Journal on Communications ›› 2016, Vol. 37 ›› Issue (10): 158-171.doi: 10.11959/j.issn.1000-436x.2016207
• Comprehensive Review • Previous Articles Next Articles
Qiang LU,Bo LIU,Hua-ping HU
Online:
2016-10-25
Published:
2016-10-25
Supported by:
Qiang LU,Bo LIU,Hua-ping HU. Some critical issues of content sharing network[J]. Journal on Communications, 2016, 37(10): 158-171.
[1] | STANIFORD S , PAXSOM V , WEAVER N . How to own the Internet in your spare time[C]// The 11th VSENZX Security Symposium. San Francisco, 2002: 149-167. |
[2] | CLARK D . Face-to-face with peer-to-peer networking[J]. IEEE Computer, 2001,34(1): 18-21. |
[3] | MILOJICIC D S , KALOGERAKI V , LUKOSE R ,et al. Peer-to-peer computing HPL-2002-57[R]. Palo Alto,USA:HP Laboratories, 2002. |
[4] | RATNASAMY S , KARP B , YIN L ,et al. GHT:a geographic Hash table for data-centric storage[C]// The First ACM International Workshop on Wireless Sensor Networks and Applications. New York,ACM, 2002: 94-103. |
[5] | SCHODER D , FISCHBACH K . Peer-to-peer prospects[J]. Communications of the ACM, 2003,46(2): 27-29. |
[6] | CHEN H , YANG M , HAN J Q ,et al. Maze:a social peer-to-peer network[C]// The IEEE International Conference on E-Commerce Technology for Dynamic E-Business. Beijing, 2004: 290-293. |
[7] | JIA D M , YEE W G , FRIEDER O . Spam characterization and detection in peer-to-peer file-sharing systems[C]// ACM Conf on Inf and Knowl Mgt (CIKM). ACM, 2008: 329-338. |
[8] | WANG Q Y , VU L , NAHRSTEDT K ,et al. MIS:malicious nodes identification scheme in network-coding-based peer-to-peer streaming[C]// The 29th Conference on Information Communications (INFOCOM 2010). Piscataway,NJ,USA, 2010: 296-300. |
[9] | SHI J T , ZHANG H L . A protocol based countermeasure to BitTorrent fake-block attack[J]. Journal of Computational Information Systems, 2012,8(12): 5211-5218. |
[10] | SAROIU S , GUMMADI K P , STEVEN D G . A measurement study of peer-to-peer file sharing systems[C]// International Society for Optics and Photonics. 2001: 156-170. |
[11] | PARAMESWARAN M , SUSARLA A , ANDEW B ,et al. P2P networking:an information-sharing alternative[J]. Computer, 2001(7): 31-38. |
[12] | IAMNITCHI A I . Resource discovery in large resource-sharing environments[D]. Chicago,America:University of Chicago, 2003. |
[13] | TREMAYNE M . Blogging,citizenship,and the future of media[M]. Routledge, 2012. |
[14] | ANDROUTSELLIS-THEOTOKIS S . A survey of peer-to-peer file sharing technologies[J]. Athens University of Economics and Business,Greece, 2002: 1-31. |
[15] | 史建焘 . P2P文件共享系统安全性研究[D]. 哈尔滨:哈尔滨工业大学, 2012. SHI J T . Research on the security of P2P file sharing system[D]. Harbin,China:Harbin Institute of Technology, 2012. |
[16] | CLAY S . Listening to napster[J]. Peer-to-Peer:Hamessing the Benefits of A Disruptive Technology, 2001: 21-37. |
[17] | QIU D Y , RAYADURGAM S . Modeling and performance analysis of BitTorrent-like peer-to-peer network[J]. ACM SIGCOMM Computer Communication Review.ACM, 2004,34(4): 367-378. |
[18] | MATEI R , . Peer-to-peer architecture case study:gnutella network[C]// First International Conference on Peer-to-Peer Computing. IEEE, 2001: 99-100. |
[19] | YORAM K , DANNY B , . YORAM K,DANNY B.The eMule protocol specification[EB/OL]. . |
[20] | ZHU Z S , LU G H , CHEN Y ,et al. Botnet research survey[C]// 32nd Annual IEEE International Computer Software and Applications Conference. Turku,Finland, 2008: 967-972. |
[21] | 诸葛建伟, 韩心慧, 周勇林 ,等. 僵尸网络研究与进展[J]. 软件学报, 2008,19(3): 702-715. ZHUGE J W , HAN X H , ZHOU Y L ,et al. Research and development of botnets[J]. Journal of Software, 2008,19(3): 702-715. |
[22] | GU G F , YEGNESWARAN V , PORRAS P ,et al. Active botnet probing to identify obscure command and control channels[C]// Proceedings of 2009 Annual Computer Security Applications Conference. Honolulu,Hawaii, 2009: 241-253. |
[23] | DAGON D , GU G F , LEE C P ,et al. A taxonomy of botnet structures[C]// The 23rd Annual Computer Security Applications Conference. Miami Beach,FL,USA, 2007: 325-339. |
