CN101621512B - Method for identifying false evaluation and preventing malicious attack in P2P network - Google Patents

Method for identifying false evaluation and preventing malicious attack in P2P network Download PDF

Info

Publication number
CN101621512B
CN101621512B CN2009100882538A CN200910088253A CN101621512B CN 101621512 B CN101621512 B CN 101621512B CN 2009100882538 A CN2009100882538 A CN 2009100882538A CN 200910088253 A CN200910088253 A CN 200910088253A CN 101621512 B CN101621512 B CN 101621512B
Authority
CN
China
Prior art keywords
node
file
evaluation
download
trust management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100882538A
Other languages
Chinese (zh)
Other versions
CN101621512A (en
Inventor
苗光胜
冯登国
苏璞睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software of CAS
Original Assignee
Institute of Software of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software of CAS filed Critical Institute of Software of CAS
Priority to CN2009100882538A priority Critical patent/CN101621512B/en
Publication of CN101621512A publication Critical patent/CN101621512A/en
Application granted granted Critical
Publication of CN101621512B publication Critical patent/CN101621512B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for identifying false evaluations and preventing malicious attack in a P2P network, which comprises the following steps: distributing file preservation nodes and trust management nodes for each file in a network; recording detailed information of each download process by the file preservation nodes; when the trust management nodes receive new evaluation information, starting an evaluation authenticity detecting process; verifying whether the node for reporting evaluation downloads the evaluated file or not by asking a file preservation mode download record, collecting download process details and asking challenge problem, and the like, thereby judging whether the evaluation is credible or not, meanwhile, estimating the node reporting the estimation; and adopting a corresponding verifying strategy for the reported evaluation according to a history estimation record of the node. Compared with the prior art, the method has wider application range, can more effectively detect the authenticity of estimation actions in the P2P network and greatly increase the resistance of a P2P network trust model for the attack.

