Unlock instant, AI-driven research and patent intelligence for your innovation.

Conspiring party recognition method based on action analog in P2P network

A P2P network and identification method technology, applied in the field of collusion group identification based on behavioral similarity, to achieve a wide range of applications and improve the effect of resistance

Inactive Publication Date: 2011-02-16
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this special situation does not always occur in reality, especially after the emergence of the botnet network, malicious nodes can easily gather a large number of IP distributed nodes to form a collusion group to launch an attack. In this case, based on the node IP The colluding group identification scheme for is invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Conspiring party recognition method based on action analog in P2P network
  • Conspiring party recognition method based on action analog in P2P network
  • Conspiring party recognition method based on action analog in P2P network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The schematic diagram of the principle of the present invention is as figure 1 As shown, firstly, a trust management node and a behavior recording node are assigned to each node in the network using a secure Hash function, and these two nodes are respectively responsible for managing the trust value of the node and recording the scoring behavior of the node to other nodes; then, by The trust management node monitors other nodes' ratings of the node in real time, especially the nodes with abnormal scoring behavior. If it is found that among the nodes scoring the node, there are more than a certain number of nodes with abnormal behavior, the collusion group detection algorithm will be started to determine whether there is group collusion. If a colluding group is found, use the detection result to recalculate the trust value to remove the interference of the group on the trust value calculation.

[0043] Refer to the flow process of the present invention figure 2 , the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a collusion group identification method in P2P network based on behavior semblance, belonging to the technical field of information security, comprising: distributing an accredit supervisor node for each node in the network for monitoring grade behavior of other node on the supervisor node, and a behavior recording node for recording the grade behavior of the supervised node on other node; timing to detect the grade behavior of the node in the network by the accredit supervisor node, thereby finding the node with singular performance, when the number of the singular nodes exceeds the set value, semblance of the grade behavior between the singular nodes is furthermore analyzed, and whether the collusion group is present is judged, finally global trust value is updated according to the detecting result. Compared with the prior art, the invention has wide application range, thereby identifying a plurality of group collusion behaviors, greatly advancing resisting ability of the P2P network accredit model on the multi-node collusion collusion.

Description

technical field [0001] The invention relates to a method for identifying colluding groups in a network, in particular to a method for identifying a colluding group based on behavior similarity in a P2P network, belonging to the technical field of information security, especially the field of P2P network security. Background technique [0002] The emergence of P2P network has changed the development mode of the Internet to a great extent. Many network applications have developed rapidly relying on P2P network technology, such as eMule, BT and other file sharing systems. Due to the inherent openness, anonymity, and untraceability of P2P networks, malicious nodes can easily invade the network and launch attacks. Therefore, while P2P networks bring convenience, they also generate some security threats, and even become the source of viruses. way. In order to solve this problem, the P2P network introduces a trust mechanism, which has a relatively good inhibitory effect on the act...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/36H04L12/58H04L12/66
Inventor 苗光胜冯登国苏璞睿
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI