CN112055012A - Distributed system - Google Patents

Distributed system Download PDF

Info

Publication number
CN112055012A
CN112055012A CN202010904771.9A CN202010904771A CN112055012A CN 112055012 A CN112055012 A CN 112055012A CN 202010904771 A CN202010904771 A CN 202010904771A CN 112055012 A CN112055012 A CN 112055012A
Authority
CN
China
Prior art keywords
node
applicant
nodes
distance
distributed system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010904771.9A
Other languages
Chinese (zh)
Other versions
CN112055012B (en
Inventor
许翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Jiliang University
Original Assignee
China Jiliang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Jiliang University filed Critical China Jiliang University
Priority to CN202010904771.9A priority Critical patent/CN112055012B/en
Publication of CN112055012A publication Critical patent/CN112055012A/en
Application granted granted Critical
Publication of CN112055012B publication Critical patent/CN112055012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/122Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Computer Hardware Design (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Medical Informatics (AREA)

Abstract

The invention relates to a distributed system, regard the participant who applies for resources or provides resources in the distributed system as the node; the nodes include a benevolent node, a Sybil node (malicious node), and a pending node; if there is a record for providing resource or obtaining resource between nodes, it is regarded as forming a connection edge; when the node to be determined is used as an applicant to send a resource application, assuming that a participant for providing resources receiving the resource application is a good node, in the random routing, respectively extracting the characteristics of the applicant node and the provider node, and accordingly identifying the property of the node to be determined which sends the resource application so as to determine whether to provide the resources for the node to be determined. The invention can effectively identify the Sybil node, thereby resisting the Sybil attack.

