Journal on Communications ›› 2016, Vol. 37 ›› Issue (9): 55-67.doi: 10.11959/j.issn.1000-436x.2016178
• Papers • Previous Articles Next Articles
Zhi-geng HAN1,2,Xia FENG3(),Geng CHEN1,2
Online:
2016-09-25
Published:
2016-09-28
Supported by:
Zhi-geng HAN,Xia FENG,Geng CHEN. SDN based e-mail repudiation source restraining method[J]. Journal on Communications, 2016, 37(9): 55-67.
"
类型 | 无共谋无诽谤 | 无共谋有诽谤 | 有共谋无诽谤 | 有共谋有诽谤 | 均值 |
发送抵赖 | 0.250 0↘0.020 0 | 0.250 0↘0.019 0 | 0.250 0↘0.020 2 | 0.225 0↘0.019 6 | 0.243 8↘0.019 7 |
接收抵赖 | 0.233 3↘0.020 1 | 0.200 0↘0.019 0 | 0.177 3↘0.020 4 | 0.250 0↘0.020 2 | 0.215 2↘0.019 9 |
收发抵赖 | 0.016 7↘0 | 0.023 1↘0 | 0.010 0↘0 | 0.005 6↘0 | 0.013 9↘0 |
无 抵 赖 | 0.616 7↗0.957 7 | 0.610 0↗0.957 5 | 0.630 0↗0.957 2 | 0.625 0↗0.957 2 | 0.620 4↗0.957 4 |
"
类型 | 无共谋无诽谤 | 无共谋有诽谤 | 有共谋无诽谤 | 有共谋有诽谤 | 平均 | |||||||
区间 | 均值 | 区间 | 均值 | 区间 | 均值 | 区间 | 均值 | |||||
抵赖查全率 | 0.025 6,0.812 5] | 0.434 8 | 0.052 6,0.720 9] | 0.334 8 | 0.052 6,0.766 7] | 0.434 9 | 0.050 0,0.625 0] | 0.287 4 | 0.373 0 | |||
抵赖查准率 | 0.875 0,1] | 0.998 1 | 0.818 2,1 ] | 0.999 6 | 0.702 7,1] | 0.999 1 | 0.947 4,1 ] | 0.999 9 | 0.999 2 | |||
调和平均值 | 0.050 0,0.896 6] | 0.592 5 | 0.100 0,0.837 8] | 0.490 1 | 0.095 2,0.867 9] | 0.587 8 | 0.095 2,0.769 2] | 0.435 0 | 0.526 4 |
"
抵赖抑制类别 | 无共谋无诽谤下交互总量 | 无共谋有诽谤下交互总量 | ||||||||||
100 | 500 | 1 000 | 2 000 | 10 000 | 100 | 500 | 1 000 | 2 000 | 10 000 | |||
本文 | 0.380 0 | 0.250 0 | 0.185 0 | 0.108 5 | 0.022 1 | 0.270 0 | 0.256 0 | 0.184 0 | 0.104 0 | 0.021 2 | ||
源头抑制 | ||||||||||||
签邮 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | ||
本文 | 0.020 0 | 0.022 0 | 0.015 0 | 0.003 5 | 0.001 2 | 0.050 0 | 0.012 0 | 0.007 0 | 0.006 0 | 0.000 1 | ||
事后抑制 | ||||||||||||
签邮 | 0.400 0 | 0.272 0 | 0.200 0 | 0.112 0 | 0.023 3 | 0.320 0 | 0.268 0 | 0.191 0 | 0.110 0 | 0.021 3 | ||
本文源头/签邮事后 | 95.00% | 91.91% | 92.5% | 96.88% | 94.85% | 84.38% | 95.52% | 96.34% | 94.55% | 99.53% |
"
抵赖抑制类别 | 有共谋无诽谤下交互总量 | 有共谋有诽谤下交互总量 | ||||||||||
100 | 500 | 1 000 | 2 000 | 10 000 | 100 | 500 | 1 000 | 2 000 | 10 000 | |||
本文 | 0.290 0 | 0.232 0 | 0.180 0 | 0.106 0 | 0.021 7 | 0.240 0 | 0.260 0 | 0.176 0 | 0.109 0 | 0.021 9 | ||
源头抑制 | ||||||||||||
签邮 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | 0.000 | ||
本文 | 0.120 0 | 0.034 0 | 0.004 0 | 0.003 0 | 0.000 2 | 0.050 0 | 0.026 0 | 0.011 0 | 0.002 5 | 0.000 2 | ||
事后抑制 | ||||||||||||
签邮 | 0.410 0 | 0.266 0 | 0.184 0 | 0.109 0 | 0.021 9 | 0.290 0 | 0.286 0 | 0.187 0 | 0.111 5 | 0.022 1 | ||
本文源头/签邮事后 | 70.73% | 87.22% | 97.83% | 97.25% | 99.09% | 82.76% | 90.91% | 94.12% | 97.76% | 99.10% |
[1] | WELLS T M , DENNIS A R . To e-mail or not to e-mail:the impact of media on psychophysiological responses and emotional content in utilitarian and romantic communication[J]. Computers in Human Behavior, 2016,54: 1-9. |
[2] | TAUBER A . A survey of certified mail systems provided on the Internet[J]. Computers & Security, 2011,30: 464-485. |
[3] | FERRER-GOMILLA J L , ONIEVA J A , PAYERAS M ,et al. Certified electronic mail:properties revisited[J]. Computers & Security, 2010,29(2): 167-179. |
