首页> 外文会议>2010 1st International Conference on Parallel Distributed and Grid Computing >Investigation analysis to find the security vulnerabilities in DHT oriented peer to peer network
【24h】

Investigation analysis to find the security vulnerabilities in DHT oriented peer to peer network

机译:调查分析以发现面向DHT的对等网络中的安全漏洞

获取原文
获取外文期刊封面目录资料

摘要

DHT based routing protocols are very exciting innovative aspects in the area of P2P overlay networks; this kind of networks are appropriate and accepted especially in file sharing like transactions. The reason of the Distributed Hash Table is giving the way to search the resources (mostly files) inside the P2P network. A DHT protocol typically provides a single function to the P2P application: given a key, find the node (s) responsible for that key. All other functions (such as actually retrieving the resource or storing the resource on the node responsible for it) are provided by higher layers of the P2P application. In this paper the main concentration is moving towards to find the security vulnerabilities and determine them on presented routing protocols of such networks. The Chord protocol is preferred as the routing protocol for the variety of motives; those motives are covered in this paper.
机译:基于DHT的路由协议是P2P覆盖网络领域中非常令人兴奋的创新方面。这种网络是适当的,尤其是在文件共享(如事务处理)中被接受。分布式哈希表的原因是让人们能够搜索P2P网络内部的资源(主要是文件)。 DHT协议通常为P2P应用程序提供一个功能:给定密钥,找到负责该密钥的节点。所有其他功能(例如实际检索资源或将资源存储在负责该资源的节点上)由P2P应用程序的更高层提供。在本文中,主要的注意力集中在寻找安全漏洞,并在此类网络的现有路由协议上确定安全漏洞。对于各种动机,首选Chord协议作为路由协议;这些动机在本文中进行了介绍。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号