高技术通讯2016,Vol.26Issue(12):935-943,9.DOI:10.3772/j.issn.1002-0470.2016.12.002
DHT系统的安全性优化方法研究
Study on the security optimization of DHT systems
摘要
Abstract
The security vulnerability of distributed Hash table (DHT) systems was studied,a variety of security optimization strategies were proposed,and a prototyhpe system was designed.Real world network experiments were performed,and the resuhs show that existing DHT networks are vulnerable to index poisoning and routing pollution attacks,so the wrong query results caused by this will even lead to a larger network security event.By improving the node ID generation mechanism,the routing table update mechanism and the search path selection mechanism of a DHT system,the study improved the security of the DHT system from all working stages to resist attackers' collusion attack.The desinged prototype system based on these methods can remain the query success rate of more than 65% in the attacking seniro with 60% of collusion attack nodes.The only cost is increasing the average querying hop of less than 1.Thus,the method is applicable to a variety of distributed Hash table structures and has important practical prospects.关键词
对等网络/分布式哈希表(DHT)/安全优化/路由污染/索引毒害Key words
peer-to-peer network/distributed Hash table (DHT)/security optimization/routing pollution/index poisoning引用本文复制引用
史建焘,夏清泉,张兆心..DHT系统的安全性优化方法研究[J].高技术通讯,2016,26(12):935-943,9.基金项目
国家自然科学基金(61402137)资助项目. (61402137)