通信学报 ›› 2016, Vol. 37 ›› Issue (10): 158-171.doi: 10.11959/j.issn.1000-436x.2016207
鲁强,刘波,胡华平
出版日期:
2016-10-25
发布日期:
2016-10-25
基金资助:
Qiang LU,Bo LIU,Hua-ping HU
Online:
2016-10-25
Published:
2016-10-25
Supported by:
摘要:
作为文件、信息和资源等联网内容的共享平台,内容共享网络在互联网中具有十分广泛的分布。随着网络技术的快速发展和深入应用,特别是对等网络的兴起与流行,极大地方便了人们通过网络分享各种内容。然而,大量的恶意文件、欺诈信息和间谍软件等不良内容蜂拥而入,对内容共享网络构成了日益严重的安全威胁。结合内容共享网络的发展与研究现状,从网络安全的视角对其概念内涵、类型划分、重要技术和发展与研究趋势等关键问题进行了综述。
鲁强,刘波,胡华平. 内容共享网络中的关键问题[J]. 通信学报, 2016, 37(10): 158-171.
Qiang LU,Bo LIU,Hua-ping HU. Some critical issues of content sharing network[J]. Journal on Communications, 2016, 37(10): 158-171.
[1] | STANIFORD S , PAXSOM V , WEAVER N . How to own the Internet in your spare time[C]// The 11th VSENZX Security Symposium. San Francisco, 2002: 149-167. |
[2] | CLARK D . Face-to-face with peer-to-peer networking[J]. IEEE Computer, 2001,34(1): 18-21. |
[3] | MILOJICIC D S , KALOGERAKI V , LUKOSE R ,et al. Peer-to-peer computing HPL-2002-57[R]. Palo Alto,USA:HP Laboratories, 2002. |
[4] | RATNASAMY S , KARP B , YIN L ,et al. GHT:a geographic Hash table for data-centric storage[C]// The First ACM International Workshop on Wireless Sensor Networks and Applications. New York,ACM, 2002: 94-103. |
[5] | SCHODER D , FISCHBACH K . Peer-to-peer prospects[J]. Communications of the ACM, 2003,46(2): 27-29. |
[6] | CHEN H , YANG M , HAN J Q ,et al. Maze:a social peer-to-peer network[C]// The IEEE International Conference on E-Commerce Technology for Dynamic E-Business. Beijing, 2004: 290-293. |
[7] | JIA D M , YEE W G , FRIEDER O . Spam characterization and detection in peer-to-peer file-sharing systems[C]// ACM Conf on Inf and Knowl Mgt (CIKM). ACM, 2008: 329-338. |
[8] | WANG Q Y , VU L , NAHRSTEDT K ,et al. MIS:malicious nodes identification scheme in network-coding-based peer-to-peer streaming[C]// The 29th Conference on Information Communications (INFOCOM 2010). Piscataway,NJ,USA, 2010: 296-300. |
[9] | SHI J T , ZHANG H L . A protocol based countermeasure to BitTorrent fake-block attack[J]. Journal of Computational Information Systems, 2012,8(12): 5211-5218. |
[10] | SAROIU S , GUMMADI K P , STEVEN D G . A measurement study of peer-to-peer file sharing systems[C]// International Society for Optics and Photonics. 2001: 156-170. |
[11] | PARAMESWARAN M , SUSARLA A , ANDEW B ,et al. P2P networking:an information-sharing alternative[J]. Computer, 2001(7): 31-38. |
[12] | IAMNITCHI A I . Resource discovery in large resource-sharing environments[D]. Chicago,America:University of Chicago, 2003. |
[13] | TREMAYNE M . Blogging,citizenship,and the future of media[M]. Routledge, 2012. |
[14] | ANDROUTSELLIS-THEOTOKIS S . A survey of peer-to-peer file sharing technologies[J]. Athens University of Economics and Business,Greece, 2002: 1-31. |
[15] | 史建焘 . P2P文件共享系统安全性研究[D]. 哈尔滨:哈尔滨工业大学, 2012. SHI J T . Research on the security of P2P file sharing system[D]. Harbin,China:Harbin Institute of Technology, 2012. |