[24] | STANLEY G N , AARON K . Usability and privacy:a study of Kazaa P2P file-sharing[C]// The SIGCHI Conference on Human Factors in Computing Systems. ACM, 2003: 137-144. |
[25] | LEDER F , WERNER T , MARTINI P . Proactive botnet countermeasures-an offensive approach[C]// 1st CCDCoE Conference on Cyber Warfare. Tallinn,Estonia, 2009: 211-225. |
[26] | OLLMANN G . Botnet communication topologies[R]. Atlanta,GA:Damballa Inc,Technical Report:2009-06-04, 2009. |
[27] | ROY F , JAMES G , JEFF M ,et al. Hypertext transfer protocol- -HTTP/1.1[R]. 1999. |
[28] | ZOU X G , LI Q , SUN S H ,et al. The research on information hiding based on command sequence of FTP protocol[C]// Knowledge-Based Intelligent Information and Engineering Systems. Springer Berlin Heidelberg, 2005: 1079-1085. |
[29] | JARKKO O , DARREN R . Internet relay chat (irc) protocol[J]. IETF,Request for Comments (RFC), 1993,1459. |
[30] | MARK D , JONATHAN R , HIROYASU S . A model for presence and instant messaging[R]. 2000. |
[31] | SINGH K , SRIVASTAVA A , GIFFIN J ,et al. Evaluating email feasibility for botnet command and control[C]// 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Anchorage,USA, 2008: 376-385. |
[32] | CHO C Y , CABALLERO J , GRIER C ,et al. Insights from the inside:a view of botnet management from infiltration[C]// The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats. San Jose,CA,USA, 2010:2. |
[33] | SUN Y , LIU F M , LI B ,et al. Fs2you:peer-assisted semi-persistent online storage at a large scale[C]// IEEE INFOCOM 2009. IEEE, 2009: 873-881. |
[34] | HECKMANN O , BOCK A , MAUTHE A ,et al. The edonkey file-sharing network[J]. INFORMATIK, 2004,51: 224-228. |
[35] | PORRAS P , SAIDI H , YEGNESWARAN V . An analysis of the iKee B iPhone botnet[J]. Lecture Notes of the Institute for Computer Sciences,Social Informatics and Telecommunications Engineering, 2010,47(5): 141-152. |
[36] | PETER U , MARTIN H , KAPITZA R ,et al. Eliminating single points of failure in software-based redundancy[C]// 2012 Ninth European Dependable Computing Conference (EDCC). IEEE, 2012: 49-60 |
[37] | STOICA I , MORRIS R , KARGER D ,et al. Chord:a scalable peer-to-peer lookup service for internet application[C]// ACM SIGCOMM 2001. New York:ACM, 2001: 149-160. |
[38] | RATNASAMY S , FRANCIS P , HANDLY M . A scalable content-addressable network[C]// ACM SIGCOMM 2001. San Diego:ACM Press, 2001: 161-172. |
[39] | ZHAO Y B , KUBIATOWICZ J , JOSEPH A D . Tapestry:an infrastructure for fault-tolerant wide-area location and routing CSD-01-1141[R]. California:University of California Berkley, 2001. |
[40] | MAYMOUNKOV P , MAZIERES D . Kademlia:a peer-to-peer information system based on the XOR metric[C]// International Workshop on Peer-to-Peer Systems 2002. Massachusetts:Springer Berlin, 2002: 53-65. |
[41] | SANDEEP S , ANDREAS T . Measuring the storm worm network[R]. HiNRG Technical Report:01-10-2007, 2007. |
[42] | CLARKE I , SANDBERG O , WILEY B ,et al. Freenet:a distributed anonymous information storage and retrieval system[C]// The Workshop on Design Issues in Anonymity and Unobservability. Berkeley,CA,USA, 2000: 311-320. |
[43] | DOUCEUR J R . The Sybil attack[J]. Peer-to-Peer Systems.Springer Berlin Heidelberg, 2002: 251-260. |
[44] | NUNNERY C , SINCLAIR G , KANG B B . Tumbling down the rabbit hole:exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure[C]// The USENIX Workshop on Large-Scale Exploits and Emergent Threats. San Jose,CA,USA, 2010:1. |
[45] | 蒋君 . eMule 系统中的覆盖网络研究[D]. 上海:上海交通大学, 2008. JIANG J . The study of overlay network in eMule system[D]. Shanghai:Shanghai Jiao Tong University, 2008. |
[46] | TODD H , JOSE O , TONY M ,et al. Active measurement data analysis techniques[EB/OL]. . |
[47] | STEFAN S , KRISHNA G P , GRIBBLE S D . A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems[J]. ACM SIGCOMM Computer Communication Review, 2002,32(1): 82-82. |