Description

Identification false evaluation and the method that prevents malicious attack in a kind of P2P network
Technical field
The present invention relates to a kind of recognition methods, belong to field of information security technology, particularly the P2P network safety filed node false evaluation in the P2P network.
Background technology
Appearing at of P2P network changed the Internet development pattern to a great extent, and many web applications rely on the P2P network technology to obtain fast development, and be typical in eMule, shared file systems such as BT.Because born opening, the anonymity of P2P network and be difficult to characteristics such as tracking property; Malicious node and file are easy to invade in the network and launch a offensive, and therefore, the P2P network is when offering convenience; Also produce some security threats, even become one of important channel of transmitted virus.In order to address this problem, the P2P network has been introduced faith mechanism, and reasonable inhibitory action has been played in the activity of malicious node in the network and malice file.
The operation principle of faith mechanism is through giving the purpose that the method for hanging down trust value reaches inhibition malicious node or file activity to malicious node or file, facts have proved that this mechanism effect is remarkable.But also there are a series of safety problems in faith mechanism itself, also can suffer the attack of malicious node.Especially some malicious nodes disturb the result of calculation of trust model through submitting the evaluating data of forging to.With the trust model based on file is example; The typical behavior of malicious node is to its file false evaluation of not downloading; Submit to and should estimate to the trust management node; Existing trust model lacks the detection method of behavior that this type of is forged, and the detection of estimating validity only is confined to the aspects such as integrality of data.If the evaluation that malicious node is submitted to meets fully and submits data standard to and in transmission course, do not damage, then the trust management node is had no way of investigating this node and whether was really downloaded the file of being estimated, and can't confirm that promptly whether qualified it make this evaluation.
Therefore, identification and resistance that behavior is forged in this evaluation seem and be necessary very much, presses for to propose a kind of effective recognition method and prevent the destruction of this type of attack to trust model.
Summary of the invention
The objective of the invention is for P2P network trust mechanism provides a kind of effective false evaluation identifying schemes, and suppress the malicious attack behavior based on this false evaluation identifying schemes.
The present invention is following to the definition of false evaluation:
Be provided with a file F, its trust management node is a node M, and node i is submitted its trust evaluation to file F to the trust management node M of file F under the situation of never downloading file F, and then we claim that such evaluation is a false evaluation.
In order to discern the false evaluation in the P2P network; The operation principle of method provided by the invention is: when node is carried out download action, note its downloading process and it is reported the trust management node of giving institute's file in download; Simultaneously, the trust management node can be verified and download the real full content of having downloaded the file of being estimated whether node is declared like it.Whether the evaluation through this node of said process checking is made is authentic and valid.
With the trust model based on file is example, with technical scheme explanation of the present invention as follows:
The recognition methods of false evaluation comprises the steps: in a kind of P2P network
1) be that each file Random assignment file is preserved node and trust management node in the network, its file is preserved node and is responsible for preserving file and response download request, and writes down the download behavior of other nodes to this document; The trust management node is responsible for receiving the evaluation of other nodes to this document, and the authenticity of estimating is made judgement;
2) after the trust management node received the evaluation to its management document, the inquiry file was preserved node and whether is had the Download History of submitting the node of estimating to, is then to forward step 3) to, otherwise judges that this is evaluated as false evaluation;
3) the trust management node judges that directly this is evaluated as credible evaluation, perhaps further downloads integrity verification as follows:
Summary file is preserved the Download History in the node, checks and submits the whether complete file of being estimated of having downloaded of the node estimated to, is then to forward step 4) to, otherwise judges that this is evaluated as false evaluation;
4) the trust management node judges that directly this is evaluated as credible evaluation; Perhaps further carry out following file content checking: the trust management node is to submitting to the node of estimating to send the content verification request; Certain part in the accidental validation file or a few partial content; Judge to submit to the node of estimating whether really to have whole file, to be to judge that then this is evaluated as credible evaluation, otherwise to judge that this is evaluated as false evaluation.
Further, in the said method, each node can utilize individual private key that the information of being submitted to is signed.
