WO2017107462A1 - 基于p2p网络的数据处理方法、装置及系统 - Google Patents

基于p2p网络的数据处理方法、装置及系统 Download PDF

Info

Publication number
WO2017107462A1
WO2017107462A1 PCT/CN2016/089464 CN2016089464W WO2017107462A1 WO 2017107462 A1 WO2017107462 A1 WO 2017107462A1 CN 2016089464 W CN2016089464 W CN 2016089464W WO 2017107462 A1 WO2017107462 A1 WO 2017107462A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
illegal
equal
network
information
Prior art date
Application number
PCT/CN2016/089464
Other languages
English (en)
French (fr)
Inventor
李卓
Original Assignee
乐视控股(北京)有限公司
乐视云计算有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 乐视控股(北京)有限公司, 乐视云计算有限公司 filed Critical 乐视控股(北京)有限公司
Priority to US15/246,568 priority Critical patent/US20170180467A1/en
Publication of WO2017107462A1 publication Critical patent/WO2017107462A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms

Definitions

  • the embodiments of the present invention relate to the field of information technologies, and in particular, to a data processing method, apparatus, and system based on a P2P network.
  • P2P technology has been widely used.
  • P2P is the abbreviation of English Peer-to-Peer (peer-to-peer), also known as “peer-to-peer”.
  • peer-to-peer also known as "peer-to-peer”.
  • Peer-to-Peer” technology is an emerging network technology that relies heavily on the computing power and bandwidth of participants in the network, rather than concentrating all dependencies on more expensive servers.
  • P2P is also an abbreviation for point-to-point. In other words, it also uploads to other nodes on the network at the same time as its own download. The more users participate in the P2P network, the more uploaders there are. The more uploaders, the smaller the chances of P2P terminals taking data to the server. Therefore, the existence of P2P not only greatly reduces the server pressure, but also achieves The more people there are, the faster the effect will be.
  • the embodiment of the invention provides a data processing method, device and system based on a P2P network, which are used to solve the problem that the sharing efficiency of the P2P network is affected due to the P2P node that maliciously sends false data and the network delay.
  • the present invention provides a data processing method based on a P2P network, including:
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, and the node information of the illegal P2P node is sent when the P2P node detects that there is an illegal P2P node, and the illegal
  • the P2P node is a P2P node that accumulates the number of false data sent to the P2P node that is greater than or equal to a preset threshold.
  • the illegal P2P node whose number of reports is greater than or equal to the preset threshold is removed from the P2P network.
  • the method further includes: after the illegitimate node that the number of reports is greater than or equal to the preset threshold is removed from the P2P network, the method further includes:
  • the prompt information is used to indicate that the illegal node whose number of reports is greater than or equal to the preset threshold has been removed from the P2P network.
  • An embodiment of the present invention provides another data processing method based on a P2P network, including:
  • the method further includes: before detecting that the data sent by the P2P node is false data, detecting whether the number of the false data sent by the P2P node is greater than or equal to a preset number threshold, the method further includes: :
  • the data sent by the P2P node is verified by using a preset CRC32 check algorithm to obtain a corresponding CRC32 value;
  • the data sent by the P2P node is determined to be false data.
  • the method further includes:
  • the prompt information is output, and the prompt information is used to prompt the P2P node to be an illegal P2P node.
  • An embodiment of the present invention provides a P2P server, including:
  • a receiving unit configured to receive node information of an illegal P2P node sent by a P2P node, where the node information of the illegal P2P node is sent when the P2P node detects that an illegal P2P node exists, and the illegal P2P node is accumulated to the P2P node.
  • a statistics unit configured to count, according to node information of the illegal P2P node, a number of reports corresponding to the illegal P2P node;
  • a detecting unit configured to detect whether there is an illegal P2P node whose number of reports is greater than or equal to a preset threshold
  • the culling unit is configured to: if the detecting unit detects that the number of the reported P2P nodes is greater than or equal to the preset threshold, the illegitimate P2P node whose number of reports is greater than or equal to the preset threshold is removed from the P2P network.
  • the P2P server further includes:
  • the output unit is configured to output prompt information, where the prompt information is used to prompt that the illegal node whose number of reports is greater than or equal to a preset threshold has been removed from the P2P network.
  • the embodiment of the invention provides a P2P node, which is characterized in that it comprises:
  • a detecting unit configured to: when it is determined that the data sent by the P2P node is false data, detecting whether the number of the false data that is sent by the P2P node is greater than or equal to a preset threshold;
  • a determining unit configured to determine that the P2P node is an illegal P2P node if the detecting unit detects that the number of the fake data is greater than or equal to the preset number threshold;
  • a disconnecting unit configured to disconnect from the illegal P2P node
  • a recording unit configured to record node information of the illegal P2P node, so that when the connection request sent by the illegal P2P node is received again, the connection is not performed with the illegal P2P node;
  • a sending unit configured to send node information of the illegal P2P node to a P2P server, where the P2P server receives node information of an illegal P2P node sent by the P2P node, so that the P2P server is configured according to node information of the illegal P2P node,
  • the number of reports corresponding to the illegal P2P nodes is counted and detected.
  • an illegal P2P node whose number of reports is greater than or equal to the preset threshold is detected, it is removed from the P2P network.
  • the P2P node further includes: a verification unit;
  • the verification unit is configured to verify the data sent by the P2P node by using a preset CRC32 check algorithm to obtain a corresponding CRC32 value;
  • the detecting unit is further configured to detect whether the CRC32 value matches a preset CRC32 value in a preset M3U8 file;
  • the determining unit is further configured to: if the detecting unit detects that the CRC32 value does not match the preset CRC32 value in the preset M3U8 file, then the data sent by the P2P node is confirmed Set as false data.
  • the P2P node further includes:
  • an output unit configured to output prompt information, where the prompt information is used to prompt the P2P node to be an illegal P2P node.
  • the embodiment of the invention provides a data processing system based on a P2P network, comprising: a P2P server and a P2P node;
  • the P2P node is configured to: when it is determined that the data sent by the P2P node is false data, detecting whether the number of the false data that is sent by the P2P node is greater than or equal to a preset threshold; if the false If the number of data is greater than or equal to the preset number threshold, determining that the P2P node is an illegal P2P node; disconnecting from the illegal P2P node and recording node information of the illegal P2P node, so as to receive again Not connecting to the illegal P2P node when the connection request sent by the illegal P2P node is sent; sending the node information of the illegal P2P node to the P2P server;
