期刊文献+

P2PSIP系统的路由表安全研究

Research on Routing Table Security for P2PSIP System
下载PDF
导出
摘要 针对P2PSIP系统面临的Eclipse攻击,提出一种基于双向路由表的防御机制。每个节点同时维护路由表和反向路由表,并周期性地随机审计路由表和反向路由表中的节点,以确保每个节点的入度和出度一致。仿真实验表明,该方法能将路由表污染程度从99%降低到25%左右。 This paper proposes a double-routing table based defense mechanism to mitigate Eclipse attacks on P2PSIP system.Each node maintains a routing table and a reverse routing table.It periodically audits neighboring nodes to ensure compliance with the degree bound.Analysis and evaluation show that this method has promising feasibility and efficiency.In the simulation,the fraction of malicious nodes is reduced from 99% to 25%.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第20期97-99,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61103015) "核高基"重大专项(2010ZX01045-001-002-5 2010ZX01045-001-007-2) 湖南省自然科学基金资助项目(09JJ5043) 东莞市高等院校科研机构科技计划基金资助项目(2008108101003)
关键词 Eclipse攻击 路由表 反向路由表 入度 出度 Eclipse attack routing table back-routing table indegree outdegree
  • 相关文献

参考文献10

  • 1Rosenberg J, Schulzrinne H, Camarillo G, et al. SIP: Session Initiation Protocol[S]. RFC 3261, 2002.
  • 2Bryan D, Lowekamp B, Jennings C. A P2P Approach to SIP Registration and Resource Location[EB/OL]. (2006-04-10). http:// www.ietf.org/internet-drafts/draft-bryan-p2psip-dsip-00.txt.
  • 3耿福泉,高士坤,赵林亮,王光兴.一种适用于P2P-SIP框架的自适应搜索算法[J].东北大学学报(自然科学版),2007,28(6):797-800. 被引量:1
  • 4刘敏霞,余杰,李强,陈志新.基于改进的Kademlia协议的P2PSIP系统研究[J].微电子学与计算机,2010,27(8):235-237. 被引量:2
  • 5Singh A, Ngan T, Druschel P, et al. Eclipse Attacks on Overlay Networks: Threats and Defenses[C]//Proc. of INFOCOM’06. Barcelona, Spain: [s. n.], 2006.
  • 6Castro M, Druschel P, Ganesh A, et al. Secure Routing for Structured Peer-to-Peer Overlay Networks[C]//Proc. of USENIX Symposium on Operating System Design and Implementation. Boston, USA: [s. n.], 2002.
  • 7Hildrum K, Kubiatowicz J. Asymptotically Efficient Approaches to Fault-tolerance in Peer-to-Peer Networks[C]//Proc. of the 17th International Symposium on Distributed Computing. Sorrento, Italy: [s. n.], 2003.
  • 8Dingledine R, Mathewson N, Syverson P. Tor: The Second Generation Onion Router[C]//Proc. of the 13th USENIX Security Symposium. San Diego, USA: [s. n.], 2004.
  • 9Li Zhuang, Feng Zhou, Ben Zhao, et al. Cashmere: Resilient Anonymous Routing[C]//Proc. of USENIX Symposium on Networked System Design and Implementation. Boston, USA: [s. n.], 2005.
  • 10席菁,胡平,陆建德.引入不确定性理论的P2P信誉模型研究[J].计算机工程,2009,35(8):158-160. 被引量:2

二级参考文献20

  • 1林娜,王赜,王光兴.软交换中的一种安全策略[J].东北大学学报(自然科学版),2004,25(11):1042-1045. 被引量:3
  • 2张春瑞,徐恪,王开云,姜建国.基于信任向量的P2P网络信任管理模型[J].清华大学学报(自然科学版),2007,47(7):1224-1228. 被引量:12
  • 3Christin N, Weigend A S, Chuang J. Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks[C]// Proceeding of the 6th ACM Conference on Electronic Commerce. [S. l.]: ACM Press, 2005:68-77
  • 4Singh A, Liu Ling. TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems[C]//Proc. of P2P'03 Conference. Washington D. C., USA: IEEE Computer Society Press, 2003: 142-149.
  • 5Aberer K, Despotovic Z. Managing Trust in a Peer-to-Peer Information and Knowledge Management[C]//Proc. of P2P'01 Conference. New York, USA: ACM Press, 2001: 310-317.
  • 6RFC261. SIP: session initiation protocol[S]. The Internet Society, 2002.
  • 7Bryan D, Lowekamp B, Jennings C. A P2P approach to SIP registration and resource location[ EB/OL]. [ 2009 - 12 -19]. www. softarmor, com.
  • 8Singh K, Schulzrinne H. SIPpeer: a session initiation protocol (SIP) - based peer - to - peer interact telephony client adaptor [ R ]. New York: Columbia University, 2005.
  • 9Xie Y, Yu F, Achan K, et al. Spamming hornets: signanares and characteristics [ C]//SIGCOMM' 08. USA: Seattle, 2008.
  • 10Yu J, Fang C, Xu J, et al. ID repetition in kad[C]// Proceedings of P2P'09. USA:Seattle, 2009.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部