In above-mentioned steps 1) in secure hash capable of using (hash) function be that file allocation trust management node and file are preserved node.Can distribute 1 node separately or distribute a plurality of nodes to preserve node or trust management node separately on the basis of randomness as a result guaranteeing as file.Use a plurality of files preservation nodes and trust management node to download simultaneously to improve security of system and speed of download through realization system redundancy and multinode, multinode preservation synchronously and download have become main flow in the file-sharing P2P network of reality.The present invention can be applied in this type of network environment.
File is preserved the download behavioural information that node write down and can be comprised: download node ID, download time, this node ID, file in download ID, download section sub address and download size.
The evaluating data bag that the trust management node receives in the said method should comprise following content: submit the node ID of estimating, file ID and the evaluation result estimated to.
Above-mentioned steps 3) trust management querying node file is preserved all Download Histories that node is submitted to; Then to wherein download section sub address with download size and gather; Summarized results and file in download information are compared; To confirm submitting to the download behavior of the node of estimating whether to cover whole file, this way is in order to adapt to current ubiquitous multi-source download environment simultaneously.
In above-mentioned steps 4) in the file content proof procedure; Trust management node certain part or a few parts in can the picked at random file; Require to submit to node and the file preservation node estimated to return Hash operation result simultaneously, submit to the node of estimating whether really to download this file both return results contrast checkings it.
Further, the file content proof procedure can adopt safe Hash functions such as MD5, SHA-1 as required, and requires return results is carried out the idiograph.Be reliability that improves the checking result and the difficulty that improves the node cheating, can carry out repeatedly at random based on the proof procedure in this step of actual needs.
Further, above-mentioned steps 2), 3), 4) proof procedure be a proof procedure that goes forward one by one, this three step is not all to carry out: if the step authentication failed of front then judge and be evaluated as false evaluation needn't be carried out following step again; Preceding two steps card has had the stronger forgery ability that prevents, therefore under the not high or system resource condition of limited, can not carry out the 3rd step card in security requirement.Simultaneously, we will only carry out steps 2) checking be called loose checking, carry out step 2) and 3) two steps cards is called loose relatively checking, carry out step 2), 3) with 4) three steps card is called strict the checking.
Based on above-mentioned false evaluation recognition methods, the present invention has further proposed following method and has prevented the attack to trust model.
Prevent the method for malicious attack in a kind of P2P network, comprise the steps:
A. be that each file Random assignment file is preserved node and trust management node in the network, its file is preserved node and is responsible for preserving file and response download request, and writes down the download behavior of other nodes to this document; The trust management node is responsible for receiving the evaluation of other nodes to this document, and the authenticity of estimating is made judgement;
B. after the trust management node receives the evaluation to its management document, come the authenticity of estimating is verified through following step b1-b3:
B1. inquire whether file preservation node exists the Download History of submitting the node of estimating to, is then to forward step b2 to, otherwise judges that this is evaluated as false evaluation, directly goes to step c;
B2. judge directly that this is evaluated as credible evaluation; Get into step c; Perhaps further download integrity verification as follows: summary file is preserved the Download History in the node; Check the whether complete file of being estimated of having downloaded of node that submit to estimate; Be then to forward step b3 to; Otherwise judge that this is evaluated as false evaluation, directly go to step c;
B3. judge directly that this is evaluated as credible evaluation; Get into step c; Perhaps further carry out following file content checking: the trust management node is to submitting to the node of estimating to send the content verification request; Certain part in the accidental validation file or a few partial content; Judge to submit to the node of estimating whether really to have whole file; Be to judge that then this is evaluated as credible evaluation, otherwise judge that this is evaluated as false evaluation, get into step c;
C. the trust management node is operated based on the checking result of step b as follows: with the foundation of credible evaluation as calculation document global trusting value, submit the node favorable comment of this evaluation simultaneously to; False evaluation is not then participated in the computational process of file global trusting value, submits to the node difference of this evaluation to comment simultaneously;
D. loose authentication policy or loose relatively authentication policy are taked in the evaluation of the good node of history evaluation performance being submitted to; Correspondingly; Strict authentication policy is taked in the evaluation that evaluation is performed poor to history node is submitted to, and said loose authentication policy refers to the strategy only through step b1 the authenticity of estimating verified; Said loose relatively authentication policy is meant the authentication policy of also through step b2 the download integrality being verified through behind the step b1; After the authentication policy of said strictness is meant the checking through step b1 and b2, the authentication policy that also will verify file content through step b3.
