浏览全部资源
扫码关注微信
国防科学技术大学计算机学院,湖南 长沙 410073
[ "鲁强(1987-),男,湖北随州人,国防科学技术大学博士生,主要研究方向为网络与信息安全。" ]
[ "刘波(1973-),男,湖北仙桃人,博士,国防科学技术大学研究员,主要研究方向为网络与信息安全。" ]
[ "胡华平(1967-),男,江西临川人,博士,国防科学技术大学研究员,主要研究方向为网络与信息安全。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
鲁强, 刘波, 胡华平. 内容共享网络中的关键问题[J]. 通信学报, 2016,37(10):158-171.
Qiang LU, Bo LIU, Hua-ping HU. Some critical issues of content sharing network[J]. Journal on communications, 2016, 37(10): 158-171.
鲁强, 刘波, 胡华平. 内容共享网络中的关键问题[J]. 通信学报, 2016,37(10):158-171. DOI: 10.11959/j.issn.1000-436x.2016207.
Qiang LU, Bo LIU, Hua-ping HU. Some critical issues of content sharing network[J]. Journal on communications, 2016, 37(10): 158-171. DOI: 10.11959/j.issn.1000-436x.2016207.
作为文件、信息和资源等联网内容的共享平台,内容共享网络在互联网中具有十分广泛的分布。随着网络技术的快速发展和深入应用,特别是对等网络的兴起与流行,极大地方便了人们通过网络分享各种内容。然而,大量的恶意文件、欺诈信息和间谍软件等不良内容蜂拥而入,对内容共享网络构成了日益严重的安全威胁。结合内容共享网络的发展与研究现状,从网络安全的视角对其概念内涵、类型划分、重要技术和发展与研究趋势等关键问题进行了综述。
As a sharing platform for files
information and resources
CSN (content sharing network) possessed a very wide distribution in Internet.It did provide a great convenience for people to share various contents through Internet with the rapid development and wide application of network techniques
especially the emergence and prevalence of P2P (peer-to-peer).However
numerous malicious files
cheating information and spywares swarmed into Internet
which pose a serious threat to the security of CSN.A survey was made of some critical issues of CSN combining with the current development and research status from the perspective of network security.The critical issues include the definition and important properties
different taxonomies of types
key techniques
developing and researching trends of CSN.
STANIFORD S , PAXSOM V , WEAVER N . How to own the Internet in your spare time [C ] // The 11th VSENZX Security Symposium . San Francisco , 2002 : 149 - 167 .
CLARK D . Face-to-face with peer-to-peer networking [J ] . IEEE Computer , 2001 , 34 ( 1 ): 18 - 21 .
MILOJICIC D S , KALOGERAKI V , LUKOSE R , et al . Peer-to-peer computing HPL-2002-57 [R ] . Palo Alto,USA:HP Laboratories , 2002 .
RATNASAMY S , KARP B , YIN L , et al . GHT:a geographic Hash table for data-centric storage [C ] // The First ACM International Workshop on Wireless Sensor Networks and Applications . New York,ACM , 2002 : 94 - 103 .
SCHODER D , FISCHBACH K . Peer-to-peer prospects [J ] . Communications of the ACM , 2003 , 46 ( 2 ): 27 - 29 .
CHEN H , YANG M , HAN J Q , et al . Maze:a social peer-to-peer network [C ] // The IEEE International Conference on E-Commerce Technology for Dynamic E-Business . Beijing , 2004 : 290 - 293 .
JIA D M , YEE W G , FRIEDER O . Spam characterization and detection in peer-to-peer file-sharing systems [C ] // ACM Conf on Inf and Knowl Mgt (CIKM) . ACM , 2008 : 329 - 338 .
WANG Q Y , VU L , NAHRSTEDT K , et al . MIS:malicious nodes identification scheme in network-coding-based peer-to-peer streaming [C ] // The 29th Conference on Information Communications (INFOCOM 2010) . Piscataway,NJ,USA , 2010 : 296 - 300 .
SHI J T , ZHANG H L . A protocol based countermeasure to BitTorrent fake-block attack [J ] . Journal of Computational Information Systems , 2012 , 8 ( 12 ): 5211 - 5218 .
SAROIU S , GUMMADI K P , STEVEN D G . A measurement study of peer-to-peer file sharing systems [C ] // International Society for Optics and Photonics . 2001 : 156 - 170 .
PARAMESWARAN M , SUSARLA A , ANDEW B , et al . P2P networking:an information-sharing alternative [J ] . Computer , 2001 ( 7 ): 31 - 38 .
IAMNITCHI A I . Resource discovery in large resource-sharing environments [D ] . Chicago,America:University of Chicago , 2003 .
