CN101304321A - 基于信任的对等网络病毒防御方法 - Google Patents
基于信任的对等网络病毒防御方法 Download PDFInfo
- Publication number
- CN101304321A CN101304321A CNA2008101235973A CN200810123597A CN101304321A CN 101304321 A CN101304321 A CN 101304321A CN A2008101235973 A CNA2008101235973 A CN A2008101235973A CN 200810123597 A CN200810123597 A CN 200810123597A CN 101304321 A CN101304321 A CN 101304321A
- Authority
- CN
- China
- Prior art keywords
- virus
- node
- file
- information
- download
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Description
尺度aij | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
Ci:Cj重要性 | 相同 | 稍强 | 稍强 | 稍强 | 强 | 明显强 | 明显强 | 明显强 | 强 |
k | 1 | 2 | 3 | 4 | 5 | W(2) |
Wk(3) | 0.5950.2770.129 | 0.0820.2360.682 | 0.4290.4290.142 | 0.6330.1930.175 | 0.1660.1660.668 | 0.2630.4750.055 |
λk | 3.005 | 3.002 | 3 | 3.009 | 3 | 0.090 |
CIk | 0.003 | 0.001 | 0 | 0.005 | 0 | 0.110 |
文件ID | 节点ID | 节点信任度 | 病毒状态 |
FileID | PeerID1 | PT1 | 1 |
FileID | PeerID2 | PT2 | 0 |
FileID | PeerID3 | PT3 | 0 |
… | … | … | … |
FileID | PeerIDn | PTn | 1 |
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101235973A CN101304321B (zh) | 2008-07-09 | 2008-07-09 | 基于信任的对等网络病毒防御方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008101235973A CN101304321B (zh) | 2008-07-09 | 2008-07-09 | 基于信任的对等网络病毒防御方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101304321A true CN101304321A (zh) | 2008-11-12 |
CN101304321B CN101304321B (zh) | 2010-06-02 |
Family
ID=40114049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008101235973A Expired - Fee Related CN101304321B (zh) | 2008-07-09 | 2008-07-09 | 基于信任的对等网络病毒防御方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101304321B (zh) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834895A (zh) * | 2010-04-20 | 2010-09-15 | 南京邮电大学 | 一种对等网络中信任数据管理方法 |
CN101557397B (zh) * | 2009-05-13 | 2012-05-02 | 杭州华三通信技术有限公司 | 表项管理方法及设备 |
CN101772012B (zh) * | 2009-01-04 | 2012-06-06 | 中国移动通信集团公司 | 网络节点信任度确定方法、系统及装置 |
CN102567656A (zh) * | 2010-12-14 | 2012-07-11 | 上海三旗通信科技股份有限公司 | 基于Ad Hoc的移动终端病毒查杀方式 |
CN102932391A (zh) * | 2011-08-11 | 2013-02-13 | 腾讯科技(深圳)有限公司 | P2sp系统中处理数据的方法、装置和系统 |
CN103384240A (zh) * | 2012-12-21 | 2013-11-06 | 北京安天电子设备有限公司 | 一种p2p主动防御方法及系统 |
WO2014079351A1 (en) * | 2012-11-22 | 2014-05-30 | Tencent Technology (Shenzhen) Company Limited | Data processing device and method for interaction detection |
CN103841156A (zh) * | 2012-11-26 | 2014-06-04 | 腾讯科技(深圳)有限公司 | 一种基于端对端协议的文件下载保护方法、装置,及系统 |
CN106560831A (zh) * | 2015-12-31 | 2017-04-12 | 哈尔滨安天科技股份有限公司 | 一种恶意代码绕过主动防御的发现方法及系统 |
US9626829B2 (en) | 2012-11-22 | 2017-04-18 | Tencent Technology (Shenzhen) Company Limited | Data processing device and method for interaction detection |
CN107395598A (zh) * | 2017-07-25 | 2017-11-24 | 重庆邮电大学 | 一种抑制病毒传播的自适应防御方法 |
CN110300094A (zh) * | 2019-05-08 | 2019-10-01 | 中国人民解放军战略支援部队航天工程大学 | 一种数据节点可信评估方法、装置、设备及存储介质 |
CN111405000A (zh) * | 2020-03-01 | 2020-07-10 | 张雨 | 一种p2p网络资源共享方法和系统 |
CN113239355A (zh) * | 2020-07-24 | 2021-08-10 | 张建春 | 一种基于可信计算的大数据安全防护系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040128542A1 (en) * | 2002-12-31 | 2004-07-01 | International Business Machines Corporation | Method and system for native authentication protocols in a heterogeneous federated environment |
CN100518190C (zh) * | 2006-01-13 | 2009-07-22 | 南京邮电大学 | 基于信任模型的动态角色访问控制方法 |
CN101039322A (zh) * | 2007-04-20 | 2007-09-19 | 华中师范大学 | 一种普适计算的动态访问控制方法 |
-
2008
- 2008-07-09 CN CN2008101235973A patent/CN101304321B/zh not_active Expired - Fee Related
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101772012B (zh) * | 2009-01-04 | 2012-06-06 | 中国移动通信集团公司 | 网络节点信任度确定方法、系统及装置 |
CN101557397B (zh) * | 2009-05-13 | 2012-05-02 | 杭州华三通信技术有限公司 | 表项管理方法及设备 |
CN101834895A (zh) * | 2010-04-20 | 2010-09-15 | 南京邮电大学 | 一种对等网络中信任数据管理方法 |
CN101834895B (zh) * | 2010-04-20 | 2013-03-06 | 南京邮电大学 | 一种对等网络中信任数据管理方法 |
CN102567656A (zh) * | 2010-12-14 | 2012-07-11 | 上海三旗通信科技股份有限公司 | 基于Ad Hoc的移动终端病毒查杀方式 |
CN102932391A (zh) * | 2011-08-11 | 2013-02-13 | 腾讯科技(深圳)有限公司 | P2sp系统中处理数据的方法、装置和系统 |
US9626829B2 (en) | 2012-11-22 | 2017-04-18 | Tencent Technology (Shenzhen) Company Limited | Data processing device and method for interaction detection |
