期刊文献+
共找到83篇文章
< 1 2 5 >
每页显示 20 50 100
A novel mathematical model on Peer-to-Peer botnet
1
作者 任玮 宋礼鹏 冯丽萍 《Journal of Measurement Science and Instrumentation》 CAS 2014年第4期62-67,共6页
Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P b... Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P botnet. Then, the local stability at equilibria is carefully analyzed by considering the eigenvalues' distributed ranges of characteristic equations. Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic re- production number and time delay r. The results can help us to better understand the propagation behaviors of P2P botnet and design effective counter-botnet methods. 展开更多
关键词 peer-to-peer (p2p) botnet STABILITY SEIR model time delay
下载PDF
Peer-to-Peer网络中文件查询的研究 被引量:1
2
作者 王涛 卢显良 侯孟书 《计算机科学》 CSCD 北大核心 2005年第10期49-51,145,共4页
随着P2P网络应用研究的热化,文件查询即给出文件名后如何确定文件的存放位置,已经成为大规模分布式网络中最常遇到的问题之一。文件查询的效率直接影响到整个P2P网络的性能。本文从P2P网络的基本现状出发,给出了目前文件查询在非结构化... 随着P2P网络应用研究的热化,文件查询即给出文件名后如何确定文件的存放位置,已经成为大规模分布式网络中最常遇到的问题之一。文件查询的效率直接影响到整个P2P网络的性能。本文从P2P网络的基本现状出发,给出了目前文件查询在非结构化,结构化和松散结构化P2P网络中的解决方案并进行了深入分析和比较。文章最后指出了目前P2P网络中文件查询算法的缺点和今后的研究方向。 展开更多
关键词 p2p 文件查询 分布式 peer-to-peer 文件查询 网络应用 p2p网络 非结构化 分布式网络 存放位置 查询算法 文件名
下载PDF
Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks 被引量:1
3
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2021年第7期983-1001,共19页
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que... One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process. 展开更多
关键词 Mathematical model MANET p2p networks p2p MANET UNSTRUCTURED search algorithms peer-to-peer AD-HOC ooding random walk resource discovery content discovery mobile peer-to-peer broadcast pEER
下载PDF
Mathematical Model Validation of Search Protocols in MP2P Networks 被引量:1
4
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Saeed Rubaiee 《Computers, Materials & Continua》 SCIE EI 2021年第8期1807-1829,共23页
Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received pa... Broadcasting is a basic technique in Mobile ad-hoc network(MANET),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique,floods the network with query messages,while the random walk technique operates by contacting the subsets of every node’s neighbors at each step,thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding,and its variants under a wired network.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper,we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations,we propose a new protocol named ABRW(Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics,i.e.,mean no.of steps needed to find a resource,the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifying our findings.Our proposed search algorithm under such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate. 展开更多
关键词 Search protocols random walk MANET p2p networks p2p MANET mathematical model peer-to-peer wireless ad hoc network FLOODING mobile p2p UNSTRUCTURED p2p NS-2 network simulator
下载PDF
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:2
5
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 peer-to-peer (p2p) network REpUTATION trust model mutual evaluation similarity risk
下载PDF
Study on semantic-oriented hybrid indexing strategy of resource metadata in peer-to-peer network 被引量:1
6