[16] | CLAY S . Listening to napster[J]. Peer-to-Peer:Hamessing the Benefits of A Disruptive Technology, 2001: 21-37. |
[17] | QIU D Y , RAYADURGAM S . Modeling and performance analysis of BitTorrent-like peer-to-peer network[J]. ACM SIGCOMM Computer Communication Review.ACM, 2004,34(4): 367-378. |
[18] | MATEI R , . Peer-to-peer architecture case study:gnutella network[C]// First International Conference on Peer-to-Peer Computing. IEEE, 2001: 99-100. |
[19] | YORAM K , DANNY B , . YORAM K,DANNY B.The eMule protocol specification[EB/OL]. . |
[20] | ZHU Z S , LU G H , CHEN Y ,et al. Botnet research survey[C]// 32nd Annual IEEE International Computer Software and Applications Conference. Turku,Finland, 2008: 967-972. |
[21] | 诸葛建伟, 韩心慧, 周勇林 ,等. 僵尸网络研究与进展[J]. 软件学报, 2008,19(3): 702-715. ZHUGE J W , HAN X H , ZHOU Y L ,et al. Research and development of botnets[J]. Journal of Software, 2008,19(3): 702-715. |
[22] | GU G F , YEGNESWARAN V , PORRAS P ,et al. Active botnet probing to identify obscure command and control channels[C]// Proceedings of 2009 Annual Computer Security Applications Conference. Honolulu,Hawaii, 2009: 241-253. |
[23] | DAGON D , GU G F , LEE C P ,et al. A taxonomy of botnet structures[C]// The 23rd Annual Computer Security Applications Conference. Miami Beach,FL,USA, 2007: 325-339. |
[24] | STANLEY G N , AARON K . Usability and privacy:a study of Kazaa P2P file-sharing[C]// The SIGCHI Conference on Human Factors in Computing Systems. ACM, 2003: 137-144. |
[25] | LEDER F , WERNER T , MARTINI P . Proactive botnet countermeasures-an offensive approach[C]// 1st CCDCoE Conference on Cyber Warfare. Tallinn,Estonia, 2009: 211-225. |
[26] | OLLMANN G . Botnet communication topologies[R]. Atlanta,GA:Damballa Inc,Technical Report:2009-06-04, 2009. |
[27] | ROY F , JAMES G , JEFF M ,et al. Hypertext transfer protocol- -HTTP/1.1[R]. 1999. |
[28] | ZOU X G , LI Q , SUN S H ,et al. The research on information hiding based on command sequence of FTP protocol[C]// Knowledge-Based Intelligent Information and Engineering Systems. Springer Berlin Heidelberg, 2005: 1079-1085. |
[29] | JARKKO O , DARREN R . Internet relay chat (irc) protocol[J]. IETF,Request for Comments (RFC), 1993,1459. |
[30] | MARK D , JONATHAN R , HIROYASU S . A model for presence and instant messaging[R]. 2000. |
[31] | SINGH K , SRIVASTAVA A , GIFFIN J ,et al. Evaluating email feasibility for botnet command and control[C]// 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Anchorage,USA, 2008: 376-385. |
[32] | CHO C Y , CABALLERO J , GRIER C ,et al. Insights from the inside:a view of botnet management from infiltration[C]// The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats. San Jose,CA,USA, 2010:2. |
[33] | SUN Y , LIU F M , LI B ,et al. Fs2you:peer-assisted semi-persistent online storage at a large scale[C]// IEEE INFOCOM 2009. IEEE, 2009: 873-881. |
[34] | HECKMANN O , BOCK A , MAUTHE A ,et al. The edonkey file-sharing network[J]. INFORMATIK, 2004,51: 224-228. |