[4] | KIM H , FEAMSTER N . Improving network management with software defined networking[J]. IEEE Communications Magazine, 2013,51(2): 114-119. |
[5] | ALI S T , SIVARAMAN V , RADFORD A ,et al. A survey of securing networks using software defined networking[J]. IEEE Transactions on Reliability, 2015,64(3): 1086-1097. |
[6] | BECHTOLD S , PERRIG A . Accountability in future Internet architectures[J]. Communications of the ACM, 2014,57(9): 21-23. |
[7] | WANG Y , SUSILO W , AU MH ,et al. Collusion-resistance in optimistic fair exchange[J]. IEEE Transactions on Information Forensics and Security, 2014,9(8): 1227-1239. |
[8] | ONIEVA J A , ZHOU J , LOPEZ J . Enhancing certified e-mail service for timeliness and multicast[C]// 2004 International Network Conference. Plymouth,UK, 2004: 327-336. |
[9] | MICALI S , . Simple and fast optimistic protocols for fair electronic exchange[C]// The twenty-second annual symposium on Principles of distributed computing. Boston,USA, 2003: 12-19. |
[10] | SHAO MH , WANG G , ZHOU J . Some common attacks against certified e-mail protocols and the countermeasures[J]. Computer Communications, 2006,29(15): 2759-2769. |
[11] | PAYERAS-CAPELLà M M , MUT-PUIGSERVER M , FERRER-GOMILA J L ,et al. No author based selective receipt in an efficient certified e-mail protocol[C]// 2009 17th Euromicro International Conference on Parallel,Distributed and Network-based Processing. Weimar, 2009: 387-392. |
[12] | PUIGSERVER M M , GOMILA J L F , ROTGER L H . Certified electronic mail protocol resistant to a minority of malicious third parties[C]// Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2000). 2000: 1401-1405. |
[13] | ATENIESE G , MEDEIROS BD , GOODRICH MT . TRICERT:a distributed certified e-mail schemes[C]// 2001 Network and Distributed System Security Symposium. San Diego,USA, 2001. |
[14] | ZHOU J , ONIEVA J , LOPEZ J . Optimized multi-party certified e-mail protocols[J]. Information Management & Computer Security, 2005,13(5): 350-366. |
[15] | WANG C , LAN C , NIU S ,et al. An ID-based certified e-mail protocol with STTP suitable for wireless mobile environments[J]. Journal of Computers, 2013,8(1): 3-9. |
[16] | TAUBER A , APITZSCH J , BOLDRIN L . An interoperability standard for certified mail systems[J]. Computer Standards & Interfaces, 2012,34: 452-466. |
[17] | TAUBER A , KUSTOR P , KARNING B . Cross-border certified electronic mailing:a European perspective[J]. Computer Law & Security Review, 2013,29(1): 28-39. |
[18] | DRAPER-GIL G , FERRER-GOMILA JL , HINAREJOS MF ,et al. An optimistic certified e-mail protocol for the current Internet e-mail architecture[C]// 2014 IEEE Conference on Communications and Network Security(CNS). San Francisco, 2014: 382-390. |
[19] | PAULIN A , WELZER T . A universal system for fair non-repudiable certified e-mail without a trusted third party[J]. Computers & Security, 2013,32: 207-218. |
[20] | LARA A , KOLASANI A , Ramamurthy B . Network innovation using OpenFlow:a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 493-512. |
[21] | KREUTZ D , RAMOS F M V , VERISSIMO P E ,et al. Softwaredefined networking:A comprehensive survey[J]. Proceedings of the IEEE, 2015,103(1): 14-76. |
