期刊文献+
共找到411篇文章
< 1 2 21 >
每页显示 20 50 100
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
1
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
A Hierarchical Trust Model for Peer-to-Peer Networks 被引量:1
2
作者 Nehal Al-Otaiby Heba Kurdi Shiroq Al-Megren 《Computers, Materials & Continua》 SCIE EI 2019年第5期397-404,共8页
Trust has become an increasingly important issue given society’s growing reliance on electronic transactions.Peer-to-peer(P2P)networks are among the main electronic transaction environments affected by trust issues d... Trust has become an increasingly important issue given society’s growing reliance on electronic transactions.Peer-to-peer(P2P)networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers(users)and the inherent openness of these networks.A malicious peer can easily join a P2P network and abuse its peers and resources,resulting in a large-scale failure that might shut down the entire network.Therefore,a plethora of researchers have proposed trust management systems to mitigate the impact of the problem.However,due to the problem’s scale and complexity,more research is necessary.The algorithm proposed here,HierarchTrust,attempts to create a more reliable environment in which the selection of a peer provider of a file or other resource is based on several trust values represented in hierarchical form.The values at the top of the hierarchical form are more trusted than those at the lower end of the hierarchy.Trust,in HierarchTrust,is generally calculated based on the standard deviation.Evaluation via simulation showed that HierarchTrust produced a better success rate than the well-established EigenTrust algorithm. 展开更多
关键词 peer-to-peer network trust management REPUTATION malicious peers
下载PDF
Peer-to-Peer Networks 2 被引量:1
3
作者 Lin Yu 1,Cheng Shiduan 1,Li Qi 2 (1. Beijing University of Posts and Telecommunications,Beijing 100876, China 2. Peking University,Beijing 100088, China) 《ZTE Communications》 2006年第2期61-64,共4页
The development of network resources changes the network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted worldwide attention. The P2P architecture is ... The development of network resources changes the network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted worldwide attention. The P2P architecture is a type of distributed network in which all participants share their hardware resources and the shared resources can be directly accessed by peer nodes without going through any dedicated servers. The participants in a P2P network are both resource providers and resource consumers. This article on P2P networks is divided into two issues. In the previous issue, P2P architecture, network models and core search algorithms were introduced. The second part in this issue is analyzing the current P2P research and application situations, as well as the impacts of P2P on telecom operators and equipment vendors. 展开更多
关键词 peer-to-peer networks 2 WIDE IEEE NAPSTER SETI
下载PDF
A Credit-Based Approach for Overcoming Free-Riding Behaviour in Peer-to-Peer Networks
4
作者 Manal Hazazi Afnan Almousa +2 位作者 Heba Kurdi Shiroq Al-Megren Shada Alsalamah 《Computers, Materials & Continua》 SCIE EI 2019年第4期15-29,共15页
The underlying premise of peer-to-peer(P2P)systems is the trading of digital resources among individual peers to facilitate file sharing,distributed computing,storage,collaborative applications and multimedia streamin... The underlying premise of peer-to-peer(P2P)systems is the trading of digital resources among individual peers to facilitate file sharing,distributed computing,storage,collaborative applications and multimedia streaming.So-called free-riders challenge the foundations of this system by consuming resources from other peers without offering any resources in return,hindering resource exchange among peers.Therefore,immense effort has been invested in discouraging free-riding and overcoming the ill effects of such unfair use of the system.However,previous efforts have all fallen short of effectively addressing free-riding behaviour in P2P networks.This paper proposes a novel approach based on utilising a credit incentive for P2P networks,wherein a grace period is introduced during which free-riders must reimburse resources.In contrast to previous approaches,the proposed system takes into consideration the upload rate of peers and a grace period.The system has been thoroughly tested in a simulated environment,and the results show that the proposed approach effectively mitigates free-riding behaviour.Compared to previous systems,the number of downloads from free-riders decreased while downloads by contributing peers increased.The results also show that under longer grace periods,the number of downloads by fast peers(those reimbursing the system within the grace period)was greater than the number of downloads by slow peers. 展开更多
关键词 peer-to-peer network FREE-RIDING file sharing CREDIT
下载PDF
A "cluster" based search scheme in peer-to-peer network
5
作者 李振武 杨舰 +1 位作者 史旭东 白英彩 《Journal of Zhejiang University Science》 CSCD 2003年第5期549-554,共6页
This paper presents a "cluster" based search scheme in peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured feature. We designed an algorithm to... This paper presents a "cluster" based search scheme in peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured feature. We designed an algorithm to cluster peers that have similar interests. When receiving a query request, a peer will preferentially forward it to another peer which belongs to the same cluster and shares more similar interests. By this way search efficiency will be remarkably improved and at the same time good resilience against peer failure (the ability to withstand peer failure) is reserved. 展开更多
