计算机科学 ›› 2012, Vol. 39 ›› Issue (9): 28-32.

• 计算机网络与信息安全 • 上一篇    下一篇

使用粗糙集与Bayes分类器的P2P网络安全管理机制

王海晟,王海晨,桂小林   

  1. (西安理工大学计算机学院 西安710048);(西安交通大学电信学院 西安710049);(长安大学信息工程学院 西安710064)
  • 出版日期:2018-11-16 发布日期:2018-11-16

New P2P Network Security Mechanism Based on the Rough Set and the Bayes Classifier

  • Online:2018-11-16 Published:2018-11-16

摘要: 提出一种使用粗糙集与13aycs分类器的P2P网络安全管理机制。该模型放弃了局部信任度与全局信任度等 概念,对不满意事件进行分类统计,对交易节点进行分类控制。创新之处有:1)通过对节点彼此之间进行交易发生的 不满意事件按照交易失败的类型、损害的严重程度、交易规模的大小等情况进行分类与量化,将交易失败事件区分为 恶意攻击、大规模交易且质量不满意等类型。2)使用粗糙集分类器与l}iycs分类器,将对等网络中的节点划分为可信 任节点、陌生节点、恶意节点等不同的类型;建立信任节点列表与恶意节点列表;交易时将恶意节点排除在外。3)建立 了反馈控制机制,使用粗糙集分类器与13aycs分类器根据节点反馈推荐的意见对被评价节点进行分类、做出评价,同 时监测提出评价的节点是否有恶意行为,将反馈行为划分为诚实反馈、恶意反馈等。实验表明,与已有的安全模型相 比,提出的安全管理机制对恶意行为具有更高的检测率、更满意的交易成功率以及更好的反馈信息综合能力。

关键词: 安全模型,对等网络,粗糙集,贝叶斯分类器,仿真

Abstract: A new security management mechanism based on the classification control of trade nodes was proposed. The model gives over the concepts of local trust and global trust and takes the classification control of trade nodes. This pa- per's innovation is as follows;l) Through classification and quantification of failure events in trade between nodes,ac- cording to the severity of damage and the size of the trade, the trade failure events arc divided into malicious attacks, bad quality and so on. 2)The rough set classifier and I3ayes classifier are used and the nodes are divided into trust nodes, strange nodes and malicious nodes in a peer-to-peer network. "hhe trust node list and the malicious node list are built. hhe malicious nodes arc excluded from trading. 3) hhe rough set classifier and 13ayes classifier arc used to integrate the feedback recommendation and to decide the type of the recommended node. hhe feedback behaviors arc divided into the honest feedback, the malicious feedback and so on. The experiment indicates that compared with the existing trust mo- dcl, the model may obtain higher examination rate over malicious acts with the higher transaction success ratio, and has the better feedback information synthesizing capacity.

Key words: Security model, Peer-to-peer network, Rough set, Bayes classifier, Simulation experiment

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!