CN109088862B - 一种基于分布式系统的节点性质识别方法 - Google Patents
一种基于分布式系统的节点性质识别方法 Download PDFInfo
- Publication number
- CN109088862B CN109088862B CN201810815063.0A CN201810815063A CN109088862B CN 109088862 B CN109088862 B CN 109088862B CN 201810815063 A CN201810815063 A CN 201810815063A CN 109088862 B CN109088862 B CN 109088862B
- Authority
- CN
- China
- Prior art keywords
- node
- applicant
- nodes
- distance
- resources
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000004422 calculation algorithm Methods 0.000 claims description 38
- 238000010801 machine learning Methods 0.000 claims description 8
- 238000013528 artificial neural network Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 7
- 238000003066 decision tree Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 claims description 3
- 235000008694 Humulus lupulus Nutrition 0.000 claims description 2
- 238000007637 random forest analysis Methods 0.000 description 3
- 238000012706 support-vector machine Methods 0.000 description 3
- 238000003064 k means clustering Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/122—Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Biophysics (AREA)
- Evolutionary Computation (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Biomedical Technology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (6)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011490755.6A CN112671739B (zh) | 2018-07-24 | 2018-07-24 | 分布式系统的节点性质识别方法 |
CN201810815063.0A CN109088862B (zh) | 2018-07-24 | 2018-07-24 | 一种基于分布式系统的节点性质识别方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810815063.0A CN109088862B (zh) | 2018-07-24 | 2018-07-24 | 一种基于分布式系统的节点性质识别方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011490755.6A Division CN112671739B (zh) | 2018-07-24 | 2018-07-24 | 分布式系统的节点性质识别方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109088862A CN109088862A (zh) | 2018-12-25 |
CN109088862B true CN109088862B (zh) | 2021-01-12 |
Family
ID=64838153
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810815063.0A Active CN109088862B (zh) | 2018-07-24 | 2018-07-24 | 一种基于分布式系统的节点性质识别方法 |
CN202011490755.6A Expired - Fee Related CN112671739B (zh) | 2018-07-24 | 2018-07-24 | 分布式系统的节点性质识别方法 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011490755.6A Expired - Fee Related CN112671739B (zh) | 2018-07-24 | 2018-07-24 | 分布式系统的节点性质识别方法 |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN109088862B (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110049034A (zh) * | 2019-04-09 | 2019-07-23 | 江苏商贸职业学院 | 一种基于深度学习的复杂网络实时Sybil攻击检测方法 |
CN112653682B (zh) * | 2020-12-16 | 2022-12-27 | 深圳前海微众银行股份有限公司 | 一种区块链日蚀攻击检测的方法及装置 |
CN113449459B (zh) * | 2021-04-09 | 2023-04-07 | 江西高创保安服务技术有限公司 | 一种通用的提升神经网络推理准确性和保持运算速度的分布式计算系统设计方法 |
CN115952426B (zh) * | 2023-03-10 | 2023-06-06 | 中南大学 | 基于随机采样的分布式噪音数据聚类方法及用户分类方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102572991A (zh) * | 2010-12-31 | 2012-07-11 | 中国人民解放军总参谋部第六十一研究所 | 一种基于信任控制的低功耗传输方法 |
CN105636053A (zh) * | 2016-02-04 | 2016-06-01 | 中国人民解放军装甲兵工程学院 | 一种面向WSN中Sybil攻击的检测方法 |
CN105959337A (zh) * | 2016-07-25 | 2016-09-21 | 电子科技大学 | 一种基于物理层信任度的Sybil节点识别方法 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7715396B2 (en) * | 2004-08-19 | 2010-05-11 | Microsoft Corporation | Network routing |
CN103297973B (zh) * | 2013-06-04 | 2016-09-07 | 河海大学常州校区 | 水下传感器网络中女巫入侵检测方法 |
US20150188941A1 (en) * | 2013-12-26 | 2015-07-02 | Telefonica Digital Espana, S.L.U. | Method and system for predicting victim users and detecting fake user accounts in online social networks |
-
2018
- 2018-07-24 CN CN201810815063.0A patent/CN109088862B/zh active Active
- 2018-07-24 CN CN202011490755.6A patent/CN112671739B/zh not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102572991A (zh) * | 2010-12-31 | 2012-07-11 | 中国人民解放军总参谋部第六十一研究所 | 一种基于信任控制的低功耗传输方法 |
CN105636053A (zh) * | 2016-02-04 | 2016-06-01 | 中国人民解放军装甲兵工程学院 | 一种面向WSN中Sybil攻击的检测方法 |