Further, can set a threshold value k at above-mentioned steps d, when the history evaluation number of certain node submission was no more than k, the trust management node was taked strict authentication policy to the evaluation of its submission, with the real effectiveness that guarantees to estimate; When the history of this node submission is estimated number greater than k, if there is false evaluation record (promptly this node has been poor commenting) in the history evaluation of this node, think that then the history evaluation of this node is performed poor, otherwise think that its historical evaluation performance is good.Loose authentication policy or loose relatively authentication policy are taked in new evaluation to the good node of history evaluation performance is submitted to, and strict authentication policy is taked in the evaluation that the node that evaluation is performed poor to history is submitted to.Wherein, k gets positive integer, and for example 10,20 etc., for the real effectiveness that guarantees to estimate, typical value k >=20.
Good effect of the present invention is:
The false evaluation detection method that the present invention adopted is at first preserved node for each file allocation file in the network and is used to respond other nodes the download request and the trust management node of this document is used to gather the evaluation of other nodes to this document; File is preserved node and is being downloaded the details of carrying out back this downloading process of record; When receiving new evaluation information, the trust management node starts testing process to this evaluation authenticity.Through multiple-authentication is carried out in the download behavior of downloading node; Comprise that the inquiry file preserves the Download History of node, gathers several different methods such as the downloading process details and the problem of challenging; Whether the checking evaluation node has really downloaded the file of being estimated; Judge according to testing result whether this evaluation is credible at last, do not download file or downloaded the behavior that incomplete node is submitted false evaluation to, reject these false evaluation informations thereby find those; And simultaneously the evaluation behavior of this node is made an appraisal, strengthen its further difficulty of attacking.Compare with the method for other simple authentication evaluation information integralities; The present invention can more effectively verify the authenticity and the validity of evaluation information; The forgery behavior is had the obvious suppression effect, strengthen the defensive ability/resistance ability of P2P network trust model greatly this type of attack.
Description of drawings
Fig. 1 is the sketch map that concerns of each node in the P2P network of the present invention.
Fig. 2 is the operational flow diagram of embodiment of the invention method.
Embodiment
Principle of the present invention is as shown in Figure 1, at first in network, utilizes safe Hash function to preserve node and trust management node for each file allocation file, and they are responsible for preserving the trust value of file and management this document respectively; Then, by the trust management node monitor in real time other nodes (be evaluation node 1,2 ..., n) evaluation information submitted to, the node that the behavior history of particularly marking is performed poor.For the node of submitting trust evaluation to; The trust management node is verified the authenticity of its evaluation information of submitting to through a series of reciprocal process; If the discovery false evaluation when rejecting this evaluation information, differs from the node of submitting this evaluation to and to comment.
With reference to flow chart 2 of the present invention, provide detailed process below.
The first step, for each file allocation file is preserved node and trust management node, concrete assigning process is following:
Use two different security hash functions, be made as H sAnd H m, respectively node ID is carried out Hash operation, obtain two different Hash operation result X sAnd X m, promptly
X s = H s ( id ) X m = H m ( id )
Utilize the node locating rule of P2P network to confirm two node P then sAnd P m(node ID is respectively ID sAnd ID m) file that is respectively this node preserves node and trust management node, promptly
ID s = loc ( X s ) ID m = loc ( X m )
Wherein, loc representes P2P network positions algorithm.
File is preserved the download behavior that node is responsible for preserving file, response download request and record node.The trust management node is responsible for gathering the scoring that other nodes are made, and the global trusting value of management of computing file, simultaneously, also is responsible for carrying out the authenticity testing process to trust evaluation;
Need to prove that file is preserved node P sWith trust management node P mJust not unalterable after confirming, when network fluctuation and network environment occurring and change, the position of trust management node and behavior record node possibly change thereupon.But, the location mechanism of P2P network can guarantee can find current trust management node and behavior record node through the aforementioned calculation process all the time.