[35] | PORRAS P , SAIDI H , YEGNESWARAN V . An analysis of the iKee B iPhone botnet[J]. Lecture Notes of the Institute for Computer Sciences,Social Informatics and Telecommunications Engineering, 2010,47(5): 141-152. |
[36] | PETER U , MARTIN H , KAPITZA R ,et al. Eliminating single points of failure in software-based redundancy[C]// 2012 Ninth European Dependable Computing Conference (EDCC). IEEE, 2012: 49-60 |
[37] | STOICA I , MORRIS R , KARGER D ,et al. Chord:a scalable peer-to-peer lookup service for internet application[C]// ACM SIGCOMM 2001. New York:ACM, 2001: 149-160. |
[38] | RATNASAMY S , FRANCIS P , HANDLY M . A scalable content-addressable network[C]// ACM SIGCOMM 2001. San Diego:ACM Press, 2001: 161-172. |
[39] | ZHAO Y B , KUBIATOWICZ J , JOSEPH A D . Tapestry:an infrastructure for fault-tolerant wide-area location and routing CSD-01-1141[R]. California:University of California Berkley, 2001. |
[40] | MAYMOUNKOV P , MAZIERES D . Kademlia:a peer-to-peer information system based on the XOR metric[C]// International Workshop on Peer-to-Peer Systems 2002. Massachusetts:Springer Berlin, 2002: 53-65. |
[41] | SANDEEP S , ANDREAS T . Measuring the storm worm network[R]. HiNRG Technical Report:01-10-2007, 2007. |
[42] | CLARKE I , SANDBERG O , WILEY B ,et al. Freenet:a distributed anonymous information storage and retrieval system[C]// The Workshop on Design Issues in Anonymity and Unobservability. Berkeley,CA,USA, 2000: 311-320. |
[43] | DOUCEUR J R . The Sybil attack[J]. Peer-to-Peer Systems.Springer Berlin Heidelberg, 2002: 251-260. |
[44] | NUNNERY C , SINCLAIR G , KANG B B . Tumbling down the rabbit hole:exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure[C]// The USENIX Workshop on Large-Scale Exploits and Emergent Threats. San Jose,CA,USA, 2010:1. |
[45] | 蒋君 . eMule 系统中的覆盖网络研究[D]. 上海:上海交通大学, 2008. JIANG J . The study of overlay network in eMule system[D]. Shanghai:Shanghai Jiao Tong University, 2008. |
[46] | TODD H , JOSE O , TONY M ,et al. Active measurement data analysis techniques[EB/OL]. . |
[47] | STEFAN S , KRISHNA G P , GRIBBLE S D . A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems[J]. ACM SIGCOMM Computer Communication Review, 2002,32(1): 82-82. |
[48] | RIPEANU M , FOSTER I . Mapping the gnutella network:macroscopic properties of large-scale peer-to-peer systems[J]. Peer-to-Peer Systems.Lecture Notes in Computer Science, 2002,2429: 85-93. |
[49] | STUTZBACH D , REJAIE R . Characterizing the two-tier gnutella topology[C]// The 2005 ACM SIGMETRICS. 2005: 402-403. |
[50] | STEINER M , CARRA D , BIERSACK E W . Long term study of peer behavior in the KAD DHT[J]. IEEE/ACM Transactions on Networking, 2009. |
[51] | STEINER M , CARRA D , BIERSACK E W . Evaluating and improving the content access in KAD[J]. Peer-to-Peer Networking and Applications, 2010,3(2): 115-128. |