  • the P2P server is configured to receive node information of different illegal P2P nodes sent by different P2P nodes, and count the number of reports corresponding to different illegal P2P nodes according to the node information of the different illegal P2P nodes; and detect whether the number of reports is greater than or An illegal P2P node equal to a preset threshold; if yes, the illegal P2P node whose number of reports is greater than or equal to a preset threshold is removed from the P2P network.
  • An embodiment of the present invention provides a data processing apparatus based on a P2P network, where the apparatus includes:
  • a memory configured to store executable instructions of the processor
  • the processor is configured to:
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, and the node information of the illegal P2P node is sent when the P2P node detects that there is an illegal P2P node, and the illegal P2P node sends the false data to the P2P node cumulatively.
  • a P2P node whose number is greater than or equal to a preset threshold;
  • the illegal P2P node whose number of reports is greater than or equal to the preset threshold is removed from the P2P network.
  • An embodiment of the present invention provides a data processing apparatus based on a P2P network, where the apparatus includes:
  • a memory configured to store executable instructions of the processor
  • the processor is configured to:
  • the P2P server sends the node information of the illegal P2P node to the P2P server, where the P2P server receives the node information of the illegal P2P node sent by the P2P node, so that the P2P server collects the illegal P2P according to the node information of the illegal P2P node.
  • the number of reports corresponding to the node is detected and detected. When it is detected that there is an illegal P2P node whose number of reports is greater than or equal to the preset threshold, it is removed from the P2P network.
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node is detected by the P2P node.
  • the illegitimate P2P node sends the illegitimate P2P node
  • the illegitimate P2P node is the P2P node that sends the spoofed data to the P2P node and the number of the spoofed data is greater than or equal to the preset threshold.
  • the illegal P2P node whose reporting times are greater than or equal to the preset threshold is removed from the P2P network, and P2P nodes that maliciously send false data and some P2P nodes with poor uploading speed can be removed from the P2P network, thereby purifying
  • the purpose of the P2P network environment is to improve the sharing efficiency of the P2P network.
  • FIG. 1 is a schematic flowchart of a data processing method based on a P2P network according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another P2P network-based data processing method according to an embodiment of the present invention.
  • FIG. 3 is a flowchart of another data processing method based on a P2P network according to an embodiment of the present invention. schematic diagram;
  • FIG. 4 is a schematic structural diagram of a P2P server according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of another P2P server according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a P2P node according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of another P2P node according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of a data processing system based on a P2P network according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of an entity structure of a P2P server according to an embodiment of the present invention.
  • the embodiment of the invention provides a data processing method based on a P2P network, which can be applied to a P2P server. As shown in FIG. 1 , the method includes:
  • the P2P server receives node information of an illegal P2P node sent by the P2P node.
  • the node information of the illegal P2P node is sent when the P2P node detects that there is an illegal P2P node, and the node information may include a node name, an ID (Identity) number, and the like.
  • the illegal P2P node is a P2P node that accumulates the number of false data sent to the P2P node that is greater than or equal to a preset threshold.
  • the preset number threshold can be configured according to actual requirements.
  • the P2P server receives the node information of an illegal P2P node sent by the P2P node, according to the node information of the illegal P2P node, it can be determined that the illegal P2P node is the P2P node No. 4 in the current P2P network, and the number 4 is The number of reports corresponding to the P2P node is increased by one. In the same way, the number of reports corresponding to different illegal P2P nodes in the current P2P network can be counted.
  • the preset threshold may be configured according to actual requirements, or may be configured by default by the system, which is not limited in the embodiment of the present invention.
  • P2P nodes that maliciously send false data and some P2P nodes with poor upload speed can be implemented from the P2P network. Elimination, in order to achieve the purpose of purifying the P2P network environment.
  • the method may further include: outputting prompt information, where the prompt information is used to prompt that the illegal node whose number of reports is greater than or equal to a preset threshold has been removed from the P2P network.
  • the prompt information may be text prompt information, picture prompt information, audio prompt information, video prompt information, and the like. It should be noted that after the step 104 is executed, the P2P network maintenance personnel can clarify that some illegal nodes whose reporting times are greater than or equal to the preset threshold have been removed from the P2P network, which can enhance the user experience.
  • a P2P network-based data processing method is provided by the embodiment of the present invention.
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node is that the P2P node detects that there is an illegal P2P node.
  • the sent P2P node is a P2P node that accumulates the number of false data to be sent to the P2P node by a preset number of thresholds, and then counts the number of reports corresponding to the illegal P2P node by the P2P server, and reports the number of reports.
  • An illegal P2P node that is greater than or equal to the preset threshold is removed from the P2P network, and P2P nodes that maliciously send false data and P2P nodes with poor uploading speed can be removed from the P2P network, thereby purifying the P2P network environment.
  • the purpose is to improve the sharing efficiency of the P2P network.
  • An embodiment of the present invention provides another P2P network-based data processing method, which can be applied to a P2P node. As shown in FIG. 2, the method includes:
  • the fake data may be data that does not match the data that needs to be acquired, or data that is incomplete and has data loss.
  • the preset number threshold may be configured according to actual requirements, and used to check whether the P2P node is an illegal P2P node.
  • the node information may be a node name, an ID number, or the like.
  • the P2P server receives node information of different illegal P2P nodes sent by different P2P nodes, and further, so that the P2P server is configured according to the different illegal P2P nodes.
  • the point information is used to collect the number of reports corresponding to different illegal P2P nodes and detect them.
  • an illegal P2P node whose number of reports is greater than or equal to the preset threshold is detected, it is removed from the P2P network. In order to achieve the purpose of purifying the P2P network environment, the sharing efficiency of the P2P network can be improved.
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node detects that the P2P node exists in the P2P node.
  • the illegitimate P2P node sends the P2P node to the P2P node
  • the number of the false P2P nodes is greater than or equal to the preset number threshold
  • the P2P server collects the number of reports corresponding to the illegal P2P node, and reports the report.