作者 LIU Zhen ZHOU Mao-wei +1 位作者 HUANG Hong-bin LUO Xue-shan 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第1期88-94,共7页
Applying ontology to describe resource metadata richly in the peer-to-peer environment has become current research trend. In this semantic peer-to-peer environment, indexing semantic element of resource description to... Applying ontology to describe resource metadata richly in the peer-to-peer environment has become current research trend. In this semantic peer-to-peer environment, indexing semantic element of resource description to support efficient resource location is a difficult and challenging problem. This paper provided a hybrid indexing architecture, which combines local indexing and global indexing. It uses community strategy and semantic routing strategy to organize key layer metadata element and uses DHT (distributed hash table) to index extensional layer metadata element. Compared with related system, this approach is more efficient in resource location and more scalable. 展开更多
关键词 peer-to-peer (p2p) ONTOLOGY METADATA Resource indexing
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
7
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 peer-to-peer (p2p) Keyword-set search (KSS) Keyword relationship
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
8
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 Information privacy propagation model EMAIL peer-to-peer (p2p)
下载PDF
Rate-distortion optimized bitstream switching for peer-to-peer live streaming
9
作者 Jin-feng ZHANG Rong-gang WANG +2 位作者 Jian-wei NIU Yuan DONG Hai-la WANG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期445-456,共12页
Peer-to-peer (P2P) technology provides a cost-effective and scalable way to distribute video data. However, high heterogeneity of the P2P network, which rises not only from heterogeneous link capacity between peers bu... Peer-to-peer (P2P) technology provides a cost-effective and scalable way to distribute video data. However, high heterogeneity of the P2P network, which rises not only from heterogeneous link capacity between peers but also from dynamic variation of available bandwidth, brings forward great challenge to video streaming. To attack this problem, an adaptive scheme based on rate-distortion optimization (RDO) is proposed in this paper. While low complexity RDO based frame dropping is exploited to shape bitrate into available bandwidth in peers, the streamed bitstream is dynamically switched among multiple available versions in an RDO way by the streaming server. Simulation results show that the proposed scheme based on RDO achieves great gain in overall perceived quality over simple heuristic schemes. 展开更多
关键词 Stream switching Frame dropping peer-to-peer (p2p) Rate-distortion optimization (RDO)
下载PDF
INCENTIVE MECHANISMS FOR TRUSTWORTHY ROUTING BASED ON GAME MODEL OF THE STRATEGIES OF NODES IN P2P NETWORKS
10
作者 Wang Haoyun Zhang Shunyi +1 位作者 Li Jun Chen Zhixian 《Journal of Electronics(China)》 2009年第6期842-852,共11页