Description

Distributed system
Technical Field
The invention relates to the technical field of computer distributed systems, in particular to a distributed system.
Background
Due to the characteristics of distribution, openness and anonymity in the distributed system, the distributed system is easy to attack. Sybil attacks (which may be interpreted as Sybil attacks) refer to attack patterns in which a user may create multiple false identities, thereby using these identities to control or affect a large number of normal nodes of the system. Resource sharing (e.g., file downloading) is an important application in distributed systems. Nodes that normally provide resources are called benevolent nodes; if a node simply acquires resources of other nodes and does not provide resources to other nodes, such a node is called a Sybil node.
A trusted central certificate authority can effectively prevent Sybil attacks by allocating unique identifiers to each node. This mechanism requires a central certification authority and is not applicable in many cases, for example, it is difficult to select or establish a separate entity that is trusted by the entire system. The central certificate authority can become a bottleneck and may cause QoS attacks. It follows that the prior art still has difficulty effectively combating Sybil attacks.
Disclosure of Invention
In view of this, the present invention provides a distributed system to solve the technical problem in the prior art that it is difficult to effectively combat the Sybil attack, and improve the security of the distributed system.
The technical solution of the present invention is to provide a distributed system, which realizes node property identification based on the distributed system, and adopts the following node property identification method, including the following specific steps:
regarding the participants applying for the resources or providing the resources in the distributed system as nodes; the nodes comprise a good node, a Sybil node and a pending node;
if there is a record for providing resource or obtaining resource between nodes, it is regarded as forming a connection edge;
when the node to be determined is used as an applicant to send a resource application, assuming that a participant for providing resources receiving the resource application is a good node, in the random routing, respectively extracting the characteristics of the applicant node and the provider node, and accordingly identifying the property of the node to be determined which sends the resource application so as to determine whether to provide the resources for the node to be determined.
Optionally, the selecting of the random route means that, if the degree of one node is m, the probability that the adjacent nodes are selected as next hops is 1/m, a path is randomly searched from the applicant node or the provider node, the path length is w, the distance between any two adjacent nodes is taken as a unit length, the path length w is a multiple of the unit length, and if the number of nodes in the shortest path between the applicant node and the provider node is L.
Optionally, the features extracted from the applicant node and the provider node include features of an intersection node of random paths from the applicant node and the provider node, features of different property or type nodes in three positions, namely, far distance, middle distance and near distance, of the random paths from the applicant node, and features of different property or type nodes in three positions, namely, far distance, middle distance and near distance, of the random paths from the provider node.
Optionally, the features extracted from the applicant node and the provider node further include the number of resources in the different transfer directions at the three positions, i.e., the far distance, the middle distance, and the near distance, of the random path from the applicant node, and the number of resources in the different transfer directions at the three positions, i.e., the far distance, the middle distance, and the near distance, of the random path from the provider node.
Optionally, the more similar the features extracted from the applicant node and the features extracted from the provider node, the greater the possibility that the applicant is determined to be a good node.
Optionally, the numerical range of the feature "the distance of the random path from the applicant node is far, the characteristics of the nodes with different properties or types in the middle and near three positions, the distance of the random path from the provider node is far, the characteristics of the nodes with different properties or types in the middle and near three positions, the distance of the random path from the applicant node is far, the resource numbers of the random path from the provider node in different transmission directions in the middle and near three positions, and the resource numbers of the random path from the provider node in different transmission directions in the middle and near three positions" is normalized, and after the normalization processing is performed by using a K-means clustering algorithm, the feature data of the far, middle and near three positions are extracted.
Optionally, an AdaBoost algorithm in a machine learning algorithm is used to train on a given training set, where the training set is obtained from features extracted from applicant nodes and provider nodes and properties of the given nodes, a series of weak classifiers are learned from training data in the training set, and the weak classifiers are combined into a strong classifier, and the strong classifier is used to identify properties of unknown undetermined nodes.
Optionally, the AdaBoost algorithm in the machine learning algorithm specifically includes the following steps: given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiAre correspondingly marked, yiSay 1 that the node is a good node, yi0, the node is a Sybil node;
define f (x) as the currently learned classifier, the purpose of training is to let the loss function
Figure BDA0002661006390000031
Gradually decrease;
in the (m + 1) th round of training, fm+1(x)=fm(x) + h (x) for the purpose of finding h (x) letting fm+1(x) As close to y as possible; using a gradient lifting algorithm, fitting the residuals using a decision tree cart, yielding:
Figure BDA0002661006390000032
wherein J is the total number of features, J is the jth feature, and m refers to m trees; obtaining a classifier consisting of m trees after training is completed:
Figure BDA0002661006390000033
optionally, classifying by using an artificial neural network, and establishing a model:
given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiAre correspondingly marked, yiSay 1 that the node is a good node, yi0, the node is a Sybil node;
the architecture of the artificial neural network comprises an input layer, a hidden layer and an output layer, wherein the hidden layer is one or more layers, the number of the hidden layers is used as a hyper-parameter, and the hidden layer is adjusted according to the accuracy in training; the loss function of the method adopts cross entropy and adopts a back propagation mode for training.