  • An illegal P2P node whose number of times is greater than or equal to the preset threshold is removed from the P2P network, and the P2P node that maliciously sends false data and some P2P nodes with poor uploading speed can be removed from the P2P network, thereby purifying the P2P network environment.
  • the purpose of this can improve the sharing efficiency of P2P networks.
  • the embodiment of the present invention provides a data processing method based on a P2P network, which can be applied to a P2P node. As shown in FIG. 3, the method includes:
  • the preset M3U8 file may be an M3U file in a UTF-8 encoding format.
  • the preset CRC32 value may be a CRC32 value corresponding to the data that needs to be acquired locally. Specifically, the preset CRC32 value may be saved in a preset M3U8 file in advance so as to be called when a false data check is required on the data.
  • the fake data may be data with incomplete data, data loss, or data that does not match the data that needs to be acquired.
  • the preset number threshold can be configured according to actual requirements.
  • the method may further include: outputting prompt information, where the prompt information is used to prompt the P2P node to be an illegal P2P node.
  • the prompt information may be text prompt information, picture prompt information, audio prompt information, video prompt information, and the like. It should be noted that, after the step 305 is performed, by outputting the prompt information, the user can be made aware of the existence of an illegal P2P node, which is convenient for the user to perform post-processing, and can enhance the user experience.
  • the P2P server receives node information of different illegal P2P nodes sent by different P2P nodes. Further, the P2P server is configured to collect and report the number of reports corresponding to different illegal P2P nodes according to the node information of the different illegal P2P nodes, and detect that there are illegal P2P nodes whose reporting times are greater than or equal to a preset threshold. It is removed from the P2P network. In order to achieve the purpose of purifying the P2P network environment, the sharing efficiency of the P2P network can be improved.
  • a data processing method based on a P2P network receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node detects that the P2P node exists in the P2P node.
  • the illegitimate P2P node sends the P2P node to the P2P node
  • the number of the false P2P nodes is greater than or equal to the preset number threshold
  • the P2P server collects the number of reports corresponding to the illegal P2P node, and reports the report.
  • An illegal P2P node whose number of times is greater than or equal to the preset threshold is removed from the P2P network, and the P2P node that maliciously sends false data and some P2P nodes with poor uploading speed can be removed from the P2P network, thereby purifying the P2P network environment.
  • the purpose of this can improve the sharing efficiency of P2P networks.
  • the embodiment of the present invention provides a P2P server.
  • the P2P server includes: a receiving unit 41, a statistic unit 42, a detecting unit 43, and a culling unit. 44.
  • the receiving unit 41 may be configured to receive node information of an illegal P2P node sent by a P2P node, where the node information of the illegal P2P node is sent when the P2P node detects that an illegal P2P node exists, and the illegal P2P node is a
  • the P2P node that the P2P node cumulatively transmits the number of false data is greater than or equal to the preset number threshold.
  • the receiving unit 41 faces each P2P node.
  • the statistic unit 42 may be configured to count, according to the node information of the illegal P2P node received by the receiving unit 41, the number of reports corresponding to the illegal P2P node.
  • the statistic unit 32 is a main functional module for counting the number of reports of illegal P2P nodes corresponding to the P2P server.
  • the detecting unit 43 may be configured to detect whether there is an illegal P2P node whose number of reports is greater than or equal to a preset threshold.
  • the detecting unit 43 is a main functional module of the P2P node that detects whether there is an illegal P2P node whose reporting frequency is greater than or equal to a preset threshold.
  • the culling unit 44 may be configured to: if the detecting unit 43 detects that there is an illegal P2P node whose number of reports is greater than or equal to a preset threshold, then the illegal P2P node whose number of reports is greater than or equal to a preset threshold is from the P2P network. Excluded.
  • the culling unit 44 is a P2P server The main function of the illegal P2P node whose number of reports is greater than or equal to the preset threshold is removed from the P2P network, so as to achieve the purpose of purifying the P2P network environment.
  • a related function module can be implemented by a hardware processor.
  • the P2P server first receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node is sent when the P2P node detects that there is an illegal P2P node,
  • the illegal P2P node is a P2P node that accumulates the number of false data to the P2P node and is greater than or equal to the preset threshold. Then, the number of reports corresponding to the illegal P2P node is counted by the P2P server, and the number of reports is greater than or equal to the preset.
  • the threshold of the illegal P2P node is removed from the P2P network, which can remove some P2P nodes that maliciously send false data and some P2P nodes with poor upload speed from the P2P network, thereby purifying the P2P network environment, thereby improving P2P network sharing efficiency.
  • the P2P server further includes: an output unit 45.
  • the output unit 45 may be configured to output prompt information, where the prompt information is used to prompt that the illegal node whose number of reports is greater than or equal to a preset threshold has been removed from the P2P network.
  • an embodiment of the present invention provides a P2P node.
  • the P2P node includes: a detecting unit 61, a determining unit 62, a disconnecting unit 63, and a record.
  • the detecting unit 61 may be configured to: when it is determined that the data sent by the P2P node is the fake data, detect whether the number of the false data that is sent by the P2P node is greater than or equal to a preset threshold.
  • the detecting unit 61 is a main functional module of detecting whether an illegal P2P node exists in the P2P node.
  • the determining unit 62 may be configured to determine that the P2P node is an illegal P2P node if the detecting unit 61 detects that the number of false data is greater than or equal to the preset number threshold.
  • the disconnecting unit 63 can be configured to disconnect from the illegal P2P node.
  • the disconnecting unit 63 is a main functional module for controlling the connection between the P2P node and the illegal P2P node.
  • the recording unit 64 can be configured to record node information of the illegal P2P node.
  • the recording unit 64 is a main functional module for recording node information of an illegal P2P node in the P2P node.
  • the sending unit 65 may be configured to send node information of the illegal P2P node to a P2P server, where the P2P server receives node information of an illegal P2P node sent by the P2P node.
  • the transmitting unit 65 faces the P2P server.
  • the P2P server is configured to collect and report the number of reports corresponding to the illegal P2P node according to the node information of the illegal P2P node, and when detecting that there is an illegal P2P node whose number of reports is greater than or equal to a preset threshold, It is removed from the P2P network.
  • a related function module can be implemented by a hardware processor.
  • a P2P node is provided by the embodiment of the present invention.
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node is sent when the P2P node detects that an illegal P2P node exists.