The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game... The trustworthiness and security of routing in the existing Peer-to-Peer (P2P) networks can not be ensured because of the diversity of the strategies of P2P nodes. This paper firstly uses game theory to establish game model of the strategies and profits of various types of routing nodes. Then,two incentive mechanisms for the corresponding stages of P2P trustworthy routing are proposed,namely trust associated mechanism and trust compensated mechanism. Simulation results show that the incentive mechanisms proposed in this paper will encourage cooperation actions of good nodes and restrain malicious actions of bad nodes,which ensure the trustworthiness of routing consequently. 展开更多
关键词 peer-to-peer (p2p) network ROUTING Node GAME Strategy
下载PDF
A PEER-TO-PEER INCENTIVE SCHEME FOR OVERCOMING FREE RIDING
11
作者 Tian Junfeng Yang Lidan Li Juan Tian Rui 《Journal of Electronics(China)》 2010年第1期60-67,共8页
Free riding has a great influence on the expandability,robustness and availability of Peer-to-Peer(P2P) network.Controlling free riding has become a hot research issue both in academic and industrial communities.An in... Free riding has a great influence on the expandability,robustness and availability of Peer-to-Peer(P2P) network.Controlling free riding has become a hot research issue both in academic and industrial communities.An incentive scheme is proposed to overcoming free riding in P2P network in this paper.According to the behavior and function of nodes,the P2P network is abstracted to be a Distributed and Monitoring-based Hierarchical Structure Mechanism(DMHSM) model.A utility function based on several influencing factors is defined to determine the contribution of peers to the whole system.This paper also introduces reputation and permit mechanism into the scheme to guarantee the Quality of Service(QoS) and to reward or punish peers in the network.Finally,the simulation results verify the effectiveness and feasibility of this model. 展开更多
关键词 peer-to-peer(p2p) network Free riding Incentive mechanism REpUTATION Utility function
下载PDF
Modeling active worm propagation on the P2P network
12
作者 吴国政 Feng Chaosheng Zhlguang Qin 《High Technology Letters》 EI CAS 2012年第4期406-411,共6页
This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on... This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend. 展开更多
关键词 active worms peer-to-peer (p2p) networks modeLING simulations
下载PDF
An ALM Model for Streaming Media Service in P2P-SIP Network
13
作者 廖小飞 李德敏 +2 位作者 白恩健 蒋学芹 宋转 《Journal of Donghua University(English Edition)》 EI CAS 2012年第4期316-320,共5页
Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the a... Application layer multicast (ALM) has been widely applied in Internet, as a substitute for IP multicast. However, it causes network load to increase because it adopts unlcast in data transmission, which limits the application. In this article, in order to improve the ALM performance in P2P-SIP network, an ALM model was proposed which reduced network load via merging messages in concast mode. Finally network simulations prove that this model has better benefit on single node load and average network load. Therefore, it is suitable for streaming media service in P2P-SIP Network. 展开更多
关键词 application layer multicast ALM peer-to-peer p2 p session initiation protocol (SIp) streamine media service
下载PDF
基于P2P网络的大规模视频直播系统 被引量:38
14
作者 罗建光 张萌 +1 位作者 赵黎 杨士强 《软件学报》 EI CSCD 北大核心 2007年第2期391-399,共9页