Compared with the prior art, the invention has the following advantages: the method adopts a random path sampling technology, analyzes different characteristics and resource number information of nodes in the path, judges the properties of the nodes according to extracted characteristics of surrounding nodes, trains by adopting a given training set based on a machine learning algorithm or an artificial neural network, and further identifies the properties of unknown nodes to be determined. The invention can effectively identify the Sybil node, thereby resisting the Sybil attack.
Drawings
Fig. 1 is a schematic diagram of a node in the present invention.
Detailed Description
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but the present invention is not limited to only these embodiments. The invention is intended to cover alternatives, modifications, equivalents and alternatives which may be included within the spirit and scope of the invention.
In the following description of the preferred embodiments of the present invention, specific details are set forth in order to provide a thorough understanding of the present invention, and it will be apparent to those skilled in the art that the present invention may be practiced without these specific details.
The invention is described in more detail in the following paragraphs by way of example with reference to the accompanying drawings. It should be noted that the drawings are in simplified form and are not to precise scale, which is only used for convenience and clarity to assist in describing the embodiments of the present invention.
Referring to fig. 1, a node and a random route in the present invention are illustrated. In the figure, w represents the path length, A, B represents two nodes respectively, and the point B to a represents that node a provides resources to node B, with this as the positive direction. Regarding the participants applying for the resources or providing the resources in the distributed system as nodes; the nodes comprise a good node, a Sybil node and a pending node;
if there is a record for providing resource or obtaining resource between nodes, it is regarded as forming a connection edge;
when the node to be determined is used as an applicant to send a resource application, assuming that a participant for providing resources receiving the resource application is a good node, in the random routing, respectively extracting the characteristics of the applicant node and the provider node, and accordingly identifying the property of the node to be determined which sends the resource application so as to determine whether to provide the resources for the node to be determined.
The random routing is that if the degree of a node is m, the probability that adjacent nodes are selected as next hops is 1/m, a path is randomly searched from an applicant node or a provider node, the path length is w, the connecting edge between two nodes is taken as a unit length, the path length is w is a multiple of the unit length, and if the number of nodes in the shortest path between the applicant node and the provider node is L, w > is 1/2L. Determining whether an intersection node exists in a random route between an applicant node and a provider according to the length of a path length w, and if the number of nodes in the shortest path between the applicant node and the provider node is L, if w > is 1/2L, the intersection node exists in the random path from the applicant node and the provider node; otherwise, no intersection node exists.
The features extracted from the applicant node and the provider node include features of an intersection node of random paths from the applicant node and the provider node, features of different property or type nodes in three positions, namely a far distance position, a middle distance position and a near distance position of the random paths from the applicant node, and features of different property or type nodes in three positions, namely a far distance position, a middle distance position and a near distance position of the random paths from the provider node.
The features extracted from the applicant node and the provider node further include the resource numbers of the random path from the applicant node in the three positions of the distance, the middle position and the near position in different transmission directions, and the resource numbers of the random path from the provider node in the three positions of the distance, the middle position and the near position in different transmission directions.
The more similar the features extracted from the applicant node and the features extracted from the provider node, the greater the likelihood that the applicant is a good node.
Normalizing the numerical range of the characteristic, namely the characteristics of nodes with different properties or types in three positions, namely far distance, middle distance and near distance, the resource number of different transmission directions in three positions, namely far distance, middle distance and near distance, and the resource number of different transmission directions in three positions, namely far distance, middle distance and near distance, from the provider node, and extracting the characteristic data of the three positions, namely far distance, middle distance and near distance after the characteristic data are processed by adopting a K-means clustering algorithm.
Training on a given training set by using an AdaBoost algorithm in a machine learning algorithm, wherein the training set is obtained by characteristics extracted from an applicant node and a provider node and the properties of the given node, learning a series of weak classifiers from training data of the training set, combining the weak classifiers into a strong classifier, and identifying the properties of unknown undetermined nodes by using the strong classifier.
The extracted node features and the degree of association between the node features and the node properties are as follows:
(1) the number of intersection nodes and random paths from the applicant node and the provider node.
The relevance degree is as follows: the more the number of intersection nodes, the more likely the two nodes of the applicant and the provider are the same in nature.
(2) And the number of goodwill nodes in the intersection nodes.
The relevance degree is as follows: the more the number of goodwill nodes in the intersection node, the greater the likelihood that the applicant is a goodwill node.
(3) The number of Sybil nodes in the intersection node.
The relevance degree is as follows: the greater the number of Sybil nodes in the intersection node, the greater the likelihood that the applicant is a Sybil node.
(4) And in the random path from the applicant node, the number of goodwill nodes in three positions of far distance, middle distance and near distance.