关键词 peer-to-peer network CLUSTER OVERLAY Structured feature Request pathlength
下载PDF
SFES: A scalable, fault-tolerant, efficient search scheme in a peer-to-peer network
6
作者 李振武 杨舰 +1 位作者 史旭东 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第4期452-460,共9页
This paper presents SFES: a scalable, fault-tolerant, efficient search scheme in a peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured features. We desig... This paper presents SFES: a scalable, fault-tolerant, efficient search scheme in a peer-to-peer network. The idea is based on the fact that data distribution in an information society has structured features. We designed an algorithm to cluster peers that have similar interests. When receiving a query request, a peer will preferentially forward it to another peer which belongs to the same cluster and shares more similar interests. By this method, search efficiency will be remarkably improved and at the same time good resistance against peer failure (the ability to withstand peer failure) is reserved. Keyword partial-match is supported, too. 展开更多
关键词 peer-to-peer network CLUSTER OVERLAY STRUCTURED request path length
下载PDF
Peer-to-Peer Networks
7
作者 Lin Yu1, Cheng Shiduan1, LiQi2 (1 .Beijing University of Posts and Telecommunications, Beijing 100876, China 2. Peking University, Beijing 100088,China) 《ZTE Communications》 2006年第1期53-57,共5页
The development of network resources changes network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted world-wide attention. P2P architecture is a type ... The development of network resources changes network computing models. P2P networks, a new type of network adopting peer-to-peer strategy for computing, have attracted world-wide attention. P2P architecture is a type of distributed network in which all participants share their hardware resources and the shared resources can be directly accessed by peer nodes without the necessity of going through any dedicated servers. The participants in a P2P network are both resource providers and resource consumers. This article on P2P networks will be divided into two issues. In this issue, P2P architecture, network models and core search algorithms are introduced. And the second part in the next issue will analyze the current P2P research and application situations, as well as the impact of P2P on telecom operators and equipment vendors. 展开更多
关键词 NAPSTER DHT peer-to-peer networks NODE
下载PDF
Research on Traffic Identification Technologies for Peer-to-Peer Networks
8
作者 Zhou Shijie Qin Zhiguang Wu Chunjiang(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu,Sichuan 610054,China) 《ZTE Communications》 2007年第4期14-18,共5页
The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris... The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed. 展开更多
关键词 PEER NODE Research on Traffic Identification Technologies for peer-to-peer networks UDP TLI PAIR TCP
下载PDF
Study on semantic-oriented hybrid indexing strategy of resource metadata in peer-to-peer network 被引量:1
9
作者 LIU Zhen ZHOU Mao-wei +1 位作者 HUANG Hong-bin LUO Xue-shan 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第1期88-94,共7页
Applying ontology to describe resource metadata richly in the peer-to-peer environment has become current research trend. In this semantic peer-to-peer environment, indexing semantic element of resource description to... Applying ontology to describe resource metadata richly in the peer-to-peer environment has become current research trend. In this semantic peer-to-peer environment, indexing semantic element of resource description to support efficient resource location is a difficult and challenging problem. This paper provided a hybrid indexing architecture, which combines local indexing and global indexing. It uses community strategy and semantic routing strategy to organize key layer metadata element and uses DHT (distributed hash table) to index extensional layer metadata element. Compared with related system, this approach is more efficient in resource location and more scalable. 展开更多
关键词 peer-to-peer (P2P) ONTOLOGY METADATA Resource indexing
下载PDF
Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks 被引量:1
10
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2021年第7期983-1001,共19页
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que... One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process. 展开更多
关键词 Mathematical model MANET P2P networks P2P MANET UNSTRUCTURED search algorithms peer-to-peer AD-HOC ooding random walk resource discovery content discovery mobile peer-to-peer broadcast PEER
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
11
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 peer-to-peer (P2P) Keyword-set search (KSS) Keyword relationship
下载PDF
Collaborative work model based on peer-to-peer network
12
作者 JIANG Jian-zhong FU Li ZHANG Xuan-peng XU Chuan-yun 《Journal of Chongqing University》 CAS 2007年第2期130-134,共5页
In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern ent... In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern enterprises and problems prevailing in mainstream collaborative work systems based on central server. Theoretically, the P2PCWM can effectively overcome the problems in a conventional system with a central server and meet the practical demands of modern businesses. It is distinguished from other systems by its features of equality, openness, promptness, fairness, expandability and convenience. 展开更多