[52] | 余杰 . P2P网络测量与安全关键技术研究[D]. 长沙:国防科学技术大学, 2010. YU J . Research on measurement and security of P2P networks[D]. Changsha:China National University of Defense Technology, 2010. |
[53] | NLANR M . Passive measurement and analysis[EB/OL]. . |
[54] | HUANG L S , WANG W Y , LI C C ,et al. Network fault analysis from passive measurement[J]. China Communications, 2012,9(5): 64-74. |
[55] | CHRISTION N , WEIGEND A , CHUANG J . Content availability,pollution and poisoning in peer-to-peer file sharing networks[J]. Electronic Commerce, 2005: 1-10. |
[56] | BRUNNER R . A performance evaluation of the kad-protocol[D]. Mannheim,German:University of Manheim, 2006. |
[57] | STEINER M , ENNAJJARY T , BIERSACK E W . A global view of KAD[C]// Internet Measurement Conference (IMC). 2007. |
[58] | STEINER M , BIERSACK E W , ENNAJJARY T . Actively monitoring peers in KAD[C]// The 6th International Workshop on Peer-to-Peer Systems (IPTPS'07). 2007. |
[59] | HOLZ T , STEINER M , DAHL F ,et al. Measurements and mitigation of peer-to-peer-based botnets:a case study on storm worm[C]// The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08). 2008. |
[60] | WANG T Z , WANG H M , LIU B ,et al. Further analyzing the sybil attack in mitigating peer-to-peer botnets[J]. KSII Transactions on Internet & Information Systems, 2012,6(10): 2731-2749. |
[61] | LU Q , LIU B , HU H P ,et al. SMCSN:a new secure model of content sharing network by using multi-roles sybil nodes[C]// The fifth International conference on Computer Engineering and Networks. China,Shanghai, 2015. |
[62] | CARLTON R D , FERNANDEZ J M , NEVILLE S ,et al. Sybil attacks as a mitigation strategy against the storm botnet[C]// 3rd Internal Conference on Malicious and Unwanted Software. Alexandria,VA,USA, 2008: 32-40. |
[63] | CARLTON R D , FERNANDEZ J M , NEVILLE S . Optimising Sybil attacks against p2p-based botnets[C]// The 4th International Conference on Malicious and Unwanted Software. Montreal,Quebec,Canada, 2009: 78-87. |
[64] | 史建焘, 张宏莉, 方滨兴 . BitTorrent假块污染攻击的对抗方法研究[J]. 计算机学报, 2011,34(1): 15-24. SHI J T , ZHANG H L , FANG B X . Study on the countermeasures of bittorrent fake block attack[J]. Chinese Journal of Computers, 2011,34(1): 15-24. |
[65] | KONG J , CAI W D , WANG L ,et al. A study of pollution on BitTorrent[C]// The 2nd International Conference on Computer and Automation Engineering. Singapore, 2010: 118-122. |
[66] | SANTOS F R , CORDEIRO W L , GASPARY L P ,et al. Choking polluters in bittorrent file sharing communities[C]// Network Operations and Management Symposium (NOMS) 2010.IEEE. Osaka,New Jersey, 2010: 559-566. |
[67] | KONG J , CAI W D , WANG L ,et al. The evaluation of index poisoning in BitTorrent[C]// The Second International Conference on Communication Software and Networks.IEEE. Singapore, 2010: 382-386. |
[68] | LOU X S , HWANG K . Collusive piracy prevention in P2P content delivery networks[J]. IEEE Transactions on Computers, 2009,58(7): 970-983. |