[48] | RIPEANU M , FOSTER I . Mapping the gnutella network:macroscopic properties of large-scale peer-to-peer systems[J]. Peer-to-Peer Systems.Lecture Notes in Computer Science, 2002,2429: 85-93. |
[49] | STUTZBACH D , REJAIE R . Characterizing the two-tier gnutella topology[C]// The 2005 ACM SIGMETRICS. 2005: 402-403. |
[50] | STEINER M , CARRA D , BIERSACK E W . Long term study of peer behavior in the KAD DHT[J]. IEEE/ACM Transactions on Networking, 2009. |
[51] | STEINER M , CARRA D , BIERSACK E W . Evaluating and improving the content access in KAD[J]. Peer-to-Peer Networking and Applications, 2010,3(2): 115-128. |
[52] | 余杰 . P2P网络测量与安全关键技术研究[D]. 长沙:国防科学技术大学, 2010. YU J . Research on measurement and security of P2P networks[D]. Changsha:China National University of Defense Technology, 2010. |
[53] | NLANR M . Passive measurement and analysis[EB/OL]. . |
[54] | HUANG L S , WANG W Y , LI C C ,et al. Network fault analysis from passive measurement[J]. China Communications, 2012,9(5): 64-74. |
[55] | CHRISTION N , WEIGEND A , CHUANG J . Content availability,pollution and poisoning in peer-to-peer file sharing networks[J]. Electronic Commerce, 2005: 1-10. |
[56] | BRUNNER R . A performance evaluation of the kad-protocol[D]. Mannheim,German:University of Manheim, 2006. |
[57] | STEINER M , ENNAJJARY T , BIERSACK E W . A global view of KAD[C]// Internet Measurement Conference (IMC). 2007. |
[58] | STEINER M , BIERSACK E W , ENNAJJARY T . Actively monitoring peers in KAD[C]// The 6th International Workshop on Peer-to-Peer Systems (IPTPS'07). 2007. |
[59] | HOLZ T , STEINER M , DAHL F ,et al. Measurements and mitigation of peer-to-peer-based botnets:a case study on storm worm[C]// The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08). 2008. |
[60] | WANG T Z , WANG H M , LIU B ,et al. Further analyzing the sybil attack in mitigating peer-to-peer botnets[J]. KSII Transactions on Internet & Information Systems, 2012,6(10): 2731-2749. |
[61] | LU Q , LIU B , HU H P ,et al. SMCSN:a new secure model of content sharing network by using multi-roles sybil nodes[C]// The fifth International conference on Computer Engineering and Networks. China,Shanghai, 2015. |
[62] | CARLTON R D , FERNANDEZ J M , NEVILLE S ,et al. Sybil attacks as a mitigation strategy against the storm botnet[C]// 3rd Internal Conference on Malicious and Unwanted Software. Alexandria,VA,USA, 2008: 32-40. |
[63] | CARLTON R D , FERNANDEZ J M , NEVILLE S . Optimising Sybil attacks against p2p-based botnets[C]// The 4th International Conference on Malicious and Unwanted Software. Montreal,Quebec,Canada, 2009: 78-87. |
[64] | 史建焘, 张宏莉, 方滨兴 . BitTorrent假块污染攻击的对抗方法研究[J]. 计算机学报, 2011,34(1): 15-24. SHI J T , ZHANG H L , FANG B X . Study on the countermeasures of bittorrent fake block attack[J]. Chinese Journal of Computers, 2011,34(1): 15-24. |
[65] | KONG J , CAI W D , WANG L ,et al. A study of pollution on BitTorrent[C]// The 2nd International Conference on Computer and Automation Engineering. Singapore, 2010: 118-122. |
[66] | SANTOS F R , CORDEIRO W L , GASPARY L P ,et al. Choking polluters in bittorrent file sharing communities[C]// Network Operations and Management Symposium (NOMS) 2010.IEEE. Osaka,New Jersey, 2010: 559-566. |
[67] | KONG J , CAI W D , WANG L ,et al. The evaluation of index poisoning in BitTorrent[C]// The Second International Conference on Communication Software and Networks.IEEE. Singapore, 2010: 382-386. |
[68] | LOU X S , HWANG K . Collusive piracy prevention in P2P content delivery networks[J]. IEEE Transactions on Computers, 2009,58(7): 970-983. |
[69] | LOCHER T , MYSICKA D , SCHMID S ,et al. Poisoning the kad network[J]. Distributed Computing and Networking,Heidelberg.Springer. 2010: 195-206. |
[70] | ALTMANN J , BEDANE Z B . A P2P file sharing network topology formation algorithm based on social network information[C]// IEEE INFOCOM Workshops 2009. IEEE, 2009: 1-6. |