关键词 modern team COLLABORATION AGENT peer-to-peer dynamic project network
下载PDF
ISS:Efficient Search Scheme Based on Immune Method in Modern Unstructured Peer-to-Peer Networks
13
作者 GUAN Zhitao CAO Yuanda ZHU Liehuang ZHANG Changyou FAN Xiumei 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期866-870,共5页
Flooding is the most famous technique for locating contents in unstructured P2P networks. Recently traditional flooding has been replaced by more efficient dynamic query (DQ) and different variants of such algorithm... Flooding is the most famous technique for locating contents in unstructured P2P networks. Recently traditional flooding has been replaced by more efficient dynamic query (DQ) and different variants of such algorithms. Dynamic query is a new flooding technique which could estimate a proper time-to-live (TTL) value for a query flooding by estimating the popularity of the searched files, and retrieve sufficient results under controlled flooding range for reducing network traffic. However, all DQ-like search algorithms are "blind" so that a large amount of redundant messages are caused. In this paper, we proposed a new search scheme, called Immune Search Scheme (ISS), to cope with this problem. In ISS, an immune systems inspired concept of similarity-governed clone proliferation and mutation for query message movement is applied. Some assistant strategies, that is, shortcuts creation and peer traveling are incorporated into ISS to develop "immune memory" for improving search performance, which can make ISS not be blind but heuristic. 展开更多
关键词 peer-to-peer dynamic query immune method clone proliferation and mutation
下载PDF
A distributed information retrieval method in peer-to-peer network
14
作者 刘飞 邹福泰 +1 位作者 马范援 李明禄 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第6期846-849,共4页
To avoid the scalability of the existing systems that employed centralized indexing,index flooding or query flooding,we proposed an efficient peer-to-peer information retrieval system SPIRS (Semantic P2P-based Informa... To avoid the scalability of the existing systems that employed centralized indexing,index flooding or query flooding,we proposed an efficient peer-to-peer information retrieval system SPIRS (Semantic P2P-based Information Retrieval System) that supported state-of-the-art content and semantic searches. SPIRS distributes document indices through P2P network hierarchically by Latent Semantic Indexing (LSI) and organizes nodes into a hierarchical overlay through CAN and TRIE. Comparing with other P2P search techniques,those based on simple keyword matching,SPIRS has better accuracy for considering the advanced relevance among documents. Given a query,only a small number of nodes are needed for SPIRS to identify the matching documents. Furthermore,both theoretical analysis and experimental results show that SPIRS possesses higher accuracy and less logic hops. 展开更多
关键词 peer-to-peer information retrieval latent semantic indexing TRIE semantic vector
下载PDF
Maximizing Resilient Throughput in Peer-to-Peer Network
15
作者 Bo Liu Fan Qiu +3 位作者 Yanchuan Cao Bin Chang Yi Cui Yuan Xue 《Communications and Network》 2011年第3期168-183,共16页
A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to consider fault resilience in peer select... A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to consider fault resilience in peer selection, little understanding is achieved regarding the solvability and solution complexity of this problem from the optimization perspective. To this end, we propose an optimization framework based on the generalized flow theory. Key concepts introduced by this framework include resilience factor, resilience index, and generalized throughput, which collectively model the peer resilience in a probabilistic measure. Under this framework, we divide the domain of optimal peer selection along several dimensions including network topology, overlay organization, and the definition of resilience factor and generalized flow. Within each sub-problem, we focus on studying the problem complexity and finding optimal solutions. Simulation study is also performed to evaluate the effectiveness of our model and performance of the proposed algorithms. 展开更多
关键词 peer-to-peer Resilient THROUGHPUT MAXIMIZING
下载PDF
Lower Bound on de Bruijn Graphs Out-degree for Lower Traffic Load in Peer-to-peer Networks
16
作者 王凯 左敏 +1 位作者 潘理 李建华 《Journal of Donghua University(English Edition)》 EI CAS 2006年第2期99-102,共4页
Designers search for N-nodes peer-to-peer networks that can have O (1) out-degree with O (log2 N) average distance. Peer-to-peer schemes based on de Bruijn graphs are found to meet this requirement. By defining av... Designers search for N-nodes peer-to-peer networks that can have O (1) out-degree with O (log2 N) average distance. Peer-to-peer schemes based on de Bruijn graphs are found to meet this requirement. By defining average load to evaluate the traffic load in a network, we show that in order to decrease the average load, the average distance of a network should decrease while the out-degree should increase. Especially, given out-degree k and N nodes, peer-to-peer schemes based on de Bruijn graphs have lower average load than other existing systems. The out-degree k of de Bruijn graphs should not be O(1) but should satisfy a lower bound described by an inequality κ^κ≥N^2, to ensure that the average load in peer-to-peer schemes based on de Bruijn graphs will not exceed that in Chord system. 展开更多
关键词 peer-to-peer de Bruijn graphs traffic load average load out-degree average distance.