Present embodiment uses the SHA-1 algorithm as employed secure hash function in the node assigning process; Utilize the safe one-way of this function; We can guarantee to believe that it is safe and reliable with the assigning process of appointing management node that file is preserved node; Can avoid occurring the possibility of the collaborative cheating of node to greatest extent, because the assigning process of hash function SHA-1 safe in utilization can guarantee:
1) which file node can't initiatively select to preserve;
2) node also can't be selected oneself will manage the trust value of which file simultaneously;
In the node assigning process, all nodes can only passively be accepted the Random assignment result of hash function, have so just avoided the collusion cheating problem between the node to a certain extent, have improved the fail safe of data management.
In second step, node is after downloading completion, and file is preserved this time of nodes records downloading process information, in order to inquiry.
The physical record data comprise following part:
1) this node ID (downloading the source)
2) download node ID (who carries out download)
3) file in download ID (download be which file)
4) download start address (from the download that where begins of file)
5) download size (having downloaded which part of file from this node)
6) download time (when this download takes place)
This recorded content can use the XML language description following:
<download>
<frome>ID<sub >s</sub></frome>
<to>ID<sub >d</sub></to>
<source>F<sub >j</sub></source>
<address>0x8888</address>
<size>0x9999</size>
……
<time>timestamp</time>
</download>
This record can be read as: node ID dAt time timestamp from node ID sDownloaded file F iIn 0x8888 begins from the address 0x9999 byte.
The 3rd step, download node and mark coming source node, evaluation is submitted to the trust management node of file in download.
After node is accomplished and downloaded, need at first to differentiate, make corresponding evaluation according to identification result to downloading the result.Accomplish the evaluating data of estimating the back submission and comprise following three parts:
1) evaluation node ID (whom sign evaluation made by)
2) estimated file ID (which file is sign be by evaluation object)
3) evaluation result
The content of this evaluation can use the XML language description following:
<rating>
<rater>ID<sub >i</sub></rater>
<rated>F<sub >i</sub></rated>
<result>R<sub >ij</sub></result>
</rating>
Wherein, ID iBe evaluation node, F jFor being estimated file, R IjThe expression node ID iTo file F jEvaluation.
Node i is submitted to file F with this evaluating data jThe trust management node, by it scoring is gathered.
In the 4th step, the trust management node receives after the trust evaluation that node i submits to, starts the authenticity testing process to this evaluation, if truly then return True, otherwise returns False.This process key step is following:
1) to file F iFile preserve node and send query requests, confirm file preserves in the node whether have the download behavior record of node i to above-mentioned file, if having record then get into next step, otherwise directly return False, and give the node i difference and comment;
2) inquiry and summary file are preserved the Download History information that node returns, and confirm whether node i has successfully downloaded file F iFull content.The Download History that this process is preserved node through merge file can obtain.If verify successfully then get into next step, otherwise directly return False, and give the node i difference and comment;
3) the trust management node sends following request to node i and file preservation node simultaneously: give outfile F jX begins the hash value of y byte from the address, and behind signature, submits to the trust management node.Whether the trust management node really has the file F that is estimated through contrast return results checking node i jIf verify successfully then return True, otherwise return False, and give the node i difference and comment;
In the 5th step,, get rid of the interference of false evaluation according to testing result computing node trust value.
If be verified as false evaluation; Then directly this evaluation is excluded trust computational process; To guarantee result of calculation accurately and reliably, the node of submitting this evaluation to is differed from comment simultaneously, the evaluation information that the node of in the proof procedure afterwards history being performed poor is submitted to carries out the strictness audit.
To those skilled in the art; Can also be according to the core concept design different and of the present invention of concrete trust model and the false evaluation detection method of structure oneself; So that in concrete environment, reach best effect, thereby better detect the forgery behavior of estimating, promote the fail safe of P2P network.
In addition; Above-mentioned proof procedure is not all to accomplish; Consider network environment and the difference that system consumption is limited; Can carry out loose relatively or strict relatively verification step according to actual conditions, also can on basis of the present invention, realize the false evaluation verification method of different levels and level of security.
At last; Although disclose specific embodiment of the present invention and accompanying drawing for the purpose of illustration; Its purpose is to help to understand content of the present invention and implement according to this; But it will be appreciated by those skilled in the art that: in the spirit and scope that do not break away from the present invention and appended claim, various replacements, variation and modification all are possible.Therefore, the present invention should not be limited to most preferred embodiment and the disclosed content of accompanying drawing, and the scope that the present invention requires to protect is as the criterion with the scope that claims define.