[22] | SYVERSON P , VANOORSCHOT P C . A unified cryptographic protocol logic[R]. Technical Report,NRL Publication 5540-227,Naval Research Lab, 1996. |
[23] | HENDRIKX F , BUBENDORFER K , CHARD R . Reputation systems:A survey and taxonomy[J]. Journal of Parallel and Distributed Computing, 2015,75: 184-197. |
[24] | SRIVATSA M , XIONG L , LIU L . TrustGuard:countering vulnerabilities in reputation management for decentralized overlay networks[C]// The 14th international conference on World Wide Web (WWW2005). Chiba,Japan, 2005. |
[1] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[2] | Jianzhong SU, Huayu ZHANG, Hailong ZHU. Computing method for periodic stream reservation in TSN combined with SDN controller [J]. Journal on Communications, 2021, 42(10): 23-31. |
[3] | Yaomin WANG,Xia WANG,Yi DONG,Songhai ZHANG,Xinling SHI. Data center traffic scheduling strategy based on Fibonacci tree optimization algorithm [J]. Journal on Communications, 2020, 41(6): 112-127. |
[4] | Zhenzhen HAN,Guofeng ZHAO,Chuan XU,Wentao ZHOU,Yangyang ZHOU. Dynamic SDN controller placement based on latency in LEO satellite network [J]. Journal on Communications, 2020, 41(3): 126-135. |
[5] | Wenlong KE,Yong WANG,Miao YE,Junqi CHEN. Priority differentiated multicast flow scheduling method in Ceph cloud storage network [J]. Journal on Communications, 2020, 41(11): 40-51. |
[6] | Hongyan QIAN,Hao XUE,Ming CHEN. UDM:NFV-based prevention mechanism against DDoS attack on SDN controller [J]. Journal on Communications, 2019, 40(3): 116-124. |
[7] | Hui ZHAO, Liangmin WANG. Hybrid anonymous channel for recipient untraceability via SDN-based node obfuscation scheme [J]. Journal on Communications, 2019, 40(10): 55-66. |
[8] | Tong DUAN,Julong LAN,Yuxiang HU,Hongwei FAN. Orchestration mechanism for VNF hardware acceleration resources in SDN/NFV architecture [J]. Journal on Communications, 2018, 39(6): 98-108. |
[9] | Songjie WEI,Xin SUN,Rudong ZHAO,Chao WU. Tracing IP-spoofed packets in software defined network [J]. Journal on Communications, 2018, 39(11): 181-189. |
[10] | Zhi-yuan ZHAO,Xiang-ru MENG,Yu-ze SU,Zhen-tao LI. Virtual SDN embedding with differentiated QoS under multiple controller [J]. Journal on Communications, 2017, 38(8): 101-110. |
[11] | Zhi SUN,Ming CHEN. PriQoS:priority-differentiated flow control mechanism based on SDN [J]. Journal on Communications, 2017, 38(2): 115-124. |
[12] | Tao WANG,Hong-chang CHEN,Guo-zhen CHENG. Research on software-defined network and the security defense technology [J]. Journal on Communications, 2017, 38(11): 133-160. |
[13] | Jian WANG,Guo-sheng ZHAO,Zhi-xin LI. Research on mapping algorithm of virtual network oriented to SDN [J]. Journal on Communications, 2017, 38(10): 26-35. |
[14] | Jun-fei LI,Ju-long LAN,Yu-xiang HU,Jiang-xing WU. Quantitative approach of multi-controller’s consensus in SDN [J]. Journal on Communications, 2016, 37(6): 86-93. |
[15] | Zhe WANG,Man-gui LIANG,Xiao-meng JI,MateusAbisai Fillipus. Source-controlled OpenFlow data plane [J]. Journal on Communications, 2015, 36(3): 195-201. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|