簡易檢索 / 詳目顯示

研究生: 洪人傑
Hung, Ren-Jie
論文名稱: P2P網路去汙染檔案容錯機制之研究
Fault-Tolerant Mechanism for Removing Polluted Files in Peer-to-Peer Networks
指導教授: 王宗一
Wang, Tzone-I
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系
Department of Engineering Science
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 51
中文關鍵詞: 檔案污染攻擊容錯機制點對點網路
外文關鍵詞: P2P Network, Pollution, EVENODD
相關次數: 點閱:85下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • P2P分享系統可有效快速的在網路上分享各種檔案,其中卻也充斥著許多未授權檔案的分享以及侵權的行為。近年來世界各國不留餘力抵制P2P網路上的侵權行為,為此可以說是不惜採用激烈手段。但不可否認的,以P2P網路為主的檔案分享系統依舊是極具效率的,若此後P2P網路往分享授權檔案和使用者付費的方面繼續前進,相信P2P分享系統為最佳選擇。P2P網路上的檔案汙染問題已在2005年Infocom會議上提出。雖此問題之造成是針對P2P網路分享侵權軟體所做的反擊,但若將來P2P網路上所分享之檔案都得到合法授權後,防制汙染就為一門重要的課題。
    受汙染檔案(Polluted Files),是指內容與標題不符的檔案或是檔案某部分為損壞或滲入不屬於此檔案的資料。P2P網路中得檔案安全性是相當低的,除非已下載此檔案否則將無法辨別此檔案的正確性。
    本研究使用RAID上的容錯機制來增加檔案的安全性,使其被汙染時可自行復原原始資料。此容錯機制可有效地抑制汙染,使一個受攻擊中P2P網路正確檔案擷取率上升,並在短時間中將P2P網路分享環境復原。

    An Infocom 2005 paper exposed and investigated the pollution problem of the P2P file sharing system. Nowadays, there are too many illegal files in any kind of Peer-to-Peer file sharing systems. It is unstoppable to avoid using the P2P file sharing system, because sharing a file in the p2p network is the most efficient way to spread a file around. We could hear about a lot of assumpsits against all kinds of P2P software by companies who have the copyright about files that are shared. And then, it must be a trend that if you want to share files, they must be authorized files. Thus, it is an important problem about polluted files.
    How to propose an anti-pollution mechanism in the P2P network is important in the future. Polluted files are files whose content have be polluted. Content pollution is the most common form of pollution currently. P2P networks are vulnerable to pollution attacks, and files have no way to protect themselves. We cannot recognize if a file is a decoy unless you download it. There are less ways to make sure your downloading file is correct. When we got a polluted file, we just search another file and restart the download in most time.
    This thesis proposes a fault tolerant mechanism to improve the safety of a sharing file. It can efficiently decrease files that are polluted and recover the environment of the P2P network from attacked in a short time.

    第一章 緒論 1 1.1研究動機 1 1.2研究目的 2 1.3研究成果與貢獻 3 1.4章節介紹 3 第二章 文獻回顧 4 2.1 P2P網路汙染行為之分類 4 2.2點對點網路 5 2.2.1集中式P2P網路: 6 2.2.2分散式P2P網路: 7 2.2.3 以分散性雜湊表為基礎的P2P網路 8 2.3磁碟陣列之容錯機制 12 2.4 EVEN-ODD容錯機制 17 2.4.1 EVEN-ODD編碼流程 17 2.4.2 EVEN-ODD解碼流程 20 第三章 系統架構 23 3.1基本架構 23 3.2模型的推導 26 3.3利用EVEN-ODD編碼 30 第四章 系統模擬與結果 36 4.1節點行為 36 4.2模擬結果 37 4.3問題討論 40 第五章 結論與未來展望 46 5.1 結論 46 5.2 未來展望 46 參考文獻 48 自述 51

