Font Size: a A A

The Dissemination Modeling Analysis And Anti-pollution Strategy Research Of P2P File Pollution

Posted on:2009-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y YunFull Text:PDF
GTID:2178360272970376Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
P2P technology has showed wide range of applications such as file-sharing, content distribution, distributed computing and other fields, and there have been a growing number of Internet users to join in the P2P networks. Its openness, decentralized, anonymity, and non-supervisory bring convenience to users, but it also brings a number of potential safety problems, in which file pollution is a prominent security problem. The file pollution in P2P networks not only damages file security, mutually beneficial sharing of resources and the environment, reducing the availability of resources, but also facilitates the spread for the viruses, worms, and other malicious programs and impacts the contents of the file-sharing system security seriously.In this paper, in-depth study the phenomenon of file pollution in the sharing system, the spread of file pollution is modeled by making use of the spread of the epidemic model and focus on an analysis file dissemination speed and user behavior in the process of transmission of file. In the P2P network, the sooner the distribution of the contents of the documents, the sooner will the spread of pollution; at the same time, whether the users can make timely and effective detection to the download file has a direct impact on the spread of pollution to the speed and extent of proliferation.An anti-pollution strategy based on nodes' degree of pollution according to the analysis of the result of building model is proposed. Firstly, the evaluation of the pollution is given by testing the download file and managed by the neighbors. Meanwhile, the average level of the pollution is got though regular exchange of information and the effective strategy of neighbor selection is got in accordance with different average degree of pollution.Secondly, a file of the pollution blacklist list is maintained by collecting the pollution information from self-node or network. When ready to download the file, a safe and effective option is selected to download the source files with the blacklist of information compared to the security filter. The results of the experiment show that on the one hand the spread of pollution documents is curbed to some extent, and on the other hand, the number of malicious node is controlled, and the success rate for downloading file is improved to some extent.
Keywords/Search Tags:Peer-to-Peer File Sharing, File Pollution, Pollution Dissemination, Neighbor
PDF Full Text Request
Related items