  • the illegal P2P node is a P2P node that accumulates the number of false data to the P2P node and is greater than or equal to the preset threshold. Then, the number of reports corresponding to the illegal P2P node is counted by the P2P server, and the number of reports is greater than or equal to the preset.
  • the threshold of the illegal P2P node is removed from the P2P network, which can remove some P2P nodes that maliciously send false data and some P2P nodes with poor upload speed from the P2P network, thereby purifying the P2P network environment, thereby improving P2P network sharing efficiency.
  • an embodiment of the present invention provides another P2P node.
  • the P2P node includes: a detecting unit 71, a determining unit 72, and a disconnecting unit 73. Recording unit 74 and transmitting unit 75.
  • the detecting unit 71 may be configured to: when it is determined that the data sent by the P2P node is false data, detect whether the number of the false data that is sent by the P2P node is greater than or equal to a preset threshold.
  • the detecting unit 71 is a main functional module of detecting whether an illegal P2P node exists in the P2P node.
  • the determining unit 72 may be configured to determine that the P2P node is an illegal P2P node if the detecting unit 71 detects that the number of the fake data is greater than or equal to the preset number threshold.
  • the disconnecting unit 73 can be configured to disconnect from the illegal P2P node.
  • the disconnecting unit 73 is a main functional module for controlling the connection between the P2P node and the illegal P2P node.
  • the recording unit 74 can be configured to record node information of the illegal P2P node.
  • the recording unit 74 is a main functional module for recording node information of an illegal P2P node in the P2P node.
  • the sending unit 75 may be configured to send node information of the illegal P2P node to a P2P server, where the P2P server receives node information of an illegal P2P node sent by the P2P node.
  • the transmitting unit 75 is directed to a P2P server.
  • the P2P server is configured to collect and report the number of reports corresponding to the illegal P2P node according to the node information of the illegal P2P node, and when detecting that there is an illegal P2P node whose number of reports is greater than or equal to a preset threshold, It is removed from the P2P network.
  • the P2P node further includes: a verification unit 76.
  • the verification unit 76 may be configured to verify the data sent by the P2P node by using a preset CRC32 check algorithm to obtain a corresponding CRC32 value.
  • the detecting unit 71 is further configured to detect whether the CRC32 value matches a preset CRC32 value in the preset M3U8 file.
  • the determining unit 72 may be further configured to: if the detecting unit 71 detects that the CRC32 value does not match the preset CRC32 value in the preset M3U8 file, determine the data sent by the P2P node as false. data.
  • the P2P node further includes: an output unit 77.
  • the output unit 77 may be configured to output prompt information, where the prompt information is used to prompt the P2P node to be an illegal P2P node.
  • a related function module can be implemented by a hardware processor.
  • the P2P server first receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node is sent when the P2P node detects that there is an illegal P2P node.
  • the illegal P2P node is a P2P node that accumulates the number of false data to be sent to the P2P node and is greater than or equal to a preset threshold. Then, the number of reports corresponding to the illegal P2P node is counted by the P2P server, and the number of reports is greater than or equal to the pre-report.
  • the illegal P2P node with the threshold value is removed from the P2P network, and the P2P node that maliciously sends the fake data and the P2P node with the bad uploading speed can be removed from the P2P network, thereby purifying the P2P network environment. Improve the sharing efficiency of P2P networks.
  • the embodiment of the present invention provides a data processing system based on a P2P network, including: a P2P server 81 and a P2P node 82.
  • the P2P node 82 may be configured to: when it is determined that the data sent by the P2P node is false data, detecting whether the number of the false data that is sent by the P2P node is greater than or equal to a preset threshold; Determining that the P2P node is an illegal P2P node; the node is disconnected from the illegal P2P node and records node information of the illegal P2P node, so that when the number of the false data is greater than or equal to the preset number threshold, When receiving the connection request sent by the illegal P2P node again, the connection is not performed with the illegal P2P node; and the node information of the illegal P2P node is sent to the P2P server 81.
  • the P2P server 81 is configured to receive different node information of different illegal P2P nodes sent by the P2P node 81, and count the number of reports corresponding to different illegal P2P nodes according to the node information of the different illegal P2P nodes; An illegal P2P node whose number of reports is greater than or equal to a preset threshold; if yes, the number of reports is greater than or equal to a preset threshold The P2P node is removed from the P2P network.
  • FIG. 9 is a schematic diagram showing the physical structure of a P2P server according to an embodiment of the present invention.
  • the P2P server may include a processor 91 and a communications interface (92).
  • Communication interface 92 can be used for information transfer between the server and the client.
  • the processor 91 may call the logic instruction in the memory 93 to perform the following method: the P2P server receives the node information of the illegal P2P node sent by the P2P node, and the node information of the illegal P2P node is sent when the P2P node detects the presence of the illegal P2P node.
  • the illegal P2P node is a P2P node that accumulates the number of false data to be sent to the P2P node by a preset number of thresholds; and according to the node information of the illegal P2P node, reports the corresponding reports of the illegal P2P nodes respectively.
  • the number of times of detection whether there is an illegal P2P node whose number of reports is greater than or equal to a preset threshold; if yes, the illegal P2P node whose number of reports is greater than or equal to a preset threshold is removed from the P2P network.
  • the logic instructions in the memory 93 described above may be implemented in the form of a software functional unit and sold or used as a stand-alone product, and may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like.
  • a P2P network-based data processing system is provided by the embodiment of the present invention.
  • the P2P server receives the node information of the illegal P2P node sent by the P2P node, where the node information of the illegal P2P node is that the P2P node detects that there is an illegal P2P node.
  • the sent P2P node is a P2P node that accumulates the number of false data to be sent to the P2P node by a preset number of thresholds, and then counts the number of reports corresponding to the illegal P2P node by the P2P server, and reports the number of reports.
  • An illegal P2P node that is greater than or equal to the preset threshold is removed from the P2P network, and P2P nodes that maliciously send false data and P2P nodes with poor uploading speed can be removed from the P2P network, thereby purifying the P2P network environment.
  • the purpose is to improve the sharing efficiency of the P2P network.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to implement the embodiment. The purpose of the program. Those of ordinary skill in the art can understand and implement without deliberate labor.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明提供的一种基于P2P网络的数据处理方法、装置及系统,涉及信息技术领域,可以实现净化P2P网络环境的目的,可以提高P2P网络的分享效率。所述方法包括:首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;然后根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;最后检测是否存在举报次数大于或等于预设阈值的非法P2P节点;若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。

