期刊文献+

基于种群动力学的P2P IPTV系统内容污染扩散模型

A Modeling Framework with Population Dynamics for Content Pollution Proliferation in P2P IPTV System
下载PDF
导出
摘要 近年来,随着P2P(peer-to-peer)技术的日益成熟,基于P2P技术的IPTV(Internet protocol television)系统逐渐流行并取得了巨大成功,吸引了来自全球产业界和学术界的密切关注.但是,由于P2P IPTV系统自身特有的分布性、匿名性、快速传播性、用户规模大等特点使得其更容易成为攻击的目标.在对P2P IPTV内容污染攻击过程和节点在内容污染攻击中的行为特征进行详细分析的基础上,建立了一个具有种群动力学特征的P2P IPTV系统内容污染扩散模型,该模型充分考虑了在真实世界的P2P IPTV系统内容污染攻击中用户的持续观看行为、用户的加入和离开行为对频道用户规模动态演变的影响.实验结果表明,提出的P2P IPTV内容污染扩散模型可以有效和准确地刻画真实内容污染攻击场景中污染攻击对频道的在线节点规模动态演变和节点离开行为的影响情况. With the growing maturity of peer-to-peer(P2P)technology,IPTV(Internet protocol television)applications based on it have gained great commercial success,which has received more and more attentions from both global industry and academia.However,the characteristics of distribution,anonymity,rapid propagation,and large-scale users in P2P IPTV systems make them more likely to be vulnerable targets.In this paper,the procedure of content pollution attack in P2P IPTV systems is presented firstly,and then the various user behaviors under the pollution attack are analyzed.With that knowledge,a modeling framework with population dynamics of content pollution in P2P IPTV systems is proposed.Different from the existing content pollution propagation models,this model considers the impact of user behaviors in the content pollution attack of real world P2P IPTV systems,such as continuous watching behavior,arrival behavior,departure behavior.Theoretical analysis and simulation experiments show that the proposed model is a feasible and efficient tool to analyze the content pollution propagation in real world P2P IPTV systems,especially for the dynamic evolution of participating users and the user departure behavior.
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第6期1314-1324,共11页 Journal of Computer Research and Development
基金 国家科技支撑计划基金项目(2012BAH18B05) 国家自然科学基金项目(61272447)~~
关键词 P2P技术 IPTV系统 内容污染攻击 建模 种群动力学 P2P(peer-to-peer)technology IPTV(Internet protocol television)system content pollution attack modeling population dynamics
  • 相关文献

参考文献28

  • 1PPTV. PPTV Homepage [EB/OL]. [2014-09-12]. http:// www. pptv. corn.
  • 2PPStream. PPStream Homepage [EB/OL]. [2014-09-12] http://www, pps. tv.
  • 3UUSee. UUSee Homepage [EB/OL]. [2014 09 12]. http://.
  • 4中国互联网络信息中心(CNNIC).第34次中国互联网络发展状况调查统计报告[R/OL].(2014-07-21)[2014-12-02].http://www.cnnic.net.cn/hlwfzyj/hl-w=bg/hlwtjbg/201407/P020140721507223212132.pdf.
  • 5Dhungel P, Hei X, Ross K W, et al. Pollution in P2P live video streaming [J]. Int Journal of Computer Networks and Communications, 2009, 1(2) 99-110.
  • 6王海舟,陈兴蜀,王文贤,郝正鸿.Understanding pollution dynamics in large-scale peer-to-peer IPTV system[J].Journal of Central South University,2012,19(8):2203-2217. 被引量:2
  • 7Liang J, Kumar R, Xi Y, et al. Pollution in P2P file sharing systems [C] //Proc of the 24th IEEE Int Conf on Computer Communications (INFOCOM'05). Piscataway, NJ : IEEE, 2005:1174-1185.
  • 8Liang J, Naoumov N, Ross K W. The index poisoning attack in P2P file sharing systems [C] //Proc of the 25th IEEE Int Conf on Computer Communications ( INFOCOM'06 ). Piscataway, NJ: IEEE, 2006:1-12.
  • 9Lee U, Choi M, Cho J, et al. Understanding pollution dynamics in P2P file sharing [C] //Proc of the 5th Int Workshop on Peer to Peer Systems (IPTPS'06). Berkeley, CA: USENIX Association, 2006:1-6.
  • 10Christin N, Weigend A S, Chuang J. Content availability, pollution and poisoning in file sharing peer to-peer networks [C] //Proc of the 6th ACM Conf on Electronic Commerce (EC'05). New York: ACM, 2005:68-77.

二级参考文献65

  • 1夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 2Wallach D S. A survey of peer to-peer security issues//Proceedings of the International Symposium on Software Security. Tokyo, Japan, 2002:42- 57.
  • 3Zhou L, Zhang L, McSherry F, Immorlica N, Chien S. A first look at peer to peer worms: threats and defenses//Proceedings of the 4th International Workshop on Peer to Peer Systems (IPTPS2005). Ithaca, NY, USA, 2005:24- 35.
  • 4Naoumov N, Ross K. Expioiting P2P systems for DDoS attacks//Proceedings of the 1st International Conference on Scalable Information Systems. Hong Kong, China 2006:1-7 (Article No. : 47).
  • 5Douceur J R. The sybil attack//Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS 2002). Cambridge, MA, USA, 2002:251-260.
  • 6Liang J, Kumar R, Xi Y, Ross K W. Pollution in P2P file sharing systems//Proceedings of the IEEE INFOCOM 2005. Miami, USA, 2005:1174 -1185.
  • 7Liang J, Naoumov N, Ross K W. The index poisoning attack in P2P file sharing systems//Proceedings of the IEEE INFOCOM 2006. Barcelona, Spain, 2006: 1-12.
  • 8Urdaneta G, Pierre G, Van Steen G. A survey of DHT security techniques. ACM Computing Surveys, 2011, 43(2):1-53.
  • 9Sit E, Morris R. Security considerations for peer-to-peer distributed hash tables//Proceedings of the 1st International Workshop on Peer -to-Peer Systems. Cambridge, Massachusetts, 2002:261-269.
  • 10Defrawy K E, Gjoka M, Markopoulou A. BotTorrent: mis using BitTorrent to launch DDoS attacks//Proceedings of the 3rd USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI 07). Santa Clara, CA, 2007: 1- 6(Article No.: 1).

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部