Claims (8)

1. the recognition methods of false evaluation in the P2P network comprises the steps:
1) utilize the secure hash function to preserve node and trust management node for each file Random assignment file in the network; Its file is preserved node and is responsible for preserving file and response download request, and record comprises that other nodes are to download node ID, download time, this node ID, file in download ID, download section sub address of this document and the download behavior of downloading size; The trust management node is responsible for receiving the evaluation of other nodes to this document, and the authenticity of estimating is made judgement;
2) after the trust management node received the evaluation to its management document, the inquiry file was preserved node and whether is had the Download History of submitting the node of estimating to, is then to forward step 3) to, otherwise judges that this is evaluated as false evaluation;
3) the trust management node judges that directly this is evaluated as credible evaluation; Perhaps further verify as follows: summary file is preserved the Download History in the node; Check the whether complete file of being estimated of having downloaded of node that submit to estimate, be then to forward step 4) to, otherwise judge that this is evaluated as false evaluation;
4) the trust management node judges that directly this is evaluated as credible evaluation; Perhaps through certain part or a few parts in the trust management node picked at random file; Let and submit to node and the file preservation node estimated to return the Hash operation result to it, through the return results that contrasts both authenticity of estimating is judged, thereby file content is further verified as follows: the trust management node is to submitting to the node of estimating to send the content verification request; Certain part in the accidental validation file or a few partial content; Judge to submit to the node of estimating whether really to have whole file, to be to judge that then this is evaluated as credible evaluation, otherwise to judge that this is evaluated as false evaluation.
2. recognition methods according to claim 1; It is characterized in that; Proof procedure in the step 3) is: trust management querying node file is preserved all Download Histories of node; Then to wherein download section sub address with download size and gather, summarized results and file in download information are compared, judge whether the download behavior of the node of submitting evaluation to has covered whole file.
3. prevent the method for malicious attack in the P2P network, comprise the steps:
A. be that each file Random assignment file is preserved node and trust management node in the network, its file is preserved node and is responsible for preserving file and response download request, and writes down the download behavior of other nodes to this document; The trust management node is responsible for receiving the evaluation of other nodes to this document, and the authenticity of estimating is made judgement;
B. after the trust management node receives the evaluation to its management document, come the authenticity of estimating is verified through following step b1-b3:
B1. inquire that whether file preservation node exists the Download History of submitting the node of estimating to, is then to forward step b2 to, otherwise judges that this is evaluated as suspicious evaluation, directly goes to step c;
B2. judge directly that this is evaluated as credible evaluation; Get into step c; Perhaps further download integrity verification as follows: summary file is preserved the Download History in the node; Check the whether complete file of being estimated of having downloaded of node that submit to estimate; Be then to forward step b3 to; Otherwise judge that this is evaluated as suspicious evaluation, directly goes to step c;
B3. judge directly that this is evaluated as credible evaluation; Get into step c; Perhaps further carry out following file content checking: the trust management node is to submitting to the node of estimating to send the content verification request; Certain part in the accidental validation file or a few partial content; Judge to submit to the node of estimating whether really to have whole file; Be to judge that then this is evaluated as credible evaluation, otherwise judge that this is evaluated as suspicious evaluation, get into step c;
C. the trust management node is operated based on the checking result of step b as follows: with the foundation of credible evaluation as calculation document global trusting value, submit the node favorable comment of this evaluation simultaneously to; The computational process of file global trusting value is not then participated in suspicious evaluation, submits to the node difference of this evaluation to comment simultaneously;
D. loose authentication policy or loose relatively authentication policy are taked in the evaluation of the good node of history evaluation performance being submitted to; Correspondingly; Strict authentication policy is taked in the evaluation that evaluation is performed poor to history node is submitted to, and said loose authentication policy refers to the strategy only through step b1 the authenticity of estimating verified; Said loose relatively authentication policy is meant the authentication policy of also through step b2 the download integrality being verified through behind the step b1; After the authentication policy of said strictness is meant the checking through step b1 and b2, the authentication policy that also will verify file content through step b3.
4. method according to claim 3; It is characterized in that; Said step a utilizes the secure hash function to be file allocation trust management node and file preservation node, and file is preserved the download behavioural information that node write down and comprised: download node ID, download time, this node ID, file in download ID, download section sub address and download size.
5. method according to claim 4; It is characterized in that; Downloading integrity verification procedures among the step b2 is: trust management querying node file is preserved all Download Histories of node; Then to wherein download section sub address with download size and gather, summarized results and file in download information are compared, judge whether the download behavior of the node of submitting evaluation to has covered whole file.
6. method according to claim 4; It is characterized in that; Step b3 file content verification method is: certain part or a few parts in the trust management node picked at random file; Let and submit to node and the file preservation node estimated to return Hash operation result, the authenticity of estimating is judged through the return results that contrasts both to it.
7. method according to claim 3 is characterized in that, sets a threshold value k in steps d, and k is a positive integer, and when the history evaluation number of certain node submission was no more than k, the trust management node was taked strict authentication policy to the evaluation of its submission; When the history of this node submission is estimated number greater than k, if having the false evaluation record in the history evaluation of this node, think that then the history evaluation of this node is performed poor, otherwise think that its historical evaluation shows well.
8. method according to claim 7 is characterized in that, wherein k >=20.
CN2009100882538A 2009-07-14 2009-07-14 Method for identifying false evaluation and preventing malicious attack in P2P network Expired - Fee Related CN101621512B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100882538A CN101621512B (en) 2009-07-14 2009-07-14 Method for identifying false evaluation and preventing malicious attack in P2P network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100882538A CN101621512B (en) 2009-07-14 2009-07-14 Method for identifying false evaluation and preventing malicious attack in P2P network