Description

基于P2P网络的数据处理方法、装置及系统
本申请基于申请号为2015109697453、申请日为2015年12月21日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本发明实施例涉及信息技术领域,尤其涉及一种基于P2P网络的数据处理方法、装置及系统。
背景技术
近些年来,随着信息技术的不断发展,P2P技术得到了广泛的应用,P2P是英文Peer-to-Peer(对等)的简称,又被称为“点对点”。“对等”技术是一种新兴的网络技术,主要依赖于网络中参与者的计算能力和带宽,而并非把所有依赖都聚集在成本较为昂贵的服务器上去。P2P亦是point-to-point(点对点)的简称。也就是说它自己的下载的同时,也要上载给网络上的其他节点。参与P2P网路的用户越多,相应的上载者就越多,上载者数量越多,P2P终端到服务器上取数据的机会也就越小,所以P2P的存在不但使服务器压力大大减少,更达到了人数越多速度就越快的效果。
目前,在P2P网络中节点与节点之间进行数据交互时,有时其中的一个P2P节点在获取得到另外一个P2P节点的节点信息之后,会与其进行恶意链接,并向其发送虚假数据;或者由于网络延迟等原因,会导致数据交互的不完整,进而会造成一方节点误认为另一方节点发送的是虚假数据。无论以上哪种方式都会占用P2P节点连接资源,进而会影响P2P网络的分享效率。
发明内容
本发明实施例提供了一种基于P2P网络的数据处理方法、装置及系统,用以解决目前由于存在恶意发送虚假数据的P2P节点、网络延迟等原因会导致影响P2P网络的分享效率的问题。
针对现有技术存在的问题,本发明实施例提供了一种基于P2P网络的数据处理方法,包括:
P2P服务器接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法 P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;
根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;
检测是否存在举报次数大于或等于预设阈值的非法P2P节点;
若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
进一步地,所述若存在,则将所述举报次数大于或等于预设阈值的非法节点从P2P网络中剔除之后,所述方法还包括:
输出提示信息,所述提示信息用于提示所述举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除。
本发明实施例提供了另一种基于P2P网络的数据处理方法,包括:
当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;
若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;
与所述非法P2P节点断开连接并记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;
向P2P服务器发送所述非法P2P节点的节点信息,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
进一步地,所述当检测出接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点发送的虚假数据的个数是否大于或等于预置个数阈值之前,所述方法还包括:
通过预置CRC32校验算法,将所述P2P节点发送的数据进行验证,得到对应的CRC32值;
检测所述CRC32值是否与预置M3U8文件中的预置CRC32值匹配;
若不匹配,则将所述P2P节点发送的数据确定为虚假数据。
进一步地,所述若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点之后,所述方法还包括:
输出提示信息,所述提示信息用于提示所述P2P节点为非法P2P节点。
本发明实施例提供了一种P2P服务器,包括:
接收单元,用于接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;
统计单元,用于根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;
检测单元,用于检测是否存在举报次数大于或等于预设阈值的非法P2P节点;
剔除单元,用于若所述检测单元检测出存在举报次数大于或等于预设阈值的非法P2P节点,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
优选地,所述P2P服务器还包括:
输出单元,用于输出提示信息,所述提示信息用于提示所述举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除。
本发明实施例提供了一种P2P节点,其特征在于,包括:
检测单元,用于当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;
确定单元,用于若所述检测单元检测出虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;
断开单元,用于与所述非法P2P节点断开连接;
记录单元,用于记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;
发送单元,用于向P2P服务器发送所述非法P2P节点的节点信息,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
优选地,所述P2P节点还包括:验证单元;
所述验证单元,用于通过预置CRC32校验算法,将所述P2P节点发送的数据进行验证,得到对应的CRC32值;
所述检测单元,还用于检测所述CRC32值是否与预置M3U8文件中的预置CRC32值匹配;
所述确定单元,还用于若所述检测单元检测出所述CRC32值与所述预置M3U8文件中的预置CRC32值不匹配,则将所述P2P节点发送的数据确 定为虚假数据。
优选地,所述P2P节点还包括:
输出单元,用于输出提示信息,所述提示信息用于提示所述P2P节点为非法P2P节点。
本发明实施例提供了一种基于P2P网络的数据处理系统,包括:P2P服务器和P2P节点;
所述P2P节点,用于当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;与所述非法P2P节点断开连接并记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;向所述P2P服务器发送所述非法P2P节点的节点信息;
所述P2P服务器,用于接收不同P2P节点发送的不同非法P2P节点的节点信息;根据所述不同非法P2P节点的节点信息,统计不同非法P2P节点分别对应的举报次数;检测是否存在举报次数大于或等于预设阈值的非法P2P节点;若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
本发明实施例提供了一种基于P2P网络的数据处理装置,所述装置包括:
处理器,和
存储器,被配置为存储所述处理器的可执行指令;
所述的处理器被配置为:
P2P服务器接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;
根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;
检测是否存在举报次数大于或等于预设阈值的非法P2P节点;
若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
本发明实施例提供了一种基于P2P网络的数据处理装置,所述装置包括:
处理器,和
存储器,被配置为存储所述处理器的可执行指令;
所述的处理器被配置为:
当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;
若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;
与所述非法P2P节点断开连接并记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;
向P2P服务器发送所述非法P2P节点的节点信息,其中,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
本发明实施例提供的一种基于P2P网络的数据处理方法、装置及系统,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例提供的一种基于P2P网络的数据处理方法流程示意图;
图2为本发明实施例提供的另一种基于P2P网络的数据处理方法流程示意图;
图3为本发明实施例提供的又一种基于P2P网络的数据处理方法流程 示意图;
图4为本发明实施例提供的一种P2P服务器结构示意图;
图5为本发明实施例提供的另一种P2P服务器结构示意图;
图6为本发明实施例提供的一种P2P节点结构示意图;
图7为本发明实施例提供的另一种P2P节点结构示意图;
图8为本发明实施例提供的一种基于P2P网络的数据处理系统结构示意图;
图9为本发明实施例提供的一种P2P服务器的实体结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明实施例提供了一种基于P2P网络的数据处理方法,可以应用于P2P服务器,如图1所示,所述方法包括:
101、P2P服务器接收P2P节点发送的非法P2P节点的节点信息。
其中,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述节点信息中可以包含节点名称、ID(Identity,身份标识号码)号等。所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点。所述预置个数阈值可以根据实际需求进行配置。
102、根据非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数。
例如,当P2P服务器接收到一个P2P节点发送的一个非法P2P节点的节点信息时,根据该非法P2P节点的节点信息,可以确定该非法P2P节点为当前P2P网络中的4号P2P节点,将4号P2P节点对应的举报次数累计加1,利用相同的方式最终可以统计得到当前P2P网络中不同非法P2P节点分别对应的举报次数。
103、检测是否存在举报次数大于或等于预设阈值的非法P2P节点。
其中,所述预设阈值可以根据实际需求进行配置,也可以由系统默认进行配置,本发明实施例不做限定。
104、若存在举报次数大于或等于预设阈值的非法P2P节点,则将其从P2P网络中剔除。
对于本发明实施例,通过将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的。
进一步地,在执行步骤104之后,所述方法还可以包括:输出提示信息,所述提示信息用于提示所述举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除。所述提示信息可以为文本提示信息、图片提示信息、音频提示信息、视频提示信息等。需要说明的是,在执行步骤104之后,通过输出提示信息,可以使P2P网络维护人员明确一些举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除,可以增强用户的体验。
本发明实施例提供的一种基于P2P网络的数据处理方法,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
本发明实施例提供了另一种基于P2P网络的数据处理方法,可以应用于P2P节点,如图2所示,所述方法包括:
201、当确定接收到P2P节点发送的数据为虚假数据时,检测接收到该P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值。
其中,所述虚假数据可以为与需要获取的数据不匹配的数据,也可以为数据不完整、存在数据丢失的数据。所述预置个数阈值可以根据实际需求进行配置,用于校验P2P节点是否为非法P2P节点。
202、若虚假数据的个数大于或等于预置个数阈值,则确定P2P节点为非法P2P节点。
203、与非法P2P节点断开连接并记录非法P2P节点的节点信息。
