Conducting Routing Table Poisoning Attack in DHT Networks
Although a lot of users share their information via Distributed Hash Table (I.e., DHT) network, a noticeable shortcoming of such a file-sharing system is that they can hardly preserve the users’ privacies. To address such a problem, in this paper we propose a suite of security strategies for the DHT network in BitTorrent system, such as the DHT interdiction and the DHT vulnerable examining methods. Experiments on real world data sets demonstrate that our proposed method is effective to preserve user’s privacy in DHT networks.
Haiman Lin Ruilin Ma Li Guo Peng Zhang XiaoJun Chen
Beijing University of Posts and Telecommunications University of Electronic Science and Technology of China Institute of Computing Technology, Chinese Academy of Sciences
国际会议
2010 International Conference on Communications,Circuits and Systems(2010年通信、电路与系统国际会议)
成都
英文
254-258
2010-06-28(万方平台首次上网日期,不代表论文的发表时间)