期刊文献+

一种基于社交网络的Sybil攻击防御 被引量:1

A SYBIL ATTACK DEFENSE BASED ON SOCIAL NETWORK
下载PDF
导出
摘要 通过对以DHT技术为主的结构化对等网络进行安全方面的综述分析,Sybil攻击所带来的威胁逐渐增大。当前针对Sybil攻击的防御策略有建立可信中心认证、分布式认证等多种方法,但是这些方法要么破坏了网络的非集中性,要么给正常的结点在加入时带来障碍。通过研究发现,利用社交网络技术在解决这一问题时有着良好的前景。为此,利用社交网络技术,提出一种新的Sybil攻击防御模型SSDM,并通过仿真实验证明,SSDM具有良好的防御效果。 By summarised analysis on security of structured peer-to-peer network mainly based on DHT technology, it is known that the menace brought by Sybil attacks is increasing gradually. At present there are a couple of methods used as the defense strategies aiming at the Sybil attacks including setting up the credible certification centre and distributed authentication and so on, but these methods either destroy the non-centralisation of network or bring the barrier to those normal nodes joining in. Through the study, we find that using social networking technology to solve this problem has good prospect. Therefore, by using the social network technology, we propose a new Sybil attack defense model SSDM, and demonstrate by the simulation results that SSDM has good defense effect.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第6期38-39,59,共3页 Computer Applications and Software
基金 国家自然科学基金项目(61103143) 河南省高校科技创新人才支持计划项目(2012HASTTT032) 河南省科技厅基础与前沿技术研究计划项目(112300410307)
关键词 SYBIL攻击 对等网络 社交网络 Sybil attack P2P network Social network
  • 相关文献

参考文献7

  • 1Guido Urdaneta. A Survey of DHT Security Techniques [ J ]. ACM Com-puting Surveys,2011,43(2) :1 -35.
  • 2Douceur J. The Sybil attack [ C ] //Proceedings of the 1st InternationalWork shop on Peer- to-Peer Systems. London,U K: Springer-Verlag,2002: 251 -260.
  • 3Castro M,Druschel P,Ganesh A, et al. Secure Routing for StructuredPeer-to-Peer Overlay Networks [ C]//Proc. 5 th Symposium on Operat-ing System Design and Implementation ( Boston,MA). ACM Press,New York,NY,2002:299-314.
  • 4Dinger J, Hartenstein H. Defending the Sybil Attack in P2P Networks :Taxonomy, Chal-lenges, and a Proposal for Self-Registration [ C ]//Proc. 1st International Conference on Availability,Reliabilityand Secur-ity (Vienna, Austria ) . IEEE Computer Society Press, Los Alamitos,CA,2006 :756-763.
  • 5Rodrigo Rodrigues,Peter Druschel. Peer-to-Peer Systems[ J]. Commu-nications of the ACM October,2010,53( 10) :72 —85.
  • 6Yu H,Kaminsky M,Gibbons P B, et al. SybilGuard : Defending AgainstSybil Attacks via Social Networks [ C ] //Proc. SIGCOMM ( Pisa, Ita-ly). ACM Press,New York,NY,2006:267 -278.
  • 7Yu H, Gibbons P B, Kaminsky M, et al. SybilLimit : A Near-OptimalSocial Network Defense against Sybil Attacks [ C ] //Proc. InternationalSymposium on Security and Privacy. IEEE Computer Society Press,LosAlamitos,C A,2008:3 -17.

同被引文献11

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部