进一步地,以便于当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接,进而可以避免出现占用其他节点连接资源的情况。其中,所述节点信息可以为节点名称、ID号等。
204、向P2P服务器发送非法P2P节点的节点信息。
其中,所述P2P服务器接收不同P2P节点发送的不同非法P2P节点的节点信息,进一步地,以使得所述P2P服务器根据所述不同非法P2P节点的节 点信息,统计不同非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。以便达到净化P2P网络环境的目的,可以提高P2P网络的分享效率。
本发明实施例提供的另一种基于P2P网络的数据处理方法,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
本发明实施例提供了又一种基于P2P网络的数据处理方法,可以应用于P2P节点,如图3所示,所述方法包括:
301、通过预置CRC32校验算法,将P2P节点发送的数据进行验证,得到对应的CRC32值。
302、检测CRC32值是否与预置M3U8文件中的预置CRC32值匹配。
其中,所述预置M3U8文件可以为UTF-8编码格式的M3U文件。所述预置CRC32值可以为本地需要获取的数据对应的CRC32值。具体地,可以预先将所述预置CRC32值保存在预置M3U8文件中,以便当需要对数据进行虚假数据校验时进行调用。
303、若CRC32值与预置M3U8文件中的预置CRC32值不匹配,则将P2P节点发送的数据确定为虚假数据。
304、检测接收到P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值。
其中,所述虚假数据可以为数据不完整、存在数据丢失的数据,也可以为与需要获取的数据不匹配的数据。所述预置个数阈值可以根据实际需求进行配置。
305、若虚假数据的个数大于或等于预置个数阈值,则确定P2P节点为非法P2P节点。
进一步地,在执行所述步骤305之后,还可以包括:输出提示信息,所述提示信息用于提示所述P2P节点为非法P2P节点。其中,所述提示信息可以为文本提示信息、图片提示信息、音频提示信息、视频提示信息等。需要说明的是,在执行步骤305之后,通过输出提示信息,可以使用户了解存在非法P2P节点,方便用户进行后期处理,可以增强用户的体验。
306、与非法P2P节点断开连接并记录非法P2P节点的节点信息。
进一步地,以便于当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接,进而可以避免出现占用其他节点连接资源的情况。
307、向P2P服务器发送非法P2P节点的节点信息。
其中,所述P2P服务器接收不同P2P节点发送的不同非法P2P节点的节点信息。进一步地,以使得所述P2P服务器根据所述不同非法P2P节点的节点信息,统计不同非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。以便达到净化P2P网络环境的目的,可以提高P2P网络的分享效率。
本发明实施例提供的又一种基于P2P网络的数据处理方法,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
进一步地,作为图1所述方法的具体实现,本发明实施例提供了一种P2P服务器,如图4所示,所述P2P服务器包括:接收单元41、统计单元42、检测单元43、剔除单元44。
所述接收单元41,可以用于接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点。所述接收单元41面向各个P2P节点。
所述统计单元42,可以用于根据所述接收单元41接收的非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数。所述统计单元32为本P2P服务器中统计非法P2P节点对应举报次数的主要功能模块。
所述检测单元43,可以用于检测是否存在举报次数大于或等于预设阈值的非法P2P节点。所述检测单元43为本P2P服务器中检测是否存在举报次数大于或等于预设阈值的非法P2P节点的主要功能模块。
所述剔除单元44,可以用于若所述检测单元43检测出存在举报次数大于或等于预设阈值的非法P2P节点,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。所述剔除单元44为本P2P服务器中将 举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除的主要功能,以便实现净化P2P网络环境的目的。
需要说明的是,本发明实施例提供的一种P2P服务器所涉及各功能单元的其他相应描述,可以参考图1中的对应描述,在此不再赘述。本发明实施例中可以通过硬件处理器(hardware processor)来实现相关功能模块。
本发明实施例提供的一种P2P服务器,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
具体地,本发明实施例提供的另一种P2P服务器,如图5所示,所述P2P服务器还包括:输出单元45。
所述输出单元45,可以用于输出提示信息,所述提示信息用于提示所述举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除。
进一步地,作为图2所述方法的具体实现,本发明实施例提供了一种P2P节点,如图6所示,所述P2P节点包括:检测单元61、确定单元62、断开单元63、记录单元64、发送单元65。
所述检测单元61,可以用于当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值。所述检测单元61为本P2P节点中检测是否存在非法P2P节点的主要功能模块。
所述确定单元62,可以用于若所述检测单元61检测出虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点。
所述断开单元63,可以用于与所述非法P2P节点断开连接。所述断开单元63为本P2P节点中控制与非法P2P节点之间连接的主要功能模块。
所述记录单元64,可以用于记录所述非法P2P节点的节点信息。所述记录单元64为本P2P节点中记录非法P2P节点的节点信息的主要功能模块。
进一步地,以便于当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接。
所述发送单元65,可以用于向P2P服务器发送所述非法P2P节点的节点信息,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息。所述发送单元65面向P2P服务器。
进一步地,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
需要说明的是,本发明实施例提供的一种P2P节点所涉及各功能单元的其他相应描述,可以参考图2中的对应描述,在此不再赘述。本发明实施例中可以通过硬件处理器来实现相关功能模块。
本发明实施例提供的一种P2P节点,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
进一步地,作为图3所述方法的具体实现,本发明实施例提供了另一种P2P节点,如图7所示,所述P2P节点包括:检测单元71、确定单元72、断开单元73、记录单元74、发送单元75。
所述检测单元71,可以用于当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值。所述检测单元71为本P2P节点中检测是否存在非法P2P节点的主要功能模块。
所述确定单元72,可以用于若所述检测单元71检测出虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点。
所述断开单元73,可以用于与所述非法P2P节点断开连接。所述断开单元73为本P2P节点中控制与非法P2P节点之间连接的主要功能模块。
所述记录单元74,可以用于记录所述非法P2P节点的节点信息。所述记录单元74为本P2P节点中记录非法P2P节点的节点信息的主要功能模块。
进一步地,以便于当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接。
所述发送单元75,可以用于向P2P服务器发送所述非法P2P节点的节点信息,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息。所述发送单元75面向P2P服务器。
进一步地,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
进一步地,所述P2P节点还包括:验证单元76。
所述验证单元76,可以用于通过预置CRC32校验算法,将所述P2P节点发送的数据进行验证,得到对应的CRC32值。
所述检测单元71,还可以用于检测所述CRC32值是否与预置M3U8文件中的预置CRC32值匹配。
所述确定单元72,还可以用于若所述检测单元71检测出所述CRC32值与所述预置M3U8文件中的预置CRC32值不匹配,则将所述P2P节点发送的数据确定为虚假数据。
进一步地,所述P2P节点还包括:输出单元77。
所述输出单元77,可以用于输出提示信息,所述提示信息用于提示所述P2P节点为非法P2P节点。
需要说明的是,本发明实施例提供的另一种P2P节点所涉及各功能单元的其他相应描述,可以参考图3中的对应描述,在此不再赘述。本发明实施例中可以通过硬件处理器来实现相关功能模块。
本发明实施例提供的另一种P2P节点,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
进一步地,本发明实施例提供了一种基于P2P网络的数据处理系统,包括:P2P服务器81和P2P节点82。
所述P2P节点82,可以用于当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;与所述非法P2P节点断开连接并记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;向所述P2P服务器81发送所述非法P2P节点的节点信息。
所述P2P服务器81,用于接收不同的所述P2P节点81发送的不同非法P2P节点的节点信息;根据所述不同非法P2P节点的节点信息,统计不同非法P2P节点分别对应的举报次数;检测是否存在举报次数大于或等于预设阈值的非法P2P节点;若存在,则将所述举报次数大于或等于预设阈值的非法 P2P节点从P2P网络中剔除。
示例性的,如图9所示,图9示出了本发明实施例提供的一种P2P服务器的实体结构示意图,该P2P服务器可以包括:处理器(processor)91、通信接口(Communications Interface)92、存储器(memory)93和总线94,其中,处理器91、通信接口92、存储器93通过总线94完成相互间的通信。通信接口92可以用于服务器与客户端之间的信息传输。处理器91可以调用存储器93中的逻辑指令,以执行如下方法:P2P服务器接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;检测是否存在举报次数大于或等于预设阈值的非法P2P节点;若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。此外,上述的存储器93中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
本发明实施例提供的一种基于P2P网络的数据处理系统,首先P2P服务器接收P2P节点发送的非法P2P节点的节点信息,其中所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点,然后通过P2P服务器统计非法P2P节点分别对应的举报次数,将举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除,可以实现将一些恶意发送虚假数据的P2P节点以及一些上传速度不好的P2P节点从P2P网络中剔除,进而可以实现净化P2P网络环境的目的,从而可以提高P2P网络的分享效率。
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例 方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。
最后应说明的是:以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims (13)