WO2014079351A1 (en) * | 2012-11-22 | 2014-05-30 | Tencent Technology (Shenzhen) Company Limited | Data processing device and method for interaction detection |
CN103841156A (zh) * | 2012-11-26 | 2014-06-04 | 腾讯科技(深圳)有限公司 | 一种基于端对端协议的文件下载保护方法、装置,及系统 |
CN103384240B (zh) * | 2012-12-21 | 2016-09-07 | 北京安天电子设备有限公司 | 一种p2p主动防御方法及系统 |
CN103384240A (zh) * | 2012-12-21 | 2013-11-06 | 北京安天电子设备有限公司 | 一种p2p主动防御方法及系统 |
CN106560831A (zh) * | 2015-12-31 | 2017-04-12 | 哈尔滨安天科技股份有限公司 | 一种恶意代码绕过主动防御的发现方法及系统 |
CN107395598A (zh) * | 2017-07-25 | 2017-11-24 | 重庆邮电大学 | 一种抑制病毒传播的自适应防御方法 |
CN107395598B (zh) * | 2017-07-25 | 2020-06-19 | 重庆邮电大学 | 一种抑制病毒传播的自适应防御方法 |
CN110300094A (zh) * | 2019-05-08 | 2019-10-01 | 中国人民解放军战略支援部队航天工程大学 | 一种数据节点可信评估方法、装置、设备及存储介质 |
CN110300094B (zh) * | 2019-05-08 | 2021-08-03 | 中国人民解放军战略支援部队航天工程大学 | 一种数据节点可信评估方法、装置、设备及存储介质 |
CN111405000A (zh) * | 2020-03-01 | 2020-07-10 | 张雨 | 一种p2p网络资源共享方法和系统 |
CN113239355A (zh) * | 2020-07-24 | 2021-08-10 | 张建春 | 一种基于可信计算的大数据安全防护系统 |
CN113239355B (zh) * | 2020-07-24 | 2023-07-21 | 艾普科创(北京)控股有限公司 | 一种基于可信计算的大数据安全防护系统 |
Also Published As
Publication number | Publication date |
---|---|
CN101304321B (zh) | 2010-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101304321B (zh) | 基于信任的对等网络病毒防御方法 | |
Viswanath et al. | An analysis of social network-based sybil defenses | |
Guo et al. | Fedcrowd: A federated and privacy-preserving crowdsourcing platform on blockchain | |
Zaminkar et al. | A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem | |
Rawat et al. | iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity | |
CN102333096B (zh) | 匿名通信系统的信誉度控制方法及系统 | |
Selvaraj et al. | Peer profile based trust model for P2P systems using genetic algorithm | |
Wu et al. | A blockchain based access control scheme with hidden policy and attribute | |
Hanmanthu et al. | SQL Injection Attack prevention based on decision tree classification | |
CN116405187A (zh) | 基于区块链的分布式节点入侵态势感知方法 | |
Chen et al. | Bpvse: Publicly verifiable searchable encryption for cloud-assisted electronic health records | |
CN111064641B (zh) | 一种去中心化存储网络的节点性能检测系统及方法 | |
Khalil et al. | Fuzzy Logic based security trust evaluation for IoT environments | |
Kumar et al. | Blockchain and deep learning for cyber threat-hunting in software-defined industrial IoT | |
Putra et al. | Decentralised trustworthy collaborative intrusion detection system for IoT | |
Zhang et al. | Visual object detection for privacy-preserving federated learning | |
La Salle et al. | Joint modeling of hyperledger fabric and sybil attack: petri net approach | |
Kegelmeyer et al. | An example of counter-adversarial community detection analysis | |
Li et al. | SRAM: a state-aware risk assessment model for intrusion response | |
CN111143834A (zh) | 一种电网内网安全管理与漏洞自动化验证方法及其系统 | |
Cheng et al. | Correlation trust authentication model for peer-to-peer networks | |
Xiuguo | A security-aware data replica placement strategy based on fuzzy evaluation in the cloud | |
Li et al. | User behaviour authentication model based on stochastic petri net in cloud environment | |
Akavipat et al. | ReDS: Reputation for directory services in P2P systems | |
Zhang et al. | Gaussian process learning for cyber‐attack early warning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20081112 Assignee: Jiangsu Nanyou IOT Technology Park Ltd. Assignor: Nanjing Post & Telecommunication Univ. Contract record no.: 2016320000217 Denomination of invention: Method for defending equity network virus based on trust Granted publication date: 20100602 License type: Common License Record date: 20161118 |
|
LICC | Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model | ||
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: Jiangsu Nanyou IOT Technology Park Ltd. Assignor: Nanjing Post & Telecommunication Univ. Contract record no.: 2016320000217 Date of cancellation: 20180116 |
|
EC01 | Cancellation of recordation of patent licensing contract | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100602 Termination date: 20170709 |
|
CF01 | Termination of patent right due to non-payment of annual fee |