期刊文献+

使用粗糙集与Bayes分类器的P2P网络安全管理机制 被引量:1

New P2P Network Security Mechanism Based on the Rough Set and the Bayes Classifier
下载PDF
导出
摘要 提出一种使用粗糙集与Bayes分类器的P2P网络安全管理机制。该模型放弃了局部信任度与全局信任度等概念,对不满意事件进行分类统计,对交易节点进行分类控制。创新之处有:1)通过对节点彼此之间进行交易发生的不满意事件按照交易失败的类型、损害的严重程度、交易规模的大小等情况进行分类与量化,将交易失败事件区分为恶意攻击、大规模交易且质量不满意等类型。2)使用粗糙集分类器与Bayes分类器,将对等网络中的节点划分为可信任节点、陌生节点、恶意节点等不同的类型;建立信任节点列表与恶意节点列表;交易时将恶意节点排除在外。3)建立了反馈控制机制,使用粗糙集分类器与Bayes分类器根据节点反馈推荐的意见对被评价节点进行分类、做出评价,同时监测提出评价的节点是否有恶意行为,将反馈行为划分为诚实反馈、恶意反馈等。实验表明,与已有的安全模型相比,提出的安全管理机制对恶意行为具有更高的检测率、更满意的交易成功率以及更好的反馈信息综合能力。 A new security management mechanism based on the classification control of trade nodes was proposed.The model gives over the concepts of local trust and global trust and takes the classification control of trade nodes.This paper’s innovation is as follows:1)Through classification and quantification of failure events in trade between nodes,according to the severity of damage and the size of the trade,the trade failure events are divided into malicious attacks,bad quality and so on.2)The rough set classifier and Bayes classifier are used and the nodes are divided into trust nodes,strange nodes and malicious nodes in a peer-to-peer network.The trust node list and the malicious node list are built.The malicious nodes are excluded from trading.3)The rough set classifier and Bayes classifier are used to integrate the feedback recommendation and to decide the type of the recommended node.The feedback behaviors are divided into the honest feedback,the malicious feedback and so on.The experiment indicates that compared with the existing trust model,the model may obtain higher examination rate over malicious acts with the higher transaction success ratio,and has the better feedback information synthesizing capacity.
出处 《计算机科学》 CSCD 北大核心 2012年第9期28-32,54,共6页 Computer Science
基金 国家自然科学基金(60873071)资助
关键词 安全模型 对等网络 粗糙集 贝叶斯分类器 仿真 Security model Peer-to-peer network Rough set Bayes classifier Simulation experiment
  • 相关文献

参考文献11

二级参考文献93

共引文献439

同被引文献14

  • 1Soysal M,Schmidt E G.Machine learning algorithms for accurate flow-based network traffic classification:Evaluation and comparison[J].Performance Evaluation,2010,67(6):451-467.
  • 2Chu C T,Kim S K,Lin Y A,et al.Map-reduce for machine learning on multicore[J].Advances in Neural Information Processing Systems,2007,19:281-288.
  • 3Han J,Kamber M,Pei J.Data mining:Concepts and techniques[M].New York:Morgan Kaufmann,2011.
  • 4Dean J,Ghemawat S.Map Reduce:Simplified data processing on large clusters[J].Communications of the ACM,2008,51(1):107-113.
  • 5Yin J,Liao Y,Baldi M,et al.Efficient analytics on ordered datasets using Map Reduce[C]//Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing.New York:ACM,2013:125-126.
  • 6White T.Hadoop:the definitive guide[M].USA:O’Reilly,2012.
  • 7Pawlak Z.Rough sets:Theoretical aspect of reasoning about data[M].[S.l.]:Kluwer Academic Publishers,1991.
  • 8Gringoli F,Salgarelli L,Dusi M,et al.Gt:picking up the truth from the ground for internet traffic[J].ACM SIGCOMM Computer Communication Review,2009,39(5):12-18.
  • 9鲁刚,张宏莉,叶麟.P2P流量识别[J].软件学报,2011,22(6):1281-1298. 被引量:48
  • 10钱进,苗夺谦,张泽华.云计算环境下知识约简算法[J].计算机学报,2011,34(12):2332-2343. 被引量:42

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部