期刊文献+

Kad网络协议研究与实验 被引量:2

Analysis and Experiment of Kad Network Protocol
下载PDF
导出
摘要 Kad作为一种开放性的网络协议,为深入研究和改进Kad网络协议提供了可能性。文章在对Kad客户端系统的体系结构进行整体分析后,结合其开放源码的静态测试,从用户隐私、内容隐私和服务器及节点文件这3个方面来研究Kad协议通信的安全性,并指出协议的缺陷和潜在的威胁。同时,每个研究均从原理和实验数据进行具体的分析和研究,对Kad客户端的数据通信的主要方法进行剖析。最后,针对协议不同的威胁提出相应的解决方案,识别出了设计实现中主要的抽象类,通过抽象类的方法改进,使得存在的威胁降低到使用者的可接受范围内,这样不仅保证了用户能拥有安全的Kad网络环境,也可以为Kad网络安全、查询策略、拓扑优化等领域提供实际的数据基础和必要的实验结论。 As an open network protocol, Kad makes the further research and improvement of its network protocol possible. After the systematic analysis of the whole Kad's architecture,and combined with the static testing upon the open source, we study the security of the Kad protocol's communication from the user,s privacy, the privacy of content, the fi les of servers list and nodes list,noted the defects and the potential threat of the protocol. At the same time,each aspects' studing analysis and research of the experimental data are all based on the main interface of the data communication of the Kad software. Finally, facing different threats of the protocol, we offer different solutions which are based on the design and implementation of the major abstract class, then we can not only decrease the threat to the acceptable range of users and ensure that the users have a secure network environment, but also provide the data base and experimental conclusions for Kad network security, query strategy, topology optimization and so on.
作者 熊梅 周安民
出处 《信息网络安全》 2015年第2期46-50,共5页 Netinfo Security
关键词 Kad协议 安全保密 性能 研究 kad protocol security and secrecy performance research
  • 相关文献

参考文献3

二级参考文献32

  • 1绿盟科技.eMule客户端AuachToAlreadyKnown内存双释放漏洞[EB/OL].(2003-08-22).hap://www.nsfocus.net/index.php?act=sec_bug&do=view&bug_id=5313.
  • 2Nash A L.Attacking P2P Networks[EB/OL].(2005-12-16).http://wwwcsif.cs.ucdavis.edu/~nash/235/attacking_p2p_networks.pdf.
  • 3eMule-Security.eMule Fakeserver List[EB/OL].(2008-03-22).http://upd.emule-security.net/fakeservers.txt.
  • 4eMule-Project.eMule FAQ[EB/OL].(2005-06-15).http://www.emule-project.net/home/perl/help.cgi?1=1&cat_id=276.
  • 5Stach P.MD4 Collision Generator[EB/OL].[2008-03-23].http://www.stachliu.com/md4coll.c.
  • 6Steiner M,Biersack E W,Ennajjary T.Actively monitoringpeers in Kad[C] //Proceedings of the 6th InternationalWorkshop on Peer-to-Peer Systems.Bellevue,USA:Microsoft Research,2007.
  • 7YU Jie,XIAO Peng,Li Zhoujun,et al.Toward an accuratesnapshot of DHT networks[J].IEEE CommunicationsLetters,2011,15(1):97-99.
  • 8Ipoque.Official homepage[Z/OL].(2012-06-12),http://www.ipoque.com.
  • 9Scarlata V,Levine B,Shield C.Responder anonymity andanonymous peer-to-peer file sharing[C] //Network ProtocolsNinth International Conference on ICNP 2001.Mission Inn,Riverside USA:IEEE Computer Society,2001:272-280.
  • 10Dingledine R,Freedman M,Molnar D.The free havenproject:Distributed anonymous storage service[C] //Designing Privacy Enhancing Technologies.Berkeley,USA:Springer,2001:67-95.

共引文献23

同被引文献26

  • 1宋弢,何建忠.基于FSR协议的Ad hoc网络服务发现策略[J].仪器仪表学报,2006,27(z3):2048-2049. 被引量:1
  • 2安靖,王亚弟,韩继红.安全协议的CSP描述技术[J].微计算机信息,2006,22(10X):52-55. 被引量:5
  • 3JUBIN J, TORNOW J D. The DARPA packet radio network protocols[J]. IEEE - PIEEE, 1987, 75(1): 21-32.
  • 4Beyer D A. Accomplishments of the DARPA Survivable Adaptive Networks SURAN Program[C]//IEEE Military Communications Conference (MILCOM), 1990: 855-862.
  • 5LEINER B M, RUTH R J, SASTRY A R. Sastry. Goals and Challenges of the DARPA GloMo Program[J]. Personal Communications, IEEE, 1996, 3(6):34-43.
  • 6IEEE. IEEE 802.11TM WIRELESS LOCAL AREA NETWORKS[EB/OL]. http://www.ieee802.org/11/, 2015-05-11.
  • 7IETF. Mobile Ad-hoc Networks[EB/OL]. http://www.ietf.org/html. charters/Ad-hoc network-charter.html, 2015-05-13.
  • 8GRACE P, BLAIR G S, SAMUEL S. ReMMoC: A Reflective Middleware to support Mobile Client Interoperability[C]//OTM Confederated International Conferences: CooplS, DOA, and ODBASE Italy, 2003:1170-1187.
  • 9BROMBERG Y D, ISSARNY, V. INDISS: Interoperable Discovery System for Networked Services[C]//ACM/IFIP/USENIX 6th International Middleware Conference, Grenoble, France, 2005: 164- 183.
  • 10HELAL S, DESAI N, VERMA V, et al. Konark - A Service Discovery and Delivery protocol for Ad-hoc Networks [C]//Third IEEE conference on Wireless Communication networks (WCNC), New Orleans, 2003: 2107 - 2113.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部