    [1] M. Blaum, J. Brady, J. Bruck, and J. Menon, "EVENODD - AN EFFICIENT SCHEME FOR TOLERATING DOUBLE-DISK FAILURES IN RAID ARCHITECTURES," IEEE Transactions on Computers, vol. 44, pp. 192-202, Feb 1995.
    [2] C. Cristiano, S. Vanessa, A. Jussara, and A. Virgilio, "Fighting pollution dissemination in peer-to-peer networks," in Proceedings of the 2007 ACM symposium on Applied computing Seoul, Korea: ACM Press, 2007.
    [3] D.Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaaenepoel, "Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems," ACM SIGMETRICS Performance Evaluation Review, vol. 33, pp. 38–45, 2005.
    [4] A. P. David, G. Garth, and H. K. Randy, "A case for redundant arrays of inexpensive disks (RAID)," in Proceedings of the 1988 ACM SIGMOD international conference on Management of data Chicago, Illinois, United States: ACM Press, 1988.
    [5] eMule, "http://www.emule-project.net/," 2007.
    [6] B. Fabricio, C. Cristiano, V. Marisa, A. Virgilio, A. Jussara, and M. Miranda, "Impact of peer incentives on the dissemination of polluted content," in Proceedings of the 2006 ACM symposium on Applied computing Dijon, France: ACM Press, 2006.
    [7] J. Gerard, H. L. Cai, and J. Wang, "Alliatrust: A trustable reputation management scheme for unstructured P2P systems," in Advances in Grid and Pervasive Computing, Proceedings. vol. 3947, 2006, pp. 115-125.
    [8] Gnutella, "http://gnutella.wego.com," 2007.
    [9] A. D. Keromytis, V. Misra, and D. Rubenstein, "SOS: An architecture for mitigating DDoS attacks," IEEE Journal on Selected Areas in Communications, vol. 22, pp. 176-188, Jan 2004.
    [10] W. Kevin, E. G. Sirer, "Fighting peer-to-peer SPAM and decoys with object reputation," in Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems Philadelphia, Pennsylvania, USA: ACM Press, 2005.
    [11] R. Kumar, D. D. Yao, A. Bagchi, K. W. Ross, and D. Rubenstein, "Fluid Modeling of Pollution Proliferation in P2P Networks," ACM SIGMETRICS Performance Evaluation Review, vol. 34, pp. 335–346, 2006.
    [12] J. Liang, R. Kumar, Y. Xi, and K. W. Ross, "Pollution in P2P File Sharing Systems," IEEE Infocom 2005, March 2005.
    [13] J. Liang, N. Naoumov, and K. W. Ross, "The Index Poisoning Attack in P2P File Sharing System," IEEE Infocom 2006, April 2006.
    [14] J. A. Liang, N. Naoumov, and K. W. Ross, "Efficient blacklisting and pollution-level estimation in P2P file-sharing systems," in Technologies for Advanced Heterogeneous Networks, Proceedings. vol. 3837, 2005, pp. 1-21.
    [15] Napster, "http://free.napster.com/," 2007.
    [16] S. G. Nathaniel and K. Aaron, "Usability and privacy: a study of Kazaa P2P file-sharing," in Proceedings of the SIGCHI conference on Human factors in computing systems Ft. Lauderdale, Florida, USA: ACM Press, 2003.
    [17] C. Nicolas, S. W. Andreas, and C. John, "Content availability, pollution and poisoning in file sharing peer-to-peer networks," in Proceedings of the 6th ACM conference on Electronic commerce Vancouver, BC, Canada: ACM Press, 2005.
    [18] R. Pablo, T. See-Mong, and G. Christos, "On the feasibility of commercial, legal P2P content distribution," SIGCOMM Comput. Commun. Rev., vol. 36, pp. 75-78, 2006.
    [19] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable Content-Addressable Network," Computer Communication Review, vol. 31, pp. 161-172, Oct 2001.
    [20] S. Seungwon, J. Jaeyeon, and B. Hari, "Malware prevalence in the KaZaA file-sharing network," in Proceedings of the 6th ACM SIGCOMM on Internet measurement Rio de Janeriro, Brazil: ACM Press, 2006.
    [21] I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup protocol for Internet applications," IEEE-ACM Transactions on Networking, vol. 11, pp. 17-32, Feb 2003.

    下載圖示 校內:立即公開
    校外:2007-08-24公開
    QR CODE