计算机技术与发展
計算機技術與髮展
계산궤기술여발전
COMPUTER TECHNOLOGY AND DEVELOPMENT
2014年
1期
163-166,171
,共5页
对等网络%安全模型%防御%攻击
對等網絡%安全模型%防禦%攻擊
대등망락%안전모형%방어%공격
peer-to-peer%safe model%defense%attack
文中针对当前P2 P网络安全的需要,提出了一种信任评估网络安全模型,给出了新的信任评估计算方法和仿真实验。文中提出的信任评估模型是属于对等信任模型,该模型适合P2 P网络的分布式结构,也适应于P2 P网络对节点保持对等、独立、自由和异构的要求。实验结果表明,在P2 P网络中建立起对等的信任评估模型,其效果是明显的。 P2 P网络中的节点能通过模型算法来判断来访节点的情况,通过对来访者真实情况的甄别和判断,能拒绝恶意节点的入侵,有效地抑制了网络中恶意节点的攻击成功次数。
文中針對噹前P2 P網絡安全的需要,提齣瞭一種信任評估網絡安全模型,給齣瞭新的信任評估計算方法和倣真實驗。文中提齣的信任評估模型是屬于對等信任模型,該模型適閤P2 P網絡的分佈式結構,也適應于P2 P網絡對節點保持對等、獨立、自由和異構的要求。實驗結果錶明,在P2 P網絡中建立起對等的信任評估模型,其效果是明顯的。 P2 P網絡中的節點能通過模型算法來判斷來訪節點的情況,通過對來訪者真實情況的甄彆和判斷,能拒絕噁意節點的入侵,有效地抑製瞭網絡中噁意節點的攻擊成功次數。
문중침대당전P2 P망락안전적수요,제출료일충신임평고망락안전모형,급출료신적신임평고계산방법화방진실험。문중제출적신임평고모형시속우대등신임모형,해모형괄합P2 P망락적분포식결구,야괄응우P2 P망락대절점보지대등、독립、자유화이구적요구。실험결과표명,재P2 P망락중건립기대등적신임평고모형,기효과시명현적。 P2 P망락중적절점능통과모형산법래판단래방절점적정황,통과대래방자진실정황적견별화판단,능거절악의절점적입침,유효지억제료망락중악의절점적공격성공차수。
According to the requirement of P2P network security,propose a network security model based on the trust evaluation for P2P network,give a new calculation method of the trust evaluation,and the model's simulation experiment. In this paper,the proposed trust e-valuation model is a peer-to-peer trust model. The model is suitable for the distributed structure of the P2P network,but also adapts to the requirements of maintaining equal,independent,free and heterogeneous for the nodes. The experimental results show that,to build up trust evaluation model of peers in P2P network,the effect is obvious. A node in the P2P network can determine the visiting nodes by the model algorithm,screen and judge the visitor,reject the invasion of malicious nodes,effectively restraining the number of success attack of malicious nodes.