請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27711完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 黃寶儀 | |
| dc.contributor.author | Chia-Li Huang | en |
| dc.contributor.author | 黃家俐 | zh_TW |
| dc.date.accessioned | 2021-06-12T18:16:44Z | - |
| dc.date.available | 2007-09-03 | |
| dc.date.copyright | 2007-09-03 | |
| dc.date.issued | 2007 | |
| dc.date.submitted | 2007-08-30 | |
| dc.identifier.citation | [1] J. Liang, R. Kumar, Y. Xi, and K. Ross, “Pollution in p2p file sharing systems,” in
Proceedings of IEEE Infocom, 2005. [2] N. Christin, A. S. Weigend, and J. Chuang, “Content availability, pollution and poisoning in file sharing peer-to-peer networks,” in EC ’05: Proceedings of the 6th ACM conference on Electronic commerce, 2005, pp. 68–77. [3] D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, “Denialof- service resilience in peer-to-peer file sharing systems,” SIGMETRICS Perform. Eval. Rev., vol. 33, no. 1, pp. 38–49, 2005. [4] K. Gummadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan, “Measurement, modeling, and analysis of a peer-to-peer file-sharing workload,” in Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP-19), Oct. 2003. [5] M. T. Schlosser, T. E. Condie, , and S. D. Kamvar., “Simulating a file-sharing p2p network,” in Proc. of the 1st Workshop on Semantics in P2P and Grid Computing, 2003. [6] F. Benevenuto, C. Costa, M. Vasconcelos, V. Almeida, J. Almeida, and M. Mowbray, “Impact of peer incentives on the dissemination of polluted content,” in SAC ’06: Proceedings of the 2006 ACM symposium on Applied computing, 2006, pp. 1875– 1879. [7] viralg. [Online]. Available: http://www.viralg.com/ [8] Retsnap. [Online]. Available: http://www.retsnap.info/ [9] loudeye. [Online]. Available: http://www.loudeye.com/ [10] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust algorithm for reputation management in p2p networks,” in Proceedings of the Twelfth International World Wide Web Conference, 2003. [11] S. Buchegger and J.-Y. L. Boudec., “A robust reputation system for p2p and mobile ad-hoc networks,” in Proc. of Workshop on the Economics of Peer-to-Peer Systems, 2004. [12] F. C. E. D. S. D. C. di Vimercati S. Paraboschi and P. Samarati, “Choosing reputable servents in a p2p network,” in Proc. of International World Wide Web Conference, Honolulu, HI, 2002. [13] K. Walsh and E. G. Sirer, “Experience with an object reputation system for peer-topeer filesharing,” in Proceedings of Networked System Design and Implementation (NSDI). Networked System Design and Implementation (NSDI), May 2006. [14] U. Lee, M. Choi, J. Cho, M. Y. Sanadidi, and M. Gerla, “Understanding pollution dynamics in p2p file sharing,” in Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS’06), 2006. [15] J. Liang, N. Naoumov, and K. W. Ross, “The index poisoning attack in p2p file sharing systems,” in Proceedings of INFOCOM, 2006. [16] B.-T. Loo, R. Huebsch, I. Stoica, and J. Hellerstein., “The case for a hybrid p2p search infrastructure,” in Proc. IPTPS04, pp.141V150, San Diego, CA, Feb, 2004. [17] Q. Lian, Z. Zhang, B. Y. Zhao, Y. Dai, and X. Li, “An empirical study of collusion behavior in the maze p2p file-sharing system,” in Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007. [18] K. Walsh and E. G. Sirer., “Fighting peer-to-peer spam and decoys with object reputation,” in Proc. P2PECON Workshop, Philadelphia, Pennsylvania, 2005. [19] N. Leibowitz, M. Ripeanu, and A. Wierzbicki., “Deconstructing the kazaa network,” in Proc. of the 3rd IEEE Workshop on Internet Applications, 2003. [20] F. L. Fessant, S. Handurukande, A.-M. Kermarrec, and L. Massoulie., “Clustering in peer-to-peer filesharing workloads,” in Proc. IPTPS04, pp. 217V226, San Diego, CA,Feb, 2004. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27711 | - |