TREMAYNE M . Blogging,citizenship,and the future of media [M ] . Routledge , 2012 .
ANDROUTSELLIS-THEOTOKIS S . A survey of peer-to-peer file sharing technologies [J ] . Athens University of Economics and Business,Greece , 2002 : 1 - 31 .
史建焘 . P2P文件共享系统安全性研究 [D ] . 哈尔滨:哈尔滨工业大学 , 2012 .
SHI J T . Research on the security of P2P file sharing system [D ] . Harbin,China:Harbin Institute of Technology , 2012 .
CLAY S . Listening to napster [J ] . Peer-to-Peer:Hamessing the Benefits of A Disruptive Technology , 2001 : 21 - 37 .
QIU D Y , RAYADURGAM S . Modeling and performance analysis of BitTorrent-like peer-to-peer network [J ] . ACM SIGCOMM Computer Communication Review.ACM , 2004 , 34 ( 4 ): 367 - 378 .
MATEI R , . Peer-to-peer architecture case study:gnutella network [C ] // First International Conference on Peer-to-Peer Computing . IEEE , 2001 : 99 - 100 .
YORAM K , DANNY B , . YORAM K,DANNY B.The eMule protocol specification [EB/OL ] . http://sourceforge.net,2005 http://sourceforge.net,2005 .
ZHU Z S , LU G H , CHEN Y , et al . Botnet research survey [C ] // 32nd Annual IEEE International Computer Software and Applications Conference . Turku,Finland , 2008 : 967 - 972 .
诸葛建伟 , 韩心慧 , 周勇林 , 等 . 僵尸网络研究与进展 [J ] . 软件学报 , 2008 , 19 ( 3 ): 702 - 715 .
ZHUGE J W , HAN X H , ZHOU Y L , et al . Research and development of botnets [J ] . Journal of Software , 2008 , 19 ( 3 ): 702 - 715 .
GU G F , YEGNESWARAN V , PORRAS P , et al . Active botnet probing to identify obscure command and control channels [C ] // Proceedings of 2009 Annual Computer Security Applications Conference . Honolulu,Hawaii , 2009 : 241 - 253 .
DAGON D , GU G F , LEE C P , et al . A taxonomy of botnet structures [C ] // The 23rd Annual Computer Security Applications Conference . Miami Beach,FL,USA , 2007 : 325 - 339 .
STANLEY G N , AARON K . Usability and privacy:a study of Kazaa P2P file-sharing [C ] // The SIGCHI Conference on Human Factors in Computing Systems . ACM , 2003 : 137 - 144 .
LEDER F , WERNER T , MARTINI P . Proactive botnet countermeasures-an offensive approach [C ] // 1st CCDCoE Conference on Cyber Warfare . Tallinn,Estonia , 2009 : 211 - 225 .
OLLMANN G . Botnet communication topologies [R ] . Atlanta,GA:Damballa Inc,Technical Report:2009-06-04 , 2009 .
ROY F , JAMES G , JEFF M , et al . Hypertext transfer protocol- -HTTP/1.1 [R ] . 1999 .
ZOU X G , LI Q , SUN S H , et al . The research on information hiding based on command sequence of FTP protocol [C ] // Knowledge-Based Intelligent Information and Engineering Systems . Springer Berlin Heidelberg , 2005 : 1079 - 1085 .
JARKKO O , DARREN R . Internet relay chat (irc) protocol [J ] . IETF,Request for Comments (RFC) , 1993 ,1459.
MARK D , JONATHAN R , HIROYASU S . A model for presence and instant messaging [R ] . 2000 .
SINGH K , SRIVASTAVA A , GIFFIN J , et al . Evaluating email feasibility for botnet command and control [C ] // 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks . Anchorage,USA , 2008 : 376 - 385 .
CHO C Y , CABALLERO J , GRIER C , et al . Insights from the inside:a view of botnet management from infiltration [C ] // The 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats . San Jose,CA,USA , 2010 :2.
SUN Y , LIU F M , LI B , et al . Fs2you:peer-assisted semi-persistent online storage at a large scale [C ] // IEEE INFOCOM 2009 . IEEE , 2009 : 873 - 881 .
HECKMANN O , BOCK A , MAUTHE A , et al . The edonkey file-sharing network [J ] . INFORMATIK , 2004 , 51 : 224 - 228 .
PORRAS P , SAIDI H , YEGNESWARAN V . An analysis of the iKee B iPhone botnet [J ] . Lecture Notes of the Institute for Computer Sciences,Social Informatics and Telecommunications Engineering , 2010 , 47 ( 5 ): 141 - 152 .
