期刊文献+

基于信任权重防御Sybil攻击的模型

Anti-sybil Attack System based on Social Network Trust Weight
原文传递
导出
摘要 P2P分布式系统特别容易遭受Sybil攻击,即一个不良用户伪造多个不存在的虚假用户,与网络中普通用户进行交互,进而达到控制网络的目的。防御模型基于社会化网络的信任概念,在SybilGuard基础上提出了路由增加信任权重的方法,用以降低节点与虚假用户交易的概率,实验显示,诚实节点间的交易成功率及节点停留在安全区域内的概率得到提高,增强了系统健壮性。 Decentralized distributed systems, such as p2p systems, are particularly vulnerable to Sybil attacks. In Sybil attack, a malicious user forges multiple fake identities known as Sybil identities, thus bringing most honest nodes in the network under their control. This paper proposes a defense mechanism based on fast-mixing social networks. In a real social network human-established trust-relationship is not equal to others. And Sybil Guard is enhanced with random router trust weight, which improves the probability of nodes communication within the honest domain.
作者 刘峰 范磊
出处 《信息安全与通信保密》 2012年第3期78-81,共4页 Information Security and Communications Privacy
关键词 社会化网络 SYBIL攻击 信任权重 social network Syhil attack trust weight
  • 相关文献

参考文献9

  • 1DOUCEUR J R.The Sybil Attack[C] //Proc.of the1st International Workshop on Peer-to-Peer Systems.Cambridge,MA,USA:[s.n.] ,2002:251-260.
  • 2YU H,KAMINSKY M,GIBBONS P B,et al.SybilGuard:Defending Against Sybil Attacks Viasocial Networks[J].IEEE/ACM Transactions on Networking,2008,16(3):576-589.
  • 3YU H,GIBBONS P,KAMINSKY M,et al.SybilLimit:Anear-optimal Social Network Defense Against Sybil Attacks[C] //IEEE Symposium on Security and Privacy(2008).[s.l.] :IEEE Comoputer Society,2008:3-17.
  • 4陈晗,施勇,薛质.P2P网络资源传播模型分析及监测[J].信息安全与通信保密,2011,9(5):56-58. 被引量:8
  • 5MORSELLI R,BHATTACHARJEE B,SRINIVASAN A,et al.Efficient Lookup on Unstructured Topologies[C] //ACM PODC.[s.l.] :ACM,2005.
  • 6CHENG A,FRIEDMAN E.Sybilproof Reputation Mechanisms[C] //The2006International Conference on P2PEcon.[s.l.] :ACM,2006:128-132.
  • 7ROWAIHY H,ENCK W,MCDANIEL P,et al.Limiting Sybil Attacks in Structured P2P Networks[C] //Proc.26th INFOCOM Conference(St.Louis,MO).Anchorage,AK:IEEE Computer Society Press,2596-2600.
  • 8贾德礼,方勇.非集中式P2P系统信任值安全管理的研究[J].信息安全与通信保密,2007,29(2):83-85. 被引量:4
  • 9KLEINBERG J.The Small-world Phenomenon:An Algorithm Perspective[C] //32th STOC.New York:ACM,163-170,2000.

二级参考文献9

  • 1[1]L Xiong,L Liu.A reputation-based trust model for peer-to-peer ecommerce communities[A].In IEEE International Conference on Electronic Commerce[C],IEEE,Computer Society,2003.
  • 2[2]So Young Lee,O-Hoon Kwon,Jong Kim,et al.A Reputation Management System in Structured Peer-to-Peer Networks[A],In Proceedings of the 14th IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprise(WETICE' 05)[C],IEEE,Computer Society,2005.
  • 3[3]Hui Lei,Gholamali C.Shoja,A Distributed Trust Model for e-Commerce Applications[A],In The 2005 IEEE International Conference on e-Technology,e-Commerce and e-Service,2005.EEE '05.Proceedings[C].IEEE,Computer Society,2005.
  • 4[4]Aameek Singh,Ling Liu.TrustMe:Anonymous Management of Trust Relationships In Decentralized P2P Systems[A],In Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P'03)[C],IEEE,Computer Society,2003.
  • 5eMule-Project, eMule FAQ[EB/OL]. (2005-06-15). http: //www. emule-projeet.net/home/perl/help.cgi?l= 1 &cat id=276.
  • 6Bram Cohen. The BitTorrent Protocol Specification[EB/OL]. (2008-02-28). http : //www.bittorrent.org/beps/bep_0003.html.
  • 7陈莹莹,蔡明.一种基于P2P网络的蠕虫传播模型研究[J].微计算机信息,2009,25(3):102-103. 被引量:2
  • 8张睿,李玲娟.P2P网络资源传播模型的研究[J].西安邮电学院学报,2009,14(3):69-71. 被引量:1
  • 9陈建华,黄道颖,张尧,张安琳,孙宏.计算机对等网络P2P技术[J].计算机工程与应用,2003,39(33):162-164. 被引量:45

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部