Haibo Lin, Ruilin Ma, Li Guo, Peng Zhang, Xiaojun Chen
{"title":"在DHT网络中进行路由表投毒攻击","authors":"Haibo Lin, Ruilin Ma, Li Guo, Peng Zhang, Xiaojun Chen","doi":"10.1109/ICCCAS.2010.5582015","DOIUrl":null,"url":null,"abstract":"Although a lot of users share their information via Distributed Hash Table (i.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users' privacies. To address such a problem, in this paper we propose a suite of security strategies for the DHT network in BitTorrent system, such as the DHT interdiction and the DHT vulnerable examining methods. Experiments on real world data sets demonstrate that our proposed method is effective to preserve user's privacy in DHT networks.","PeriodicalId":199950,"journal":{"name":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Conducting routing table poisoning attack in DHT networks\",\"authors\":\"Haibo Lin, Ruilin Ma, Li Guo, Peng Zhang, Xiaojun Chen\",\"doi\":\"10.1109/ICCCAS.2010.5582015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although a lot of users share their information via Distributed Hash Table (i.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users' privacies. To address such a problem, in this paper we propose a suite of security strategies for the DHT network in BitTorrent system, such as the DHT interdiction and the DHT vulnerable examining methods. Experiments on real world data sets demonstrate that our proposed method is effective to preserve user's privacy in DHT networks.\",\"PeriodicalId\":199950,\"journal\":{\"name\":\"2010 International Conference on Communications, Circuits and Systems (ICCCAS)\",\"volume\":\"95 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Communications, Circuits and Systems (ICCCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCAS.2010.5582015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Communications, Circuits and Systems (ICCCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCAS.2010.5582015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Conducting routing table poisoning attack in DHT networks
Although a lot of users share their information via Distributed Hash Table (i.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users' privacies. To address such a problem, in this paper we propose a suite of security strategies for the DHT network in BitTorrent system, such as the DHT interdiction and the DHT vulnerable examining methods. Experiments on real world data sets demonstrate that our proposed method is effective to preserve user's privacy in DHT networks.