会议专题

Conducting Routing Table Poisoning Attack in DHT Networks

Although a lot of users share their information via Distributed Hash Table (I.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users’ privacies. To address such a problem, in this paper we propose a suite of security strategies for the DHT network in BitTorrent system, such as the DHT interdiction and the DHT vulnerable examining methods. Experiments on real world data sets demonstrate that our proposed method is effective to preserve user’s privacy in DHT networks.

Haiman Lin Ruilin Ma Li Guo Peng Zhang XiaoJun Chen

Beijing University of Posts and Telecommunications University of Electronic Science and Technology of China Institute of Computing Technology, Chinese Academy of Sciences

国际会议

2010 International Conference on Communications,Circuits and Systems(2010年通信、电路与系统国际会议)

成都

英文

254-258

2010-06-28(万方平台首次上网日期,不代表论文的发表时间)