  1. 一种基于P2P网络的数据处理方法,其特征在于,包括:
    P2P服务器接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;
    根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;
    检测是否存在举报次数大于或等于预设阈值的非法P2P节点;
    若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
  2. 根据权利要求1所述的基于P2P网络的数据处理方法,其特征在于,所述若存在,则将所述举报次数大于或等于预设阈值的非法节点从P2P网络中剔除之后,所述方法还包括:
    输出提示信息,所述提示信息用于提示所述举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除。
  3. 一种基于P2P网络的数据处理方法,其特征在于,包括:
    当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;
    若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;
    与所述非法P2P节点断开连接并记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;
    向P2P服务器发送所述非法P2P节点的节点信息,其中,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
  4. 根据权利要求3所述的基于P2P网络的数据处理方法,其特征在于,所述当检测出接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点发送的虚假数据的个数是否大于或等于预置个数阈值之前,所述方法还包括:
    通过预置CRC32校验算法,将所述P2P节点发送的数据进行验证,得到 对应的CRC32值;
    检测所述CRC32值是否与预置M3U8文件中的预置CRC32值匹配;
    若不匹配,则将所述P2P节点发送的数据确定为虚假数据。
  5. 根据权利要求3所述的基于P2P网络的数据处理方法,其特征在于,所述若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点之后,所述方法还包括:
    输出提示信息,所述提示信息用于提示所述P2P节点为非法P2P节点。
  6. 一种P2P服务器,其特征在于,包括:
    接收单元,用于接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;
    统计单元,用于根据所述接收单元接收的非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;
    检测单元,用于检测是否存在举报次数大于或等于预设阈值的非法P2P节点;
    剔除单元,用于若所述检测单元检测出存在举报次数大于或等于预设阈值的非法P2P节点,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
  7. 根据权利要求6所述的P2P服务器,其特征在于,所述P2P服务器还包括:
    输出单元,用于输出提示信息,所述提示信息用于提示所述举报次数大于或等于预设阈值的非法节点已从P2P网络中剔除。
  8. 一种P2P节点,其特征在于,包括:
    检测单元,用于当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;
    确定单元,用于若所述检测单元检测出虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;
    断开单元,用于与所述非法P2P节点断开连接;
    记录单元,用于记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;
    发送单元,用于向P2P服务器发送所述非法P2P节点的节点信息,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举 报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
  9. 根据权利要求8所述的P2P节点,其特征在于,所述P2P节点还包括:验证单元;
    所述验证单元,用于通过预置CRC32校验算法,将所述P2P节点发送的数据进行验证,得到对应的CRC32值;
    所述检测单元,还用于检测所述CRC32值是否与预置M3U8文件中的预置CRC32值匹配;
    所述确定单元,还用于若所述检测单元检测出所述CRC32值与所述预置M3U8文件中的预置CRC32值不匹配,则将所述P2P节点发送的数据确定为虚假数据。
  10. 根据权利要求9所述的P2P节点,其特征在于,所述P2P节点还包括:
    输出单元,用于输出提示信息,所述提示信息用于提示所述P2P节点为非法P2P节点。
  11. 一种基于P2P网络的数据处理系统,其特征在于,包括:权利要求6-7任一项所述的P2P服务器和权利要求8-10任一项所述的P2P节点。
  12. 一种基于P2P网络的数据处理装置,其特征在于,所述装置包括:
    处理器,和
    存储器,被配置为存储所述处理器的可执行指令;
    所述的处理器被配置为:
    P2P服务器接收P2P节点发送的非法P2P节点的节点信息,所述非法P2P节点的节点信息为P2P节点检测出存在非法P2P节点时发送的,所述非法P2P节点为向所述P2P节点累计发送虚假数据的个数大于或等于预置个数阈值的P2P节点;
    根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数;
    检测是否存在举报次数大于或等于预设阈值的非法P2P节点;
    若存在,则将所述举报次数大于或等于预设阈值的非法P2P节点从P2P网络中剔除。
  13. 一种基于P2P网络的数据处理装置,其特征在于,所述装置包括:
    处理器,和
    存储器,被配置为存储所述处理器的可执行指令;
    所述的处理器被配置为:
    当确定接收到P2P节点发送的数据为虚假数据时,检测接收到所述 P2P节点累计发送的虚假数据的个数是否大于或等于预置个数阈值;
    若所述虚假数据的个数大于或等于所述预置个数阈值,则确定所述P2P节点为非法P2P节点;
    与所述非法P2P节点断开连接并记录所述非法P2P节点的节点信息,以便当再次接收到所述非法P2P节点发送的连接请求时,不与所述非法P2P节点进行连接;
    向P2P服务器发送所述非法P2P节点的节点信息,其中,所述P2P服务器接收P2P节点发送的非法P2P节点的节点信息,以使得所述P2P服务器根据所述非法P2P节点的节点信息,统计非法P2P节点分别对应的举报次数并进行检测,当检测出存在举报次数大于或等于预设阈值的非法P2P节点时将其从P2P网络中剔除。
PCT/CN2016/089464 2015-12-21 2016-07-08 基于p2p网络的数据处理方法、装置及系统 WO2017107462A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/246,568 US20170180467A1 (en) 2015-12-21 2016-08-25 Method, Device and System for Data Processing based on P2P Network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510969745.3 2015-12-21
CN201510969745.3A CN105872003A (zh) 2015-12-21 2015-12-21 基于p2p网络的数据处理方法、装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/246,568 Continuation US20170180467A1 (en) 2015-12-21 2016-08-25 Method, Device and System for Data Processing based on P2P Network