| dc.description.abstract | 為了遏止使用者於P2P檔案分享系統中擅自分享未經授權的電子檔案,唱片和電影等著作權公司放置了大量蓄意損毀的檔案於目前熱門的檔案分享系統,用以混淆使用者視聽,使之難以下載到正確的檔案。然而此一做法也漸漸被許多惡意的攻擊者用以降低檔案分享系統的效能。這種毀損檔案與正確檔案共存於系統中的現象被稱之為檔案汙染攻擊。檔案汙染攻擊不但降低了系統的效能,然而使用者下載到毀損檔案而重覆下載的行為也增加了許多不必要的網路傳輸流量。在本篇論文中,我們評估兩種具有代表性的檔案汙染防治機制抵抗目前盛行的兩種檔案汙染攻擊的程度。同時我們也探討使用者的行為對於檔案污染防治機制所帶來的影響。本篇的最後,我們提出了一個綜合兩種防治機制優點的方法,藉以創造一個更為有效率抵禦檔案汙染攻擊的P2P檔案分享系統。 | zh_TW |
| dc.description.abstract | In order to penalize unauthorized sharing of copyright-protected material in the Peer-to-Peer (P2P) systems, the music and film industries inject corrupted copies of the hit music and video clips to confuse the users and make it difficult for them to download a working copy of the desired file. Such practice is rather common and can be used by malicious users to compromise the data integrity of the P2P systems. This coexistence of corrupted and correct copies of files is referred to as file pollution in P2P systems. It does not only decrease the system performance, but also generates a large amount of traffic due to repeated downloads of the corrupted files. In this work, we evaluate the efficiency of two types of anti-pollution mechanisms on two popular pollution attacks. We also investigate how user slackness and awareness to the files influence the efficacy of the anti-pollution mechanisms. Finally, we propose a hybrid mechanism for more robust and efficient P2P system pollution protection. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-12T18:16:44Z (GMT). No. of bitstreams: 1 ntu-96-R94921027-1.pdf: 1815729 bytes, checksum: 6adfc880ea5aea75a92950297c01903e (MD5) Previous issue date: 2007 | en |
| dc.description.tableofcontents | 1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 Related Work 4 3 Methodology 7 3.1 P2P File Sharing System with Searching Capability . . . . . . . . . . . . 7 3.2 Mechanisms Description . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2.1 EigenTrust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2.2 Credence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.3 Random . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 Pollution Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.4 User Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4 Simulation Environment and Parameters 12 4.1 Simulation Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.2 Simulation Extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4.3 Parameter Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4.4 Evaluation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 5 Simulation Result 18 5.1 Anti-Pollution Mechanisms under Different Fractions of Pollution Attacks 18 5.2 General Observation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.3 Hybrid Anti-Pollution Mechanism . . . . . . . . . . . . . . . . . . . . . . 26 6 Contribution and Conclusion 33 Bibliography 34 | |
| dc.language.iso | en | |
| dc.subject | 檔案汙染防治機制 | zh_TW |
| dc.subject | 檔案汙染 | zh_TW |
| dc.subject | P2P檔案分享系統 | zh_TW |
| dc.subject | 使用者懈怠度 | zh_TW |
| dc.subject | 使用者察覺度 | zh_TW |
| dc.title | P2P 檔案污染防治機制之模擬與分析 | zh_TW |
| dc.title | A Simulation Study of P2P File Pollution Prevention Mechanisms | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 95-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 朱浩華,陳伶志 | |
| dc.subject.keyword | P2P檔案分享系統,檔案汙染,檔案汙染防治機制,使用者懈怠度,使用者察覺度, | zh_TW |
| dc.subject.keyword | P2P file sharing system,file pollution,anti-pollution mechanism,user slackness,user awareness, | en |
| dc.relation.page | 36 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2007-08-30 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-96-1.pdf 未授權公開取用 | 1.77 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