The relevance degree is as follows: the closer to the applicant, the more benevolent nodes, the more likely the applicant is a benevolent node.
(5) And in the random path from the applicant node, the number of Sybil nodes in three positions of far distance, middle distance and near distance.
The relevance degree is as follows: the closer to the applicant, the more Sybil nodes, the greater the likelihood of the applicant being a Sybil node.
(6) In the random path from the applicant node, the number of nodes providing resources in the forward direction in three positions, namely far, middle and near positions (the forward direction refers to the direction towards the applicant node).
The relevance degree is as follows: the closer the applicant is, the more the number of the nodes providing resources forward is, which indicates that the applicant is always obtaining the resources of other nodes, and the higher the possibility that the applicant is the Sybil node is.
(7) The number of nodes which reversely provide resources in three positions of far distance, middle distance and near distance in the random path from the applicant node (the reverse direction refers to the direction leaving the applicant node)
The relevance degree is as follows: the closer the applicant is, the more the number of nodes providing resources reversely is, which indicates that the applicant is providing other node resources all the time, and the higher the possibility that the applicant is a good node is.
(8) And in the random path from the applicant node, the forward provided resource number is in three positions, namely a far position, a middle position and a near position.
The relevance degree is as follows: the closer to the applicant, the more resources are being provided, indicating that the more resources the applicant and its nearby nodes acquire from other nodes, the greater the likelihood that the applicant is a Sybil node.
(9) And in the random path from the applicant node, the distance is far, middle and near, and the number of resources provided reversely is small.
The relevance degree is as follows: the closer the applicant is, the more resources are provided in the reverse direction, which means that the more resources are provided to other nodes by the applicant and the nodes in the vicinity thereof, the higher the possibility that the applicant is a good node.
(10) And in the random path from the provider node, the number of goodwill nodes in three positions of far distance, middle distance and near distance.
(11) And in the random path from the provider node, the number of Sybil nodes in three positions of far distance, middle distance and near distance.
(12) And in the random path from the provider node, the number of nodes which are far away, in the middle and in the near three positions and are providing resources forward.
(13) And in the random path from the provider node, the number of nodes for reversely providing resources in three positions of far distance, middle distance and near distance.
(14) And in a random path from the provider node, the number of resources provided forward in three positions, namely a far position, a middle position and a near position.
(15) And in a random path from the provider node, reversely providing the number of resources in three positions of far distance, middle distance and near distance.
Feature 10-15 relevance: the more likely the applicant is a benevolent node if the characteristics of the applicant are similar to those of the provider; conversely, the greater the likelihood that the applicant is a Sybil node.
The AdaBoost algorithm in the machine learning algorithm specifically includes the following steps: given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiAre correspondingly marked, yiSay 1 that the node is a good node, yi0, the node is a Sybil node;
define f (x) as the currently learned classifier, the purpose of training is to let the loss function
Figure BDA0002661006390000071
Gradually decrease;
in the (m + 1) th round of training, fm+1(x)=fm(x) + h (x) for the purpose of finding h (x) letting fm+1(x) As close to y as possible; using a gradient lifting algorithm, fitting the residuals using a decision tree cart, yielding:
Figure BDA0002661006390000072
wherein J is the total number of features, J is the jth feature, and m refers to m trees; obtaining a classifier consisting of m trees after training is completed:
Figure BDA0002661006390000073
other machine learning algorithms are: random forests, support vector machines can also be used as an alternative.
Adopting a random forest algorithm to establish a model:
given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiFor corresponding labels, for example: y isiSay 1 that the node is a good node, yi0, the node is a Sybil node; different values may also be chosen to represent benign and malicious (Sybil) nodes, respectively; and obtaining a plurality of decision trees by training by adopting a random forest algorithm. In implementation, a plurality of trained decision trees are adopted to carry out classification prediction on nodes with unknown properties.
Adopting a support vector machine algorithm to establish a model:
given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiFor corresponding labels, for example: y isiSay 1 that the node is a good node, yi0, the node is a Sybil node; different values may also be chosen to represent benign and malicious (Sybil) nodes, respectively; and (4) obtaining the classifier by training by adopting a support vector machine algorithm. In implementation, a trained classifier is adopted to perform classification prediction on nodes with unknown properties.
Classifying by adopting an artificial neural network, and establishing a model:
given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll the characteristics referring to the ith node; y isiAre correspondingly marked, yiSay 1 that the node is a good node, yi0, the node is a Sybil node;
the architecture of the artificial neural network comprises an input layer, a first hidden layer, a second hidden layer, a third hidden layer and an output layer; the loss function of the method is trained by adopting cross entropy (cross entropy) and a back propagation mode.
Although the embodiments have been described and illustrated separately, it will be apparent to those skilled in the art that some common techniques may be substituted and integrated between the embodiments, and reference may be made to one of the embodiments not explicitly described, or to another embodiment described.
The above-mentioned embodiments are intended to illustrate the technical solutions and advantages of the present invention, and it should be understood that the above-mentioned embodiments are only the most preferred embodiments of the present invention, and are not intended to limit the present invention, and any modifications, additions, equivalents, etc. made within the scope of the principles of the present invention should be included in the scope of the present invention.

