期刊文献+

非结构去中心化的P2P网络DDoS攻击的防御研究 被引量:1

Study on defense of unstructured and uncentralized P2P network DDoS attacks
下载PDF
导出
摘要 针对非结构去中心化的P2P网络可能作为DDoS引擎而产生大规模的网络攻击,提出了一种基于人工免疫(AIS)的方法来对非结构去中心化的P2P网络中的恶意节点进行免疫处理。通过在非结构去中心化的P2P网络中的节点上构建人工免疫系统,利用抗体和抗原之间天然的亲和关系,以及抗体不断进化的特点,实时计算由返回查询消息的节点提供的资源信息而进行请求得到的请求结果状态序列与检测器中的对应节点的请求状态序列特征之间的亲和力,并检测出恶意节点。在NS2仿真平台上通过修改GnuSim插件,对非结构去中心化的P2P网络中节点的人工免疫系统进行模拟仿真,实验仿真验证了该方法的可行性,且能够有效地降低非结构去中心化P2P网络中恶意节点产生的DDoS攻击程度。 As unstructrured and uncentralized P2P network might be the engine of DDoS attacks,this paper proposed a theory of using AIS to isolate the malicious node from the P2P network.With AIS in a node and the nature relationship between antigens and antibodies and the continue evolution of antibodies,the node could detect malicious node by calculating the appetency of request result cycle queue of the node that returned resource information and the node'detector in real time in the unstructured and uncentralized P2P network.It did the experiment on the NS2 simulation platform by modifying the GnuSim plugin with AIS in the node of unstructured and uncentralized P2P network,and verified the model's feasibility.And the experiment indicates that the method can effectively reduce the degree of DDoS caused by malicious node in the unstructured and uncentralized P2P network.
出处 《计算机应用研究》 CSCD 北大核心 2012年第12期4618-4621,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61005017)
关键词 非结构 去中心化 对等网络 分布式拒绝服务 人工免疫 网络安全 unstructured uncentralized P2P network DDoS AIS network security
  • 相关文献

参考文献16

  • 1NAOUMOV N, ROSS K. Exploiting P2P systems for DDoS attacks [ C ]//Proc of the 1 st International Conference on Scalable Information Systems. New York: ACM Press,2006.
  • 2DASWANI N, GARCIA-MOLINA H. Query flood DoS attacks in Gnutella networks [ C ]//Proc of the 9th ACM Conference on Computer and Communications Security. New York : ACM Press ,2002 : 181-192.
  • 3李俊青,潘全科,王文宏,左凤朝,李元振,谢圣献.蚁群优化在P2P网络防范DDoS攻击中的应用研究[J].计算机应用研究,2009,26(1):339-341. 被引量:7
  • 4谭艳霞,吴灏.基于免疫的对等网络DoS攻击防御系统[J].计算机工程与设计,2006,27(22):4204-4206. 被引量:2
  • 5马新新,赵洋,秦志光.Improving Resilience against DDoS Attack in Unstructured P2P Networks[J].Journal of Electronic Science and Technology of China,2007,5(1):18-22. 被引量:6
  • 6ATHANASOPOULOS E, ANAGNOSTAKIS K G, MARKATOS E P. Misusing unstructured P2P systems to perform DoS attacks the network that never forgets [ C ]//Proc of the 4th International Conference on Applied Cryptography and Network Security. 2006 : 130-145.
  • 7莫宏为.人工免疫系统原理与应用[M].哈尔滨:哈尔滨工业大学出版社,2003.
  • 8莫宏为,左兴权.人工免疫系统[M].北京:科学出版社,2009.
  • 9李敏强,寇纪淞,林丹,等.遗传算法的基本理论与应用[M].北京:科学出版社,2009.
  • 10ZEINALIPOUR-YAZTI D. Exploiting the security weaknesses of the Gnutella protocol[ D ]. Riverside : University of California,2002.

二级参考文献28

  • 1田慧蓉,邹仕洪,王文东,程时端.激励一致的自适应P2P拓扑构造[J].软件学报,2006,17(4):845-853. 被引量:13
  • 2高能,冯登国,向继.一种基于数据挖掘的拒绝服务攻击检测技术[J].计算机学报,2006,29(6):944-951. 被引量:44
  • 3夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 4马新新,赵洋,秦志光.Improving Resilience against DDoS Attack in Unstructured P2P Networks[J].Journal of Electronic Science and Technology of China,2007,5(1):18-22. 被引量:6
  • 5LIANG J,NAOUMOV N, ROSS K W. The index poisoning attack in P2P file sharing systems[ C]//Proc of the 25th IEEE International Conference on Computer Communications. Barcelona : [ s. n. ] , 2006 : 1-12.
  • 6MARCO D. Ant colony optimization and swarm intelligence [ M ]. Brussels : Springer,2006 : 100-109.
  • 7ELKE M, ARNO P, GERTI K. Using taxonomies for content-based routing with ants [ J ]. Journal of Computer Networks, 2007,51 (16) : 4514-4528.
  • 8KAMVAR S D, SCHLOSSER M T,GARCIA M H. The eigentrust algorithm for reputation management in P2P networks[ C ]//Proc of the 12th International Conference on World Wide Web. New York: ACM Press, 2003 : 640- 651.
  • 9CNNIC.第23次中国互联网络发展状况统计报告[EB/OL].2009-1-12.http://www.cnnic.net.cn/html/Dir/2009/01/12/5447.htm.
  • 10MOORE D, SHANNON C, BROWN D, et al. Inferring intemet denial of service activity[J]. ACM Transactions on Computer Systems, 2006, 24(2): 115-139.

共引文献12

同被引文献11

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部