[69] | LOCHER T , MYSICKA D , SCHMID S ,et al. Poisoning the kad network[J]. Distributed Computing and Networking,Heidelberg.Springer. 2010: 195-206. |
[70] | ALTMANN J , BEDANE Z B . A P2P file sharing network topology formation algorithm based on social network information[C]// IEEE INFOCOM Workshops 2009. IEEE, 2009: 1-6. |
[71] | SHEN H Y , LI Z , CHEN K . Social-P2P:an online social network based P2P file sharing system[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(10): 2428-2440. |
[72] | MAHESWARA P V , NAIK K B . Routing protocol performance issues and evaluation considerations in MANET[J]. International Journal of Engineering Research and Applications (IJERA), 2013,3(4): 1-5. |
[73] | ZHANG H , SHEN H . A social network based file sharing system in mobile peer to peer networks[C]// The 18th International Conference on Computer Communications and Networks. 2009: 1-6. |
[74] | MAGALHAES J , HOLANDA M . EIKO:a social mobile network for MANET[C]// The Information Systems and Technologies. 2011: 8-15. |
[75] | FENG C S , YANG J , QIN Z ,et al. Modeling and analysis of passive worm propagation in the P2P file-sharing network[J]. Simulation Modeling Practice and Theory, 2015,51: 87-99. |
[76] | HE L , KYOUNGSOO B , JAESOO Y . A mobile social network for efficient contents sharing and searches[J]. Computers & Electrical Engineering, 2015,41: 288-300. |
[77] | LIU G X , SHEN H Y , LEE W . An efficient and trustworthy P2P and social network integrated file sharing system[J]. IEEE Transactions on Computers, 2015,64(1): 54-70. |
[78] | 王天佐, 王怀民, 刘波 ,等. 僵尸网络中的关键问题[J]. 计算机学报, 2012,35(6): 1192-1208. WANG T Z , WANG H M , LIU B ,et al. Development of the research on some critical problems of botnets[J]. Chinese Journal of Computers, 2012,35(6): 1192-1208. |
[1] | 赵仕祺, 黄小红, 钟志港. 基于信誉的域间路由选择机制的研究与实现[J]. 通信学报, 2023, 44(6): 47-56. |
[2] | 谢人超, 文雯, 唐琴琴, 刘云龙, 谢高畅, 黄韬. 轨道交通移动边缘计算网络安全综述[J]. 通信学报, 2023, 44(4): 201-215. |
[3] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[4] | 康海燕, 龙墨澜. 基于吸收马尔可夫链攻击图的网络攻击分析方法研究[J]. 通信学报, 2023, 44(2): 122-135. |
[5] | 郭渊博, 李勇飞, 陈庆礼, 方晨, 胡阳阳. 融合Focal Loss的网络威胁情报实体抽取[J]. 通信学报, 2022, 43(7): 85-92. |
[6] | 张红斌, 尹彦, 赵冬梅, 刘滨. 基于威胁情报的网络安全态势感知模型[J]. 通信学报, 2021, 42(6): 182-194. |
[7] | 张腾飞, 余顺争. 移动设备加密流量的用户信息探测研究展望[J]. 通信学报, 2021, 42(2): 154-167. |
[8] | 程旭, 王莹莹, 张年杰, 付章杰, 陈北京, 赵国英. 基于空间感知的多级损失目标跟踪对抗攻击方法[J]. 通信学报, 2021, 42(11): 242-254. |
[9] | 黄韬, 刘江, 汪硕, 张晨, 刘韵洁. 未来网络技术与发展趋势综述[J]. 通信学报, 2021, 42(1): 130-150. |
[10] | 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型[J]. 通信学报, 2020, 41(9): 160-169. |
[11] | 吴武飞,李仁发,曾刚,谢勇,谢国琪. 智能网联车网络安全研究综述[J]. 通信学报, 2020, 41(6): 161-174. |
[12] | 李涛,郭渊博,琚安康. 融合对抗主动学习的网络安全知识三元组抽取[J]. 通信学报, 2020, 41(10): 80-91. |
[13] | 周翰逊,陈晨,冯润泽,熊俊坤,潘宏,郭薇. 基于值导数GRU的移动恶意软件流量检测方法[J]. 通信学报, 2020, 41(1): 102-113. |
[14] | 蒋侣,张恒巍,王晋东. 基于信号博弈的移动目标防御最优策略选取方法[J]. 通信学报, 2019, 40(6): 128-137. |
[15] | 罗智勇, 杨旭, 孙广路, 谢志强, 刘嘉辉. 基于马尔可夫的有限自动机入侵容忍系统模型[J]. 通信学报, 2019, 40(10): 79-89. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|