Claims (9)

1. A distributed system realizes node property identification based on the distributed system, and adopts the following node property identification method, which comprises the following specific steps:
regarding the participants applying for the resources or providing the resources in the distributed system as nodes; the nodes comprise a good node, a Sybil node and a pending node;
if there is a record for providing resource or obtaining resource between nodes, it is regarded as forming a connection edge;
when the node to be determined is used as an applicant to send a resource application, assuming that a participant for providing resources receiving the resource application is a good node, in the random routing, respectively extracting the characteristics of the applicant node and the provider node, and accordingly identifying the property of the node to be determined which sends the resource application so as to determine whether to provide the resources for the node to be determined.
2. The distributed system of claim 1, wherein: the random routing selection means that if the degree of one node is m, the probability that the adjacent nodes are selected as the next hops is 1/m, a path is randomly searched from an applicant node or a provider node, the path length is w, the connecting edge between the two nodes is taken as a unit length, the path length w is a multiple of the unit length, and if the number of the nodes in the shortest path between the applicant node and the provider node is L.
3. The distributed system of claim 2, wherein: the features extracted from the applicant node and the provider node include features of an intersection node of random paths from the applicant node and the provider node, features of different property or type nodes in three positions, namely a far distance position, a middle distance position and a near distance position of the random paths from the applicant node, and features of different property or type nodes in three positions, namely a far distance position, a middle distance position and a near distance position of the random paths from the provider node.
4. The distributed system of claim 3, wherein: the features extracted from the applicant node and the provider node further include the resource numbers of the random path from the applicant node in the three positions of the distance, the middle position and the near position in different transmission directions, and the resource numbers of the random path from the provider node in the three positions of the distance, the middle position and the near position in different transmission directions.
5. The distributed system of claim 4, wherein: the more similar the features extracted from the applicant node and the features extracted from the provider node, the greater the likelihood that the applicant is a good node.
6. The distributed system of claim 4, wherein: normalizing the numerical range of the characteristic, namely the characteristics of nodes with different properties or types in three positions, namely far distance, middle distance and near distance, the resource number of different transmission directions in three positions, namely far distance, middle distance and near distance, and the resource number of different transmission directions in three positions, namely far distance, middle distance and near distance, from the provider node, and extracting the characteristic data of the three positions, namely far distance, middle distance and near distance after the characteristic data are processed by adopting a K-means clustering algorithm.
7. The distributed system of claim 6, wherein: training on a given training set by using an AdaBoost algorithm in a machine learning algorithm, wherein the training set is obtained by characteristics extracted from an applicant node and a provider node and the properties of the given node, learning a series of weak classifiers from training data of the training set, combining the weak classifiers into a strong classifier, and identifying the properties of unknown undetermined nodes by using the strong classifier.
8. The distributed system of claim 7, wherein: the AdaBoost algorithm in the machine learning algorithm specifically includes the following steps: given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiAre correspondingly marked, yiSay 1 that the node is a good node, yi0, the node is a Sybil node;
define f (x) as the currently learned classifier, the purpose of training is to let the loss function
Figure FDA0002661006380000021
Gradually decrease;
in the (m + 1) th round of training, fm+1(x)=fm(x) + h (x) for the purpose of finding h (x) letting fm+1(x) As close to y as possible; using a gradient boosting algorithm, using a decision tree cartFitting the residual error to obtain:
Figure FDA0002661006380000022
wherein J is the total number of features, J is the jth feature, and m refers to m trees; obtaining a classifier consisting of m trees after training is completed:
Figure FDA0002661006380000023
9. the distributed system of claim 6, wherein: classifying by adopting an artificial neural network, and establishing a model:
given a training set D { (x)1,y1),(x2,y2)...,(xn,yn) In which xiAll features referring to the ith node; y isiAre correspondingly marked, yiSay 1 that the node is a good node, yi0, the node is a Sybil node;
the architecture of the artificial neural network comprises an input layer, a hidden layer and an output layer, wherein the hidden layer is one or more layers, the number of the hidden layers is used as a hyper-parameter, and the hidden layer is adjusted according to the accuracy in training; the loss function of the method adopts cross entropy and adopts a back propagation mode for training.
CN202010904771.9A 2018-07-24 2018-07-24 Distributed system Active CN112055012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010904771.9A CN112055012B (en) 2018-07-24 2018-07-24 Distributed system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810815073.4A CN108810030B (en) 2018-07-24 2018-07-24 Node property identification method based on distributed system
CN202010904771.9A CN112055012B (en) 2018-07-24 2018-07-24 Distributed system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810815073.4A Division CN108810030B (en) 2018-07-24 2018-07-24 Node property identification method based on distributed system

