| 注册
首页|期刊导航|高技术通讯|DHT系统的安全性优化方法研究

DHT系统的安全性优化方法研究

史建焘 夏清泉 张兆心

高技术通讯2016,Vol.26Issue(12):935-943,9.
高技术通讯2016,Vol.26Issue(12):935-943,9.DOI:10.3772/j.issn.1002-0470.2016.12.002

DHT系统的安全性优化方法研究

Study on the security optimization of DHT systems

史建焘 1夏清泉 1张兆心1

作者信息

  • 1. 哈尔滨工业大学计算机科学与技术学院 哈尔滨150001
  • 折叠

摘要

Abstract

The security vulnerability of distributed Hash table (DHT) systems was studied,a variety of security optimization strategies were proposed,and a prototyhpe system was designed.Real world network experiments were performed,and the resuhs show that existing DHT networks are vulnerable to index poisoning and routing pollution attacks,so the wrong query results caused by this will even lead to a larger network security event.By improving the node ID generation mechanism,the routing table update mechanism and the search path selection mechanism of a DHT system,the study improved the security of the DHT system from all working stages to resist attackers' collusion attack.The desinged prototype system based on these methods can remain the query success rate of more than 65% in the attacking seniro with 60% of collusion attack nodes.The only cost is increasing the average querying hop of less than 1.Thus,the method is applicable to a variety of distributed Hash table structures and has important practical prospects.

关键词

对等网络/分布式哈希表(DHT)/安全优化/路由污染/索引毒害

Key words

peer-to-peer network/distributed Hash table (DHT)/security optimization/routing pollution/index poisoning

引用本文复制引用

史建焘,夏清泉,张兆心..DHT系统的安全性优化方法研究[J].高技术通讯,2016,26(12):935-943,9.

基金项目

国家自然科学基金(61402137)资助项目. (61402137)

高技术通讯

OA北大核心CSTPCD

1002-0470

访问量0
|
下载量0
段落导航相关论文