Font Size: a A A

The Research Of The Source Node Authentication In P2P Network

Posted on:2012-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuFull Text:PDF
GTID:2178330332495882Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
This paper studies the current structure of the existing P2P networks, which includes the network topology of current existing P2P networks, technical features and performance advantages and disadvantages. This article specifically describes criminal activities based on P2P network and the need for the source node authentication. Most importantly, this paper based on the current existing network is presented with the regulatory functions of the new P2P network model and the new-model-based authentication technology to achieve the source node.First, this paper describes the origin of P2P technology, principles, current status, development and advantages and disadvantages. We also highlighted introduce the various crime based on P2P network, and analyze the causes of crime and the difficulties in fighting against crime with the current technology. The paper also points out that the source node monitoring of illegal resource and the need for the source node authentication.Secondly, this paper detailedly studies the current structure of the existing P2P networks. We divide the current P2P networks into three types in accordance with the network topology. They are the autonomous type of P2P network, the master type of P2P network and the hybrid type of P2P network. In this paper, several aspects of these networks have been studied, such as network topology, technical characteristics, performance indicators, typical applications and security issues. Particularly the software named Foxy based on autonomous type of P2P network. The article elaborates the Foxy software include principle, features, hazards and the causes of harm.Then, This paper presents a new type of regulatory functions with P2P network model. The model can realize the control of resources, record the source node of illegal resources, automatic identification, stop and record the node's illegal activities. This paper describes the new network model topology, the internal structure and the internal function of key equipment, it also describes the interactions between devices.Finally, the paper discusses the new source node authentication technology based on new P2P network, respectively, from a technical process, signature extraction, database structure and retrieval technology. It also discusses the feasibility of the source node authentication.In summary, this paper builds a new P2P network which can achieve source node authenticaiton technology. This network model can be very few changes to the existing network infrastructure, with minimal cost of transformation to achieve resources supervision function, and provides authentication services. In reality, the network model has a positive significance to network monitoring, justice authentication and fighting against crime. Source node authentication technology will help accurately locate the source of crime and authenticate the criminal. It enables law enforcement authorities can easily monitor network resources, and to combat cyber crime and also can be used as an effective evidence for judicial sentencing.
Keywords/Search Tags:Crime in P2P network, Source Node, Justice Authentication, Foxy
PDF Full Text Request
Related items