Publications (2)

Publication Number Publication Date
CN112055012A true CN112055012A (en) 2020-12-08
CN112055012B CN112055012B (en) 2022-11-25

Family

ID=64077846

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810815073.4A Active CN108810030B (en) 2018-07-24 2018-07-24 Node property identification method based on distributed system
CN202010904771.9A Active CN112055012B (en) 2018-07-24 2018-07-24 Distributed system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810815073.4A Active CN108810030B (en) 2018-07-24 2018-07-24 Node property identification method based on distributed system

Country Status (1)

Country Link
CN (2) CN108810030B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060133289A1 (en) * 2004-12-16 2006-06-22 Philippe Golle Method and apparatus for detecting and correcting malicious data in an ad-hoc network
CN101014013A (en) * 2007-02-09 2007-08-08 上海大学 Reliability-based secure routing method of wireless sensor network
CN103297973A (en) * 2013-06-04 2013-09-11 河海大学常州校区 Method for detecting Sybil attack in underwater wireless sensor networks
CN103619016A (en) * 2013-11-21 2014-03-05 太原科技大学 Self-adaptive grid safe routing method in wireless sensor network
CN103812864A (en) * 2014-01-26 2014-05-21 中国人民解放军国防科学技术大学 Sybil attack detection method in online social network
CN104079483A (en) * 2013-03-29 2014-10-01 南京邮电大学 Multistage security routing method for delay tolerant network and based on network codes
CN104125572A (en) * 2014-07-17 2014-10-29 南京邮电大学 Node collaboration based Sybil attack detection method
CN105959337A (en) * 2016-07-25 2016-09-21 电子科技大学 Sybil node recognition method based on physical layer confidence degree
CN106412888A (en) * 2016-06-17 2017-02-15 东南大学 Performance feedback intrusion tolerance protocol

