請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29951完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 周承復 | |
| dc.contributor.author | Ko-Jo Lee | en |
| dc.contributor.author | 李可柔 | zh_TW |
| dc.date.accessioned | 2021-06-13T01:26:56Z | - |
| dc.date.available | 2012-08-09 | |
| dc.date.copyright | 2011-08-09 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-08-02 | |
| dc.identifier.citation | [1] P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. The pollution attack in p2p live video streaming systems: Measurement results and defenses. In In Proc. ACM
SIGCOMM’07(P2P-TV’07), 2007. [2] J. Jia and C. Chen. A mesh check scheme against p2p live streaming attacks. In Qshine, 2008. [3] J. A. Pouselse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. V. Steen, and H. J. Sips. Tribler: A social-based peer-to-peer system. In IEEE International Workshop on Peer-to-Peer Systems (IPTPS’06), 2006. [4] PPLive. http://www.pptv.com/. [5] PPStream. http://www.ppstream.com/. [6] M. J. Probst, J. C. Park, R. Abraham, and S. K. Kasera. Socialswarm: Exploiting distance in social networks for collaborative flash file distribution. In IEEE Interna- tional Conference on Network Protocols (ICNP’10), 2010. [7] D. Quercia and S. Hailes. Sybil attacks against mobile users: Friends and foes to the rescue. In INFOCOM’10, 2010. [8] J. Seibert, X. Sun, C. Nita-Rotaru, and S. rao. Towards securing data delivery in peer-to-peer streaming. In IEEE Conference on Commmunication Systems and Net- works (COMSNETS’10), 2010. [9] M. Sirvianos, K. Kim, and X. Yang. Socialfilter: Introducing social trust to collaborative spam mitigation. In INFOCOM’11, 2011. [10] A. B. Vieira, S. Campos, and J. Almedia. Fighting attacks in p2p live streaming: simpler is better. In Proceeding INFOCOM’09 Proceedings of the 28th IEEE inter- national conference on Computer Communications Workshops, 2009. [11] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN’09), August 2009. [12] M. Zhang. Gridmedia project. http://media.cs.tsinghua.edu.cn/˜zhangm/. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/29951 | - |
| dc.description.abstract | 點對點串流系統在近年來非常受歡迎且十分普及,由於給個使用者在下載資料同時也提供它的上傳頻寬,使得系統規模能較為彈性。但在是因為在這樣分散式的架構下,容易遭受惡意使用者的攻擊。攻擊者進入系統中,傳送受汙染過的資料,使得整體系統收視品質下降。本論文提出了關於點對點即時串流系統污染問題的防治。我們運用以雜湊函數為基礎,使資料與資料之間有關連性,資料可以互相被驗證,每個使用者可以自行檢驗收到的資料是否正確。另外加上社群網路的協助,擁有相同興趣的朋友會同時在線上收看,利用這層關係,假設從朋友而來的資料是對的,可使我們的系統達到更高的檢測機率,進而快速降低攻擊者所造成的影響。透過模擬實驗的結果,看到我們的方法比起其他現存方法十分有效。 | zh_TW |
| dc.description.provenance | Made available in DSpace on 2021-06-13T01:26:56Z (GMT). No. of bitstreams: 1 ntu-100-R98922063-1.pdf: 2639351 bytes, checksum: f6d00e7092e7673e1eb707814266d565 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | 致謝 ii
中文摘要 iii Abstract iv 1 Introduction 1 2 Related Works 4 3 System Overview 6 3.1 System Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.2 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.3 Attacker Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4 Hash-Based Checking Scheme 9 4.1 Defence Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4.2 Hash-Based Checking Scheme . . . . . . . . . . . . . . . . . . . . . . . 9 4.2.1 Maximum Number of Hash Redundancies . . . . . . . . . . . . . 10 4.2.2 Chunk Request Policies . . . . . . . . . . . . . . . . . . . . . . 12 4.2.3 Checking Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . 12 v4.2.4 Evaluation Scheme . . . . . . . . . . . . . . . . . . . . . . . . . 12 5 Hash-Based Social-Assisted Scheme 14 5.1 Social-Assisted Chunk Request Policies . . . . . . . . . . . . . . . . . . 14 5.2 Find Friend as Neighbor with Higher Priority . . . . . . . . . . . . . . . 15 5.3 Holding Unverified Chunks . . . . . . . . . . . . . . . . . . . . . . . . . 15 5.4 Broadcast Suspicious Polluter Message to Friends . . . . . . . . . . . . . 16 5.5 Social-Assisted Neighbor Evaluation Scheme . . . . . . . . . . . . . . . 16 6 Simulation 18 6.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 6.1.1 Parameter Setting . . . . . . . . . . . . . . . . . . . . . . . . . . 18 6.1.2 Social Network Trace . . . . . . . . . . . . . . . . . . . . . . . . 19 6.2 Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 6.2.1 Effect of Chunk Group Size . . . . . . . . . . . . . . . . . . . . 20 6.2.2 Effect of Friend View . . . . . . . . . . . . . . . . . . . . . . . . 21 6.2.3 Effect of Holding Unverified Chunks . . . . . . . . . . . . . . . 21 6.2.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 6.3 Effect of Polluter Numbers . . . . . . . . . . . . . . . . . . . . . . . . . 23 6.3.1 Different Peer Join Strategies . . . . . . . . . . . . . . . . . . . 23 6.3.2 Static Environment . . . . . . . . . . . . . . . . . . . . . . . . . 24 6.3.3 Dynamic Environment . . . . . . . . . . . . . . . . . . . . . . . 29 7 Conclusion 34 Bibliography 35 | |
| dc.language.iso | en | |
| dc.subject | 社群網路 | zh_TW |
| dc.subject | 點對點及時串流系統 | zh_TW |
| dc.subject | 攻擊 | zh_TW |
| dc.subject | Pollution Attack | en |
| dc.subject | Social Network | en |
| dc.subject | P2P Live Streaming System | en |
| dc.title | 以雜湊函數為基礎加上社群網路輔助之點對點即時串流系統污染問題的防治 | zh_TW |
| dc.title | A Hash-Based Social-Assisted Pollution Mitigation Scheme for P2P Live Streaming System | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 吳曉光,林俊宏,林嘉文,張英超 | |
| dc.subject.keyword | 點對點及時串流系統,攻擊,社群網路, | zh_TW |
| dc.subject.keyword | P2P Live Streaming System,Pollution Attack,Social Network, | en |
| dc.relation.page | 36 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2011-08-03 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 資訊工程學研究所 | zh_TW |
| 顯示於系所單位: | 資訊工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf 未授權公開取用 | 2.58 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
