Method, network node and system for preventing aggression in P2P network

A P2P network and node technology, applied in the P2P field, can solve the problem of malicious nodes not being processed, and achieve the effect of avoiding influence

Active Publication Date: 2011-11-16
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] This scheme only provides a method for detecting identity attacks, that is, it is only used to discover malicious behaviors of malicious nodes, but this malicious node is not processed, which cannot prevent the next request from being attacked by the same malicious node.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, network node and system for preventing aggression in P2P network
  • Method, network node and system for preventing aggression in P2P network
  • Method, network node and system for preventing aggression in P2P network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present invention provide a method for preventing attacks in a P2P network, and a P2P network and network nodes for preventing attacks. When a node detects that other nodes in the P2P network have made malicious behaviors, the evidence proving that the node has made malicious behaviors is sent to the upstream node of the node that made the malicious behavior, and the upstream node records the node that made the malicious behavior. Information and the number of times the node has been notified to perform malicious behaviors, and when it is necessary to forward data packets, select nodes with no malicious behavior records or nodes with fewer malicious behavior records to forward data packets, so as to reduce or avoid The purpose of the influence of malicious behavior nodes on the entire P2P network.

[0035]The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0036] like Figure 4 Sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of P2P and discloses a method for preventing attack in a P2P network, a network node and a system thereof. When another node in the P2P network is detected to make malicious act in the node, evidence proving that the node makes the malicious act is sent to an upstream node of the node making the malicious act; the upstream node records the information about the node making the malicious act and the times that the node are informed for making malicious act; when a data message is needed to transmit, a node with no record or less times of the malicious act is selected for transmitting the data message, thereby effectively reducing or avoiding the influence of the node making the malicious act on the whole P2P network.

Description

technical field [0001] The invention relates to the field of P2P technology, in particular to a method, network node and system for preventing attacks in a P2P network. Background technique [0002] Peer-to-peer network (Peer to Peer, P2P) is a distributed network, network participants (Peer) share part of their hardware resources (processing power, storage capacity, network connection capacity, printers, etc.), these shared resources Services and content need to be provided by the network, and can be directly accessed by other peer nodes (Peer) without going through an intermediate entity. Participants in this network are both resource (service and content) providers (Server) and resource (service and content) acquirers (Client). P2P breaks the traditional client / server (Client / Server, C / S) mode, and the status of each node in the network is equal. Each node not only acts as a server, provides services for other nodes, but also accepts services provided by other nodes. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L12/56
CPCH04L29/08144H04L67/1002H04L29/08234H04L67/1023H04L63/1416H04L29/08306H04L67/104H04L67/1001
Inventor 李峰江兴烽蒋海峰
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products