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101645912B (en) * 2008-08-05 2012-10-10 北京大学 Internet-based method for building event-driven mechanism programming model
CN101478756A (en) * 2009-01-16 2009-07-08 南京邮电大学 Method for detecting Sybil attack
US8301880B2 (en) * 2009-11-09 2012-10-30 Cisco Technology, Inc. Certificate enrollment with purchase to limit sybil attacks in peer-to-peer network
CN104469754B (en) * 2014-12-01 2017-12-26 南京邮电大学 A kind of source position method for secret protection based on three stages route in wireless sense network
CN106789906A (en) * 2016-11-22 2017-05-31 全球能源互联网研究院 Betting data analysis method and device
CN106792714A (en) * 2017-03-02 2017-05-31 重庆邮电大学 A kind of secure time synchronization method attacked for Sybil in WSN
CN107566984B (en) * 2017-10-11 2020-02-18 大连理工大学 Source position privacy protection method based on sector area in WSNs

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060133289A1 (en) * 2004-12-16 2006-06-22 Philippe Golle Method and apparatus for detecting and correcting malicious data in an ad-hoc network
CN101014013A (en) * 2007-02-09 2007-08-08 上海大学 Reliability-based secure routing method of wireless sensor network
CN104079483A (en) * 2013-03-29 2014-10-01 南京邮电大学 Multistage security routing method for delay tolerant network and based on network codes
CN103297973A (en) * 2013-06-04 2013-09-11 河海大学常州校区 Method for detecting Sybil attack in underwater wireless sensor networks
CN103619016A (en) * 2013-11-21 2014-03-05 太原科技大学 Self-adaptive grid safe routing method in wireless sensor network
CN103812864A (en) * 2014-01-26 2014-05-21 中国人民解放军国防科学技术大学 Sybil attack detection method in online social network
CN104125572A (en) * 2014-07-17 2014-10-29 南京邮电大学 Node collaboration based Sybil attack detection method
CN106412888A (en) * 2016-06-17 2017-02-15 东南大学 Performance feedback intrusion tolerance protocol
CN105959337A (en) * 2016-07-25 2016-09-21 电子科技大学 Sybil node recognition method based on physical layer confidence degree

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘峰等: "基于信任权重防御Sybil攻击的模型", 《信息安全与通信保密》 *

Also Published As

Publication number Publication date
CN108810030A (en) 2018-11-13
CN108810030B (en) 2020-09-25
CN112055012B (en) 2022-11-25

Similar Documents

Publication Publication Date Title
CN109088862B (en) Node property identification method based on distributed system
US11829879B2 (en) Detecting adversarial attacks through decoy training
Yazdinejad et al. Federated learning for drone authentication
US10785130B2 (en) Network infrastructure device to implement pre-filter rules
CN112235264A (en) Network traffic identification method and device based on deep migration learning
US20190340507A1 (en) Classifying data
CN109274692A (en) A kind of identification block chain network is done evil the method and device of node
Tomlinson et al. Using a one-class compound classifier to detect in-vehicle network attacks
Anyanwu et al. Real-time position falsification attack detection system for internet of vehicles
Goel et al. Two‐level pruning based ensemble with abstained learners for concept drift in data streams
Kokane et al. Machine Learning Approach for Intelligent Transport System in IOV-Based Vehicular Network Traffic for Smart Cities
CN108810030B (en) Node property identification method based on distributed system
US20220245243A1 (en) Securing machine learning models against adversarial samples through model poisoning
Vidhya Efficient classification of portscan attacks using Support Vector Machine
CN113420791A (en) Access control method and device for edge network equipment and terminal equipment
CN114925765A (en) Construction method, device, equipment and storage medium of antagonism integrated classification model
Abdelmagid et al. Survey on information extraction from chemical compound literatures: Techniques and challenges
Kishore Kumar et al. New concepts of coloring in vague graphs with application
Trang et al. A Comparative Study of Machine Learning-based Approach for Network Traffic Classification.
Memarmoshrefi et al. Social insect-based sybil attack detection in mobile ad-hoc networks
Boualouache et al. Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
Lugo-Cordero et al. What defines an intruder? an intelligent approach
CN111712868B (en) Search device, search method, and recording medium
Siloa et al. Data stream clustering for botnet detection
Salem SybilSocNet: Algorithm for the Detection of Sybil Entities and the Sybil Attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant