的共现词可以更准确地进行敏感判别;3)敏感资源占随机样本的6.34%,且敏感资源中74.8%为video文件。 In Kad network,there are hundreds of millions of shared resources,among which a considerable part can be rated as questionable information.In order to understand the characteristics of resources,especially questionable ones,in Kad network,the file resources of peers are measured and analyzed using the Kad-network crawler Rainbow.We find that: 1) both the popularity of files and the number of filenames corresponding to a file approximately fit Zipf distribution;2) the severity of questionable files can be judged more accurately using co-occurrence-words in multiple filenames corresponding to the same file-content-hash;3) the questionable resources only occupy 6.34% of random samples,and 74.8% of which are video files.
出处 《中文信息学报》 CSCD 北大核心 2010年第6期85-91,共7页 Journal of Chinese Information Processing
基金 国家自然科学基金资助项目(60803085 60873245) 国家863计划高技术研究发展计划资助项目(2006AA01Z452)
关键词 对等网络 KAD网络 探测分析 敏感资源 Peer-to-peer network Kad network measurement and analysis questionable resource
  • 相关文献

参考文献18

  • 1eMule, http://www. eMule-project. net, 2009.
  • 2P. Maymounkov and D. Mazieres, Kademlia: A Peer- to-peer Information System Based on the XOR Metric [C]//International Workshop on Peer-to-Peer Systems, 2002.
  • 3Ipoque, http://torrentfreak. com/bittorrent-still-king- of-p2p-traffic-090218/, 2009.
  • 4Thomas Karagiannis, Andre Broido, Nevil Brownlee, Kc Claffy and Michalis Faloutsos, Is P2P dying or just hiding[C]//GlobeCom, 2004.
  • 5Thomas Karagiannis, Andre Broido, Michalis Faloutsos and Ke Claffy, Transport Layer Identification of P2P Traffic[C]//Proc. Internet Measurement Conference(IMC), 2004.
  • 6Saroiu S, Gummadi PK, Gribble SD. , A measurement study of peer-to-peer file sharing systems[C]//Proc. of the Multimedia Computing and Networking(MMCN), 2002: 156-170.
  • 7D. Stutzbach, R. Rejaie and Sen S. , Characterizing unstructured overlay Topologies in modern P2P filesharing systems [C]//Proc. of the 5th ACM SIGCOMM Conf. on Internet Measurement, 2005.
  • 8D. Stutzbach and R. Rejaie, Improving lookup performance over a widely-deployed DHT[C]//Proc. INFOCOM, 2006.
  • 9D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks [C]//Proc. Internet Measurement Conference(IMC), 2006.
  • 10王勇,云晓春,李奕飞.对等网络拓扑测量与特征分析[J].软件学报,2008,19(4):981-992. 被引量:13

二级参考文献1

共引文献12

同被引文献16

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部