Publications (1)

Publication Number Publication Date
WO2017107462A1 true WO2017107462A1 (zh) 2017-06-29

Family

ID=56624435

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/089464 WO2017107462A1 (zh) 2015-12-21 2016-07-08 基于p2p网络的数据处理方法、装置及系统

Country Status (2)

Country Link
CN (1) CN105872003A (zh)
WO (1) WO2017107462A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120609B (zh) * 2018-08-02 2021-01-29 西安创业天下网络科技有限公司 基于区块链的社交信息举报方法和装置
CN109347763B (zh) * 2018-09-11 2021-11-05 北京邮电大学 一种基于数据队列长度的数据调度方法、装置及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282366A (zh) * 2008-05-21 2008-10-08 北京中企开源信息技术有限公司 点对点网络中的数据传输处理方法及装置
CN101599996A (zh) * 2009-07-09 2009-12-09 成都市华为赛门铁克科技有限公司 一种对等网节点连接的方法、装置和系统
CN102231761A (zh) * 2011-08-12 2011-11-02 乐视网信息技术(北京)股份有限公司 一种p2p数据交互方法
CN105049463A (zh) * 2014-04-24 2015-11-11 卡西欧计算机株式会社 分散数据库、数据共享方法、用于分散数据库的装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624884B (zh) * 2012-02-29 2016-02-17 上海聚力传媒技术有限公司 一种用于接收p2p资源的方法、装置和设备
CN103023928A (zh) * 2013-01-11 2013-04-03 乐视网信息技术(北京)股份有限公司 一种p2p节点匹配系统及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282366A (zh) * 2008-05-21 2008-10-08 北京中企开源信息技术有限公司 点对点网络中的数据传输处理方法及装置
CN101599996A (zh) * 2009-07-09 2009-12-09 成都市华为赛门铁克科技有限公司 一种对等网节点连接的方法、装置和系统
CN102231761A (zh) * 2011-08-12 2011-11-02 乐视网信息技术(北京)股份有限公司 一种p2p数据交互方法
CN105049463A (zh) * 2014-04-24 2015-11-11 卡西欧计算机株式会社 分散数据库、数据共享方法、用于分散数据库的装置

Also Published As

Publication number Publication date
CN105872003A (zh) 2016-08-17

Similar Documents

Publication Publication Date Title
US11122067B2 (en) Methods for detecting and mitigating malicious network behavior and devices thereof
CN109194680B (zh) 一种网络攻击识别方法、装置及设备
JP6686033B2 (ja) メッセージをプッシュするための方法および装置
KR20200033092A (ko) 엣지 컴퓨팅 기반 네트워크 모니터링 방법, 장치 및 시스템
WO2018121331A1 (zh) 攻击请求的确定方法、装置及服务器
WO2020052110A1 (zh) 业务质量监控方法、装置及系统
JP7388613B2 (ja) パケット処理方法及び装置、デバイス、並びに、コンピュータ可読ストレージ媒体
CN111381962B (zh) 一种边缘服务迁移方法及装置
WO2016086755A1 (zh) 一种报文处理的方法和透明代理服务器
WO2017107462A1 (zh) 基于p2p网络的数据处理方法、装置及系统
CN114867025A (zh) 一种防止短信轰炸方法及装置
CN101980477B (zh) 检测影子用户的数目的方法和装置及网络设备
CN114143071A (zh) 一种暴力破解检测方法、装置、电子设备及存储介质
WO2021174879A1 (zh) Ai视频通话质量分析方法、装置、计算机设备及存储介质
WO2016037489A1 (zh) Rcs垃圾消息的监控方法、装置及系统
US10158486B1 (en) Synchronization of key management services with cloud services
WO2024087692A1 (zh) 设备管理方法、设备、系统和存储介质
WO2017076325A1 (zh) 码流播出的方法及装置
CN115361455B (zh) 一种数据传输存储方法、装置以及计算机设备
Cuadra‐Sanchez et al. A novel blind traffic analysis technique for detection of WhatsApp VoIP calls
CN106937350B (zh) 基于移动终端的路由方法及系统
CN115037537A (zh) 异常流量拦截、异常域名识别方法、装置、设备及介质
CN107819739B (zh) 一种确定终端是否存在长链路连接的方法及服务器
CN115037528B (zh) 一种异常流量检测方法及装置
CN109639528A (zh) 一种日志接收性能的测试方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16877274

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16877274

Country of ref document: EP

Kind code of ref document: A1