介绍了一种基于P2P(peer-to-peer)网络的大规模视频直播系统Gridmedia.该系统采用Gossip协议构建无结构的应用层覆盖网络,每个节点可以独立地选择自己的伙伴节点.在覆盖网络上,每个节点通过一种推拉结合的流传输策略从邻居节点获取数据.... 介绍了一种基于P2P(peer-to-peer)网络的大规模视频直播系统Gridmedia.该系统采用Gossip协议构建无结构的应用层覆盖网络,每个节点可以独立地选择自己的伙伴节点.在覆盖网络上,每个节点通过一种推拉结合的流传输策略从邻居节点获取数据.与DONet中的纯拉策略相比,推拉结合策略大幅度减小了终端用户观看视频的延迟,并有效降低了直播系统的控制开销.PlanetLab上的大量实验充分表明了该策略的有效性.Gridmedia的原型系统通过300Kbps的视频码流对2005年春节联欢晚会进行了全球互联网直播.晚会期间,全球范围内有超过500000人次通过系统观看了直播,最高在线人数达到了15239人,充分验证了系统的性能. 展开更多
关键词 p2p(peer-to-peer)络 视频直播 无结构覆盖网络 推拉结合策略 低延迟
下载PDF
用Small-World设计无组织P2P系统的路由算法 被引量:31
15
作者 周晋 路海明 李衍达 《软件学报》 EI CSCD 北大核心 2004年第6期915-923,共9页
由于peer-to-peer系统在文件共享方面有着巨大的应用前景,peer-to-peer搜索问题已成为目前学术界重点的研究问题之一.对于缺乏缓存机制的无组织P2P系统,已有的分布式路由算法缺乏全局导航能力,属于无序搜索.为此,提出一种key clusterin... 由于peer-to-peer系统在文件共享方面有着巨大的应用前景,peer-to-peer搜索问题已成为目前学术界重点的研究问题之一.对于缺乏缓存机制的无组织P2P系统,已有的分布式路由算法缺乏全局导航能力,属于无序搜索.为此,提出一种key clustering算法,将路由空间分为HUB和AUT两层,从全局角度进行有序搜索.为提高key clustering算法的可扩展性,借鉴Small-world领域的研究成果,在路由表中以一定概率插入连接远距离节点的快捷连接,以缩短平均路径长度.初步仿真实验表明,引入快捷连接的key clustering算法具有良好的搜索能力和扩展性. 展开更多
关键词 p2p路由 聚类 小世界 无组织peer-to-peer系统
下载PDF
P2P数据管理 被引量:17
16
作者 余敏 李战怀 张龙波 《软件学报》 EI CSCD 北大核心 2006年第8期1717-1730,共14页
P2P(peer-to-peer)技术是未来重构分布式体系结构的关键技术,拥有广阔的应用前景.P2P系统的大多数问题都可归结为数据放置和检索问题,因此,P2P数据管理成为数据库领域活跃的研究课题.当前,P2P数据管理主要有信息检索、数据库查询和连续... P2P(peer-to-peer)技术是未来重构分布式体系结构的关键技术,拥有广阔的应用前景.P2P系统的大多数问题都可归结为数据放置和检索问题,因此,P2P数据管理成为数据库领域活跃的研究课题.当前,P2P数据管理主要有信息检索、数据库查询和连续查询3个子领域,取得了许多研究成果.在介绍P2P技术的优点后,指出了P2P数据管理研究的目标.然后针对上述3个方面,论述P2P数据管理研究的现状,着重讨论了P2P数据库查询的索引构造策略、语义异构的解决方法、查询语义、查询处理策略、查询类型和查询优化技术.通过比较,指出了现状与目标的差距,提出了需要进一步研究的问题. 展开更多
关键词 p2p(peer-to-peer) 索引 语义调和 查询语义 复杂查询处理 查询优化
下载PDF
P2P—对等网络的未来 被引量:34
17
作者 汤晟 吴朝晖 《计算机应用研究》 CSCD 北大核心 2004年第1期13-16,22,共5页
P2P(Peer-to-Peer)引导网络计算模式从集中式向分布式偏移,网络应用的核心从中央服务器向网络边缘的终端设备扩散。P2P是一种基于互联网的新的应用型技术,主要为软件技术。主要介绍了P2P技术的背景起源,关键技术和应用趋势,并重点分析了... P2P(Peer-to-Peer)引导网络计算模式从集中式向分布式偏移,网络应用的核心从中央服务器向网络边缘的终端设备扩散。P2P是一种基于互联网的新的应用型技术,主要为软件技术。主要介绍了P2P技术的背景起源,关键技术和应用趋势,并重点分析了SUN公司提出的P2P平台:JXTA的体系机构。 展开更多
关键词 p2p(peer-to-peer) JXTA 网络计算 对等联网
下载PDF
Study on the Distributed Routing Algorithm and Its Security for Peer-to-Peer Computing
18
作者 ZHOUShi-jie 《Journal of Electronic Science and Technology of China》 2005年第2期187-188,共2页
关键词 peer-to-peer computing p2p distributed computing information security distributed routing algorithm bidding-electing algorithm one-way accumulator
下载PDF
一种新的P2P网络自组织数据路由模型 被引量:1
19
作者 刘云 沈波 张宏科 《高技术通讯》 EI CAS CSCD 2004年第12期16-20,共5页
提出了一种新的P2P(Peer-to-Peer)网络数据路由模型(SPDR)。SPDR利用具有数据转发能力的P2P节点构造虚拟数据路由,使P2P节点能够动态地突破网络对通信双方的限制,从而解决当前P2P网络中许多节点无法进行数据交换的问题,增强P2P网络... 提出了一种新的P2P(Peer-to-Peer)网络数据路由模型(SPDR)。SPDR利用具有数据转发能力的P2P节点构造虚拟数据路由,使P2P节点能够动态地突破网络对通信双方的限制,从而解决当前P2P网络中许多节点无法进行数据交换的问题,增强P2P网络的通信能力。此外,SPDR采用自组织的方式管理P2P网络的数据路由建立过程,保持了P2P网络的可扩展性。仿真结果表明,SPDR明显改善了P2P资源的可访问性。 展开更多
关键词 p2p网络 路由模型 peer-to-peer 行数据 仿真结果 网络数据 可扩展性 数据转发 通信能力 节点
下载PDF
基于P2P应用的校园网安全策略及防护技术 被引量:7
20
作者 王俭 刘渊 《信息技术》 2006年第7期54-57,共4页
首先介绍了P2P网络模型及特征。其次,分析了P2P应用突破校园网安全体系的可能性及目前典型的旁路技术。在P2P应用与传统应用对比分析的基础上,提出了基于P2P应用的入侵检测模型及校园网安全的防护技术,以及配置安全防火墙与入侵检测系... 首先介绍了P2P网络模型及特征。其次,分析了P2P应用突破校园网安全体系的可能性及目前典型的旁路技术。在P2P应用与传统应用对比分析的基础上,提出了基于P2P应用的入侵检测模型及校园网安全的防护技术,以及配置安全防火墙与入侵检测系统等安全构件相结合的安全策略。 展开更多
关键词 p2p(peer-to-peer) 网络安全 特征识别 检测
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部