Publications (2)

Publication Number Publication Date
CN101621512A CN101621512A (en) 2010-01-06
CN101621512B true CN101621512B (en) 2012-01-25

Family

ID=41514556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100882538A Expired - Fee Related CN101621512B (en) 2009-07-14 2009-07-14 Method for identifying false evaluation and preventing malicious attack in P2P network

Country Status (1)

Country Link
CN (1) CN101621512B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120167222A1 (en) * 2010-12-23 2012-06-28 Electronics And Telecommunications Research Institute Method and apparatus for diagnosing malicous file, and method and apparatus for monitoring malicous file
CN104243592A (en) * 2014-09-24 2014-12-24 岑黎光 P2P trust mechanism and management method thereof

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101867608B (en) * 2010-05-24 2013-03-13 中国科学院计算技术研究所 Centralized block switching P2P (peer-to-peer) file sharing system and service method thereof
CN101895577B (en) * 2010-07-06 2013-02-13 中国科学院计算技术研究所 Distribution method of network sharing resources
CN105681712A (en) * 2014-11-20 2016-06-15 广东中星电子有限公司 Video data processing method and device
CN113051556A (en) * 2020-09-07 2021-06-29 沈建锋 Service information detection method and system based on big data and cloud computing
CN114172689B (en) * 2021-11-11 2023-11-28 卓尔智联(武汉)研究院有限公司 Information processing method and equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345753A (en) * 2008-08-12 2009-01-14 中国科学院软件研究所 Resource-oriented trust appraisement method in P2P network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345753A (en) * 2008-08-12 2009-01-14 中国科学院软件研究所 Resource-oriented trust appraisement method in P2P network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Ali Aydin Selcuk et al..《A reputation-based trust management system for P2P network》.《2004 IEEE International Symposium on Cluster Computing and the Grid》.2004,251-258. *
Azzedine Boukerche et al..《An agent-based trust and reputation management scheme for wireless sensor networks》.《IEEE GLOBECOM 2005 proceedings》.2005,第3卷(第3期),1857-1861. *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120167222A1 (en) * 2010-12-23 2012-06-28 Electronics And Telecommunications Research Institute Method and apparatus for diagnosing malicous file, and method and apparatus for monitoring malicous file
CN104243592A (en) * 2014-09-24 2014-12-24 岑黎光 P2P trust mechanism and management method thereof

Also Published As

Publication number Publication date
CN101621512A (en) 2010-01-06

Similar Documents

Publication Publication Date Title
CN101621512B (en) Method for identifying false evaluation and preventing malicious attack in P2P network
Tosh et al. Consensus protocols for blockchain-based data provenance: Challenges and opportunities
CN107426181B (en) The hold-up interception method and device of malice web access request
US11163858B2 (en) Client software attestation
Moore et al. Evaluating the wisdom of crowds in assessing phishing websites
Panchenko et al. Analysis of fingerprinting techniques for Tor hidden services
CN101345753B (en) Resource-oriented trust appraisement method in P2P network
Zhu et al. Research on the security of blockchain data: A survey
CN108880820B (en) Code management method and device
CN103595696B (en) The method and device that a kind of File Ownership proves
Kanjalkar et al. Short paper: I can’t believe it’s not stake! resource exhaustion attacks on PoS
Koch Hidden in the shadow: The dark web-a growing risk for military operations?
Kabla et al. Applicability of intrusion detection system on Ethereum attacks: a comprehensive review
Haner et al. Breaking botnets: A quantitative analysis of individual, technical, isolationist, and multilateral approaches to cybersecurity
Ye et al. A system-fault-risk framework for cyber attack classification
Innocenti et al. You’ve got (a reset) mail: A security analysis of email-based password reset procedures
KR20210144687A (en) Device and application integrity verification
CN115640581A (en) Data security risk assessment method, device, medium and electronic equipment
CN109145543A (en) A kind of identity identifying method
Moran et al. The phish-market protocol: securely sharing attack data between competitors
CN109743303B (en) Application protection method, device, system and storage medium
Nasridinov et al. UNWRAP: An approach on wrapping-attack tolerant SOAP messages
Al-Shaer et al. Attribution, temptation, and expectation: A formal framework for defense-by-deception in cyberwarfare
CN111914998A (en) Training method and device for server attack information generator
Badih et al. Crypto-jacking threat detection based on blockchain framework and deception techniques

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120125

Termination date: 20170714