PETER U , MARTIN H , KAPITZA R , et al . Eliminating single points of failure in software-based redundancy [C ] // 2012 Ninth European Dependable Computing Conference (EDCC) . IEEE , 2012 : 49 - 60
STOICA I , MORRIS R , KARGER D , et al . Chord:a scalable peer-to-peer lookup service for internet application [C ] // ACM SIGCOMM 2001 . New York:ACM , 2001 : 149 - 160 .
RATNASAMY S , FRANCIS P , HANDLY M . A scalable content-addressable network [C ] // ACM SIGCOMM 2001 . San Diego:ACM Press , 2001 : 161 - 172 .
ZHAO Y B , KUBIATOWICZ J , JOSEPH A D . Tapestry:an infrastructure for fault-tolerant wide-area location and routing CSD-01-1141 [R ] . California:University of California Berkley , 2001 .
MAYMOUNKOV P , MAZIERES D . Kademlia:a peer-to-peer information system based on the XOR metric [C ] // International Workshop on Peer-to-Peer Systems 2002 . Massachusetts:Springer Berlin , 2002 : 53 - 65 .
SANDEEP S , ANDREAS T . Measuring the storm worm network [R ] . HiNRG Technical Report:01-10-2007 , 2007 .
CLARKE I , SANDBERG O , WILEY B , et al . Freenet:a distributed anonymous information storage and retrieval system [C ] // The Workshop on Design Issues in Anonymity and Unobservability . Berkeley,CA,USA , 2000 : 311 - 320 .
DOUCEUR J R . The Sybil attack [J ] . Peer-to-Peer Systems.Springer Berlin Heidelberg , 2002 : 251 - 260 .
NUNNERY C , SINCLAIR G , KANG B B . Tumbling down the rabbit hole:exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure [C ] // The USENIX Workshop on Large-Scale Exploits and Emergent Threats . San Jose,CA,USA , 2010 :1.
蒋君 . eMule 系统中的覆盖网络研究 [D ] . 上海:上海交通大学 , 2008 .
JIANG J . The study of overlay network in eMule system [D ] . Shanghai:Shanghai Jiao Tong University , 2008 .
TODD H , JOSE O , TONY M , et al . Active measurement data analysis techniques [EB/OL ] . htpp://amp.nlanr.net,2000 htpp://amp.nlanr.net,2000 .
STEFAN S , KRISHNA G P , GRIBBLE S D . A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems [J ] . ACM SIGCOMM Computer Communication Review , 2002 , 32 ( 1 ): 82 - 82 .
RIPEANU M , FOSTER I . Mapping the gnutella network:macroscopic properties of large-scale peer-to-peer systems [J ] . Peer-to-Peer Systems.Lecture Notes in Computer Science , 2002 , 2429 : 85 - 93 .
STUTZBACH D , REJAIE R . Characterizing the two-tier gnutella topology [C ] // The 2005 ACM SIGMETRICS . 2005 : 402 - 403 .
STEINER M , CARRA D , BIERSACK E W . Long term study of peer behavior in the KAD DHT [J ] . IEEE/ACM Transactions on Networking , 2009 .
STEINER M , CARRA D , BIERSACK E W . Evaluating and improving the content access in KAD [J ] . Peer-to-Peer Networking and Applications , 2010 , 3 ( 2 ): 115 - 128 .
余杰 . P2P网络测量与安全关键技术研究 [D ] . 长沙:国防科学技术大学 , 2010 .
YU J . Research on measurement and security of P2P networks [D ] . Changsha:China National University of Defense Technology , 2010 .
NLANR M . Passive measurement and analysis [EB/OL ] . http://prna.nlanr.net/PMA.2003 http://prna.nlanr.net/PMA.2003 .
HUANG L S , WANG W Y , LI C C , et al . Network fault analysis from passive measurement [J ] . China Communications , 2012 , 9 ( 5 ): 64 - 74 .
CHRISTION N , WEIGEND A , CHUANG J . Content availability,pollution and poisoning in peer-to-peer file sharing networks [J ] . Electronic Commerce , 2005 : 1 - 10 .
BRUNNER R . A performance evaluation of the kad-protocol [D ] . Mannheim,German:University of Manheim , 2006 .
STEINER M , ENNAJJARY T , BIERSACK E W . A global view of KAD [C ] // Internet Measurement Conference (IMC) . 2007 .
STEINER M , BIERSACK E W , ENNAJJARY T . Actively monitoring peers in KAD [C ] // The 6th International Workshop on Peer-to-Peer Systems (IPTPS'07) . 2007 .
