首页    期刊浏览 2024年07月06日 星期六
登录注册

文章基本信息

  • 标题:Distributed Hash Tables in P2P Network: Detection and Prevention of Threats and Vulnerability
  • 本地全文:下载
  • 作者:Mohammad Naderuzzman ; Md. Nasim Akhtar
  • 期刊名称:Computer Engineering and Intelligent Systems
  • 印刷版ISSN:2222-1727
  • 电子版ISSN:2222-2863
  • 出版年度:2013
  • 卷号:4
  • 期号:4
  • 页码:1-9
  • 语种:English
  • 出版社:International Institute for Science, Technology Education
  • 摘要:Currently the peer-to-peer search focuses on efficient hash lookup systems which can be use in building more complex distributed systems. These system works well when their algorithms are executed in right direction but generally they don’t consider how to handle misbehaving nodes. In our paper we considers different sorts of security problems which are inherent in peer