[71] | SHEN H Y , LI Z , CHEN K . Social-P2P:an online social network based P2P file sharing system[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(10): 2428-2440. |
[72] | MAHESWARA P V , NAIK K B . Routing protocol performance issues and evaluation considerations in MANET[J]. International Journal of Engineering Research and Applications (IJERA), 2013,3(4): 1-5. |
[73] | ZHANG H , SHEN H . A social network based file sharing system in mobile peer to peer networks[C]// The 18th International Conference on Computer Communications and Networks. 2009: 1-6. |
[74] | MAGALHAES J , HOLANDA M . EIKO:a social mobile network for MANET[C]// The Information Systems and Technologies. 2011: 8-15. |
[75] | FENG C S , YANG J , QIN Z ,et al. Modeling and analysis of passive worm propagation in the P2P file-sharing network[J]. Simulation Modeling Practice and Theory, 2015,51: 87-99. |
[76] | HE L , KYOUNGSOO B , JAESOO Y . A mobile social network for efficient contents sharing and searches[J]. Computers & Electrical Engineering, 2015,41: 288-300. |
[77] | LIU G X , SHEN H Y , LEE W . An efficient and trustworthy P2P and social network integrated file sharing system[J]. IEEE Transactions on Computers, 2015,64(1): 54-70. |
[78] | 王天佐, 王怀民, 刘波 ,等. 僵尸网络中的关键问题[J]. 计算机学报, 2012,35(6): 1192-1208. WANG T Z , WANG H M , LIU B ,et al. Development of the research on some critical problems of botnets[J]. Chinese Journal of Computers, 2012,35(6): 1192-1208. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[3] | Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU. Network security situational awareness model based on threat intelligence [J]. Journal on Communications, 2021, 42(6): 182-194. |
[4] | Tengfei ZHANG, Shunzheng YU. Research prospects of user information detection from encrypted traffic of mobile devices [J]. Journal on Communications, 2021, 42(2): 154-167. |
[5] | Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO. Multi-level loss object tracking adversarial attack method based on spatial perception [J]. Journal on Communications, 2021, 42(11): 242-254. |
[6] | Tao HUANG, Jiang LIU, Shuo WANG, Chen ZHANG, Yunjie LIU. Survey of the future network technology and trend [J]. Journal on Communications, 2021, 42(1): 130-150. |
[7] | Zhiyong LUO,Xu YANG,Jiahui LIU,Rui XU. Network intrusion intention analysis model based on Bayesian attack graph [J]. Journal on Communications, 2020, 41(9): 160-169. |
[8] | Hanxun ZHOU,Chen CHEN,Runze FENG,Junkun XIONG,Hong PAN,Wei GUO. Mobile malware traffic detection approach based on value-derivative GRU [J]. Journal on Communications, 2020, 41(1): 102-113. |
[9] | JIANG Lyu,ZHANG Hengwei,WANG Jindong. Optimal strategy selection method for moving target defense based on signaling game [J]. Journal on Communications, 2019, 40(6): 128-137. |
[10] | Zhiyong LUO, Xu YANG, Guanglu SUN, Zhiqiang XIE, Jiahui LIU. Finite automaton intrusion tolerance system model based on Markov [J]. Journal on Communications, 2019, 40(10): 79-89. |
[11] | Shirui HUANG,Hengwei ZHANG,Jindong WANG,Ruiyu DOU. Network security threat warning method based on qualitative differential game [J]. Journal on Communications, 2018, 39(8): 29-36. |
[12] | Xiaodong ZANG,Jian GONG,Xiaoyan HU. Detecting malicious domain names based on AGD [J]. Journal on Communications, 2018, 39(7): 15-25. |
[13] | Le-yi SHI,Hui SUN,Yu-wen CUI,Hong-bin GUO,Jian-lan LI. Web plug-in paradigm for anti-DoS attack based on end hopping [J]. Journal on Communications, 2017, 38(Z1): 19-24. |
[14] | Tao WANG,Hong-chang CHEN,Guo-zhen CHENG. Research on software-defined network and the security defense technology [J]. Journal on Communications, 2017, 38(11): 133-160. |
[15] | Tao YIN,Shi-cong LI,Yu-peng TUO,Yong-zheng ZHANG. Modeling and countermeasures of a social network-based botnet with strong destroy-resistance [J]. Journal on Communications, 2017, 38(1): 97-105. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|