HOLZ T , STEINER M , DAHL F , et al . Measurements and mitigation of peer-to-peer-based botnets:a case study on storm worm [C ] // The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08) . 2008 .
WANG T Z , WANG H M , LIU B , et al . Further analyzing the sybil attack in mitigating peer-to-peer botnets [J ] . KSII Transactions on Internet & Information Systems , 2012 , 6 ( 10 ): 2731 - 2749 .
LU Q , LIU B , HU H P , et al . SMCSN:a new secure model of content sharing network by using multi-roles sybil nodes [C ] // The fifth International conference on Computer Engineering and Networks . China,Shanghai , 2015 .
CARLTON R D , FERNANDEZ J M , NEVILLE S , et al . Sybil attacks as a mitigation strategy against the storm botnet [C ] // 3rd Internal Conference on Malicious and Unwanted Software . Alexandria,VA,USA , 2008 : 32 - 40 .
CARLTON R D , FERNANDEZ J M , NEVILLE S . Optimising Sybil attacks against p2p-based botnets [C ] // The 4th International Conference on Malicious and Unwanted Software . Montreal,Quebec,Canada , 2009 : 78 - 87 .
史建焘 , 张宏莉 , 方滨兴 . BitTorrent假块污染攻击的对抗方法研究 [J ] . 计算机学报 , 2011 , 34 ( 1 ): 15 - 24 .
SHI J T , ZHANG H L , FANG B X . Study on the countermeasures of bittorrent fake block attack [J ] . Chinese Journal of Computers , 2011 , 34 ( 1 ): 15 - 24 .
KONG J , CAI W D , WANG L , et al . A study of pollution on BitTorrent [C ] // The 2nd International Conference on Computer and Automation Engineering . Singapore , 2010 : 118 - 122 .
SANTOS F R , CORDEIRO W L , GASPARY L P , et al . Choking polluters in bittorrent file sharing communities [C ] // Network Operations and Management Symposium (NOMS) 2010.IEEE . Osaka,New Jersey , 2010 : 559 - 566 .
KONG J , CAI W D , WANG L , et al . The evaluation of index poisoning in BitTorrent [C ] // The Second International Conference on Communication Software and Networks.IEEE . Singapore , 2010 : 382 - 386 .
LOU X S , HWANG K . Collusive piracy prevention in P2P content delivery networks [J ] . IEEE Transactions on Computers , 2009 , 58 ( 7 ): 970 - 983 .
LOCHER T , MYSICKA D , SCHMID S , et al . Poisoning the kad network [J ] . Distributed Computing and Networking,Heidelberg.Springer . 2010 : 195 - 206 .
ALTMANN J , BEDANE Z B . A P2P file sharing network topology formation algorithm based on social network information [C ] // IEEE INFOCOM Workshops 2009 . IEEE , 2009 : 1 - 6 .
SHEN H Y , LI Z , CHEN K . Social-P2P:an online social network based P2P file sharing system [J ] . IEEE Transactions on Parallel and Distributed Systems , 2015 , 26 ( 10 ): 2428 - 2440 .
MAHESWARA P V , NAIK K B . Routing protocol performance issues and evaluation considerations in MANET [J ] . International Journal of Engineering Research and Applications (IJERA) , 2013 , 3 ( 4 ): 1 - 5 .
ZHANG H , SHEN H . A social network based file sharing system in mobile peer to peer networks [C ] // The 18th International Conference on Computer Communications and Networks . 2009 : 1 - 6 .
MAGALHAES J , HOLANDA M . EIKO:a social mobile network for MANET [C ] // The Information Systems and Technologies . 2011 : 8 - 15 .
FENG C S , YANG J , QIN Z , et al . Modeling and analysis of passive worm propagation in the P2P file-sharing network [J ] . Simulation Modeling Practice and Theory , 2015 , 51 : 87 - 99 .
HE L , KYOUNGSOO B , JAESOO Y . A mobile social network for efficient contents sharing and searches [J ] . Computers & Electrical Engineering , 2015 , 41 : 288 - 300 .
LIU G X , SHEN H Y , LEE W . An efficient and trustworthy P2P and social network integrated file sharing system [J ] . IEEE Transactions on Computers , 2015 , 64 ( 1 ): 54 - 70 .
王天佐 , 王怀民 , 刘波 , 等 . 僵尸网络中的关键问题 [J ] . 计算机学报 , 2012 , 35 ( 6 ): 1192 - 1208 .
WANG T Z , WANG H M , LIU B , et al . Development of the research on some critical problems of botnets [J ] . Chinese Journal of Computers , 2012 , 35 ( 6 ): 1192 - 1208 .
0
浏览量
1045
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构