Dissertation > Excellent graduate degree dissertation topics show

Reasearch on the Security of P2P File Sharing System

Author: ShiJianZuo
Tutor: ZhangHongLi
School: Harbin Institute of Technology
Course: Information Security
Keywords: P2P Network Security BT DHT file pollution trust mechanism
CLC: TP393.02
Type: PhD thesis
Year: 2012
Downloads: 3
Quote: 0
Read: Download Dissertation

Abstract


As one of the most rapidly developed technology on the Internet in the earlypart of this century, P2P technology adhering to the initial design concept ofInternet, get rid of the difference between server and client, making networkcomputing model develop from decentralized mode to distributed mode, fullyuses resources of terminal equipments at the edge of Internet. Being equal parts,all the members in the network can directly connect and exchange files, and forma larger, more scalable overlay network. More and more P2P based applicationsare coming into being. However, though P2P technology promotes the sharing ofInternet hardware and software, its inherent anonymity, dynamic and opennesscharacters severely threat the security of Internet. Due to the reliability of theservice and the authenticity of the resources can not be guaranteed, and lack ofcontrol and management from a central component, there are morevulnerabilities that can be exploited by attackers in the P2P network. The easyway to share and fast way to route, also provide a platform for rapid spreading ofviruses and worms. Those seriously constraint the further developing of P2Psystem, and even threat the security of the entire Internet. How to improve thesecurity of P2P network has become an important issue to be solved. Thisdissertation analyzes and invests main security threats in P2P file sharing systems.From the point of view of system design, some enhancement methods areproposed.Firstly, fake-block attack in data transfer phase is a typical resourceconsumption attack, which seriously affect the availability of P2P systems. Thisdissertation studies fake-block attack in BitTorrent system, and creates astochastic mathematics model to give the theoretical upper bound that the attackcan take. Then the WAN experiment in a semi-open environment verifies theharm of fake-block attack in real network, and gives the result that the attack canbring at least3times delay of downloading. Finally a SmartHash algorithm basedcountermeasure is given. Simulation indicates this method is feasible andeffective. Secondly,routing security issues in peer selecting phase, not only threat theavailability of the system, but also provide a platform for other larger scaledestructive attacks. This dissertation makes attack validation in BT’s MainlinedDHT under actual network environment, proves that index poisoning and routingattack can controls the searching results of DHT network. To solve this securityissue, this dissertation proposes the improved node ID generation mechanism,routing table updating mechanism and the searching path selection mechanism.Theoretical analysis and simulation results show that the improved method canguarantee the query efficiency and system safety.Lastly, security threats in resource publishing/searching stage includesystem availability and resources authenticity. Research work of systemavailability is mainly focused on DHT structure. We study the keyword loadbalance problem in KAD network of eMule, and give a publishing and searchingimprovement based on the index of multiple target IDs. Simulation experimentsindicate the method can effectively improve the index load balancing. Researchwork of resources authenticity proposes a resource rating model in P2P filesharing system, called FRep, and details introduces votes aggregating mechanism,peer choosing mechanism, challenge mechanism, punishing and encouragemechanism and voting record exchange mechanism, analyzes the ability of FRepto resist large scale deception attacks. Simulation experiments prove FRep ismore powerful to counter against outside attacks and has better computationand communication efficiency.Overall, this dissertation systematically researches the security problems inP2P file sharing networks, in-depth analyzes different security threats in all stagesof P2P file sharing cycle model. The proposed methods and technologies caneffectively improve the performance and enhance the security of P2P network,which is significant for the future research on P2P network

Related Dissertations

  1. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  2. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  3. Research on Peer-to-Peer Traffic Identification Algorithm Based on Cluster Analysis,TP393.02
  4. Soil Eoclogical Risk Evaluation of Transgenic Bt Rice Through Nematode Community Analysis,S154.1
  5. Fitness Costs of a Disrupted Cadherin Allele Conferring Cry1Ac Resistance of Helicoverpa Armigera,S435.622.3
  6. Studies on the Differences of Tolerance between Chilo Supperssalis Walker and Sesamia Inferens Walker to Bt Rice,S435.112.1
  7. Effects of Nitrogen Management Practices on Expression and Degradation of Bt-protein in Transgenic Cotton,S562
  8. Region-based wireless sensor network key management scheme for research,TP212.9
  9. SX Provincial Public Security Bureau Network Security Corps Performance Evaluation Index System Design,D631.1
  10. TCDS car ground data communications system designed to achieve integration in 5T,U29-39
  11. On Data Scheduling Strategies of Serving Peers in P2P VoD Systems,TN948.64
  12. Research and Implementation on JXTA-based Virtual Campus Community,TP393.09
  13. E-Government Network Security Analysis and Prevention Strategy,TP393.08
  14. Research and Implementation of Replication Management Related Problems Based on P2P System,TP393.02
  15. The Research of Insurance Network Marketing of China Insurance Company,F724.6
  16. The Design and Implementation of the Live Server in Audio and Video Broadcast Distance Education System,TP311.52
  17. Research & Implementation of a Streaming Video-on-Demand System Based on P2P,TN948.64
  18. Educational Management Information System of Hulunbeier University Design and Implementation,TP311.52
  19. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  20. Research on Supply Chain Partners Trust Mechanism Establishment and Security,F224
  21. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer network architecture and design
© 2012 www.DissertationTopic.Net  Mobile