下载PDF
Cloud Service Provisioning Based on Peer-to-Peer Network for Flexible Service Sharing and Discovery
17
作者 Andrii Zhygmanovskyi Norihiko Yoshida 《Journal of Computer and Communications》 2014年第10期17-31,共15页
In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P... In this paper, we present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each overlay node. Various issues concerning using this approach in the cloud environment, such as load-balancing, queuing, dealing with skewed data and dynamic attributes, are addressed in the paper. The infrastructure proposed in the paper can serve as a base for creating robust, scalable and reliable cloud systems, able to fulfill client’s QoS requirements, and at the same time introduce more efficient utilization of resources to the cloud provider. 展开更多
关键词 peer-to-peer CLOUD Computing SERVICE PROVISIONING SERVICE DISCOVERY SERVICE SHARING
下载PDF
Peer-to-Peer Networking来自Artisoft的四颗新星
18
作者 Steve Rigney 党瑞平 《个人电脑》 1995年第7期139-140,共2页
随着您的网络增长,您需要工具来提供远程访问、存储管理、调制解调器共享和网络总体管理。但是用一堆分离的软件工具来执行这些工作很可能超出$1000——相当高的价格,特别是对小的对等通信的LANs。 Artisoft LANtastic
关键词 peer-to-peer 新星 实用程序 networK 调制解调器共享 网络 通信包 对等通信 LANS 远程控制软件
下载PDF
A novel constant degree and constant congestion DHT scheme for peer-to-peer networks 被引量:7
19
作者 LIDongsheng LUXicheng 《Science in China(Series F)》 2005年第4期421-436,共16页
Degree, diameter and congestion are important measures of distributed hash table (DHT) schemes for peer-to-peer networks. Many proposed DHT schemes are based on some traditional interconnection topologies and the Kaut... Degree, diameter and congestion are important measures of distributed hash table (DHT) schemes for peer-to-peer networks. Many proposed DHT schemes are based on some traditional interconnection topologies and the Kautz graph is a topology with good properties such as optimal network diameter. In this paper, FissionE, a novel DHT scheme based on the Kautz graph, is proposed. FissionE is the first constant degree and O(logN) diameter DHT scheme with (1+o(1))-congestion. FissionE shows that the DHT scheme with constant degree and constant congestion can achieve O(logN) diameter, which is better than the lower bound ? (N1/d) conjectured before. The average degree of FissionE is 4 and the diameter is 2*log2N, and the average routing path length is about log2N. The average path length of FissionE is shorter than CAN or Koorde with the same degree when the P2P network is large scale. 展开更多
关键词 peer-to-peer network DHT scheme Kautz graph constant degree congestion.
原文传递
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks 被引量:3
20
作者 黄新力 邹福泰 马范援 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第3期457-468,共12页
The power-law node degree distributions of peer-to-peer overlay networks make them extremely robust to random failures whereas highly vulnerable under intentional targeted attacks. To enhance attack survivability of t... The power-law node degree distributions of peer-to-peer overlay networks make them extremely robust to random failures whereas highly vulnerable under intentional targeted attacks. To enhance attack survivability of these networks, DeepCure, a novel heuristic immunization strategy, is proposed to conduct decentralized but targeted immunization. Different from existing strategies, DeepCure identifies immunization targets as not only the highly-connected nodes but also the nodes with high availability and/or high link load, with the aim of injecting immunization information into just right targets to cure. To better trade off the cost and the efficiency, DeepCure deliberately select these targets from 2-local neighborhood, as well as topologically-remote but semantically-close friends if needed. To remedy the weakness of existing strategies in case of sudden epidemic outbreak, DeepCure is also coupled with a local-hub oriented rate throttling mechanism to enforce proactive rate control. Extensive simulation results show that DeepCure outperforms its competitors, producing an arresting increase of the network attack tolerance, at a lower price of eliminating viruses or malicious attacks. 展开更多
关键词 targeted local immunization peer-to-peer networks overlay topology SCALE-FREE COST efficiency rate control
原文传递
上一页 1 2 21 下一页 到第
使用帮助 返回顶部