CN105959337A (zh) * | 2016-07-25 | 2016-09-21 | 电子科技大学 | 一种基于物理层信任度的Sybil节点识别方法 |
Non-Patent Citations (2)
Title |
---|
Defeating against sybil-attacks in peer-to-peer networks;Xu Xiang;《2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM》;20121231;第1218-1222页 * |
基于信任权重防御sybil攻击的模型;刘峰 等;《信息安全与通信保密》;20120310(第3期);第78-81页 * |
Also Published As
Publication number | Publication date |
---|---|
CN112671739B (zh) | 2023-04-18 |
CN112671739A (zh) | 2021-04-16 |
CN109088862A (zh) | 2018-12-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yazdinejad et al. | Federated learning for drone authentication | |
Rathore et al. | Semi-supervised learning based distributed attack detection framework for IoT | |
CN109088862B (zh) | 一种基于分布式系统的节点性质识别方法 | |
Li et al. | Design of multi-view based email classification for IoT systems via semi-supervised learning | |
US11977626B2 (en) | Securing machine learning models against adversarial samples through backdoor misclassification | |
Alghayadh et al. | A hybrid intrusion detection system for smart home security | |
Korba et al. | Zero-x: A blockchain-enabled open-set federated learning framework for zero-day attack detection in iov | |
Zainudin et al. | Blockchain-inspired collaborative cyber-attacks detection for securing metaverse | |
Ismail et al. | Towards a lightweight security framework using blockchain and machine learning | |
Prasad et al. | An enhanced detection system against routing attacks in mobile ad-hoc network | |
Anyanwu et al. | Real-time position falsification attack detection system for internet of vehicles | |
Torky et al. | Recognizing fake identities in online social networks based on a finite automaton approach | |
Arafah et al. | Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection | |
Kim et al. | A graph embedding-based identity inference attack on blockchain systems | |
Kouanou et al. | Machine learning for intrusion detection in ad-hoc networks: wormhole and blackhole attacks case | |
Choukri et al. | A novel deep learning-based framework for blackhole attack detection in unsecured RPL networks | |
Brittorameshkumar | OSS-RF: Intrusion detection using optimized sine swarm based random forest classifier on unsw-nb15 dataset | |
CN108810030B (zh) | 基于分布式系统的节点性质识别方法 | |
Erdol et al. | Low dimensional secure federated learning framework against poisoning attacks | |
Liu et al. | Network anomaly detection system with optimized DS evidence theory | |
Memarmoshrefi et al. | Social insect-based sybil attack detection in mobile ad-hoc networks | |
CN111712868B (zh) | 检索装置、检索方法、以及记录介质 | |
Collins et al. | Method of detecting bots on social media. A literature review | |
Hajj et al. | Cross-layer federated heterogeneous ensemble learning for lightweight IoT intrusion detection system | |
Gulia et al. | Comparative analysis to identify the effective machine learning method for prediction of DDOS attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240123 Address after: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province Patentee after: Dragon totem Technology (Hefei) Co.,Ltd. Country or region after: China Address before: School of information engineering, China University of metrology, no.258 Xueyuan street, Xiasha Higher Education Park, Jianggan District, Hangzhou City, Zhejiang Province, 310018 Patentee before: China Jiliang University Country or region before: China |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20250114 Address after: No. 1-1 Meishan Road, Shangtian Street, Fenghua District, Ningbo City, Zhejiang Province 315000 (self declared) Patentee after: Zhejiang Hongxi Intelligent Technology Co.,Ltd. Country or region after: China Address before: 230000 floor 1, building 2, phase I, e-commerce Park, Jinggang Road, Shushan Economic Development Zone, Hefei City, Anhui Province Patentee before: Dragon totem Technology (Hefei) Co.,Ltd. Country or region before: China |