计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 100-102.

• 信息安全 • 上一篇    下一篇

一种基于蚁群算法的Sybil攻击防御

王峰,李亚,朱海,王迤然   

  1. 周口师范学院计算机科学与技术学院 周口466001;周口师范学院计算机科学与技术学院 周口466001;周口师范学院计算机科学与技术学院 周口466001;周口师范学院计算机科学与技术学院 周口466001
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家“973”重点资助

Sybil Attack Defense Based on Ant Colony Algorithm

WANG Feng,LI Ya,ZHU Hai and WANG Yi-ran   

  • Online:2018-11-16 Published:2018-11-16

摘要: 由于结构化对等网络管理的非集中性、参与者参与系统的自由性,使得 Sybil攻击成为其所面临的特有的安全威胁。通过对当前Sybil攻击防御的文献综述,得出利用社交网络解决Sybil攻击防御具有良好的前景。利用社交网络,结合蚁群算法解决NP难问题的优势,提出了一种基于蚁群算法的Sybil攻击防御模型ASDM以及相关算法。实验表明,ASDM能有效地识别出Sybil结点。

关键词: Sybil攻击,对等网络,蚁群算法,社交网络

Abstract: In the structured peer to peer networks,non concentration of management and the freedom of participants involving the system make the Sybil attack becomes a special security threat which faces.By reviewing and studying the current Sybil defense,the social network which defenses Sybil attacks has good prospects.Using social network,combining ant colony algorithm to solve NP problem,an ant colony algorithm based on Sybil attack defense model ASDM and the related algorithm was presented.The experimental results show that the ASDM can effectively identify the Sybil node.

Key words: Sybil attack,P2P network,Ant colony algorithm,Social network

[1] Douceur J.The Sybil attack [C]∥Proceedings of the 1st International Workshop on Peer-to-Peer Systems.London,U K:S pringer-Verlag,2002:251-260
[2] Danezis G,Lesniewski-Laas C,Kaashoek M F,et al.Sybil-Resistant DHT Routing[C]∥ESORICS.2005
[3] Yu H,Kaminsky M,Gibbons P B,et al.SybilGuard:Defending Against Sybil Attacks via Social Networks[C]∥Proc.SIGCOMM (Pisa,Italy). New York,NY:ACM Press.2006:267-278
[4] Urdaneta G.A Survey of DHT Security Techniques[J].ACM Computing Surveys,2011,43(2):1-35
[5] Rodrigues R,Druschel P. Peer-to-Peer Systems [J].communications of the ACM,2010,53(10):72-85
[6] Lesniewski-Laas M C,Kaashoek F.Whanau:A Sybil-proof Distributed Hash Table[C]∥NSDI’10Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation.2010
[7] Viswanath B.An Analysis of Social Network-Based Sybil Defenses[C]∥SIGCOMM’10.New Delhi,India,2010
[8] Castro M,Druschel P,Ganesh A,et al.Secure Routing forStructured Peer-to-Peer Overlay Networks[C]∥Proc.5th Symposium on Operating System Design and Implementation (Boston,MA).New York,NY:ACM Press,2002:299-314
[9] Dinger J,Hartenstein H.Defending the Sybil Attack in P2PNetworks:Taxonomy,Chal-lenges,and a Proposal for Self-Regis-tration[C]∥Proc.1st International Conference on Availability,Reliabilityand Security (Vienna,Austria). Los Alamitos,CA:IEEE Computer Society Press,2006:756-763
[10] Wang H,Zhu Y,Hu Y.An Efficient and Secure Peer-to-Peer Overlay Network[C]∥ Proc.30th Local Computer Networks.Los Alamitos,CA:IEEE Computer Society Press,2005:764-771
[11] Yu H,Gibbons P B,Kaminsky M,et al.SybilLimit:A Near-Optimal Social Network Defense against Sybil Attacks[C]∥Proc.International Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2008:3-17
[12] Borisov N.Computational Puzzles as Sybil Defenses[C]∥Proc.6th International Conference on Peer-to-Peer Computing.Los Alamitos,CA:IEEE Computer Society Press,2006:171-176
[13] 王峰,周佳骏.基于蚁群算法的对等网络,自适应寻径协议[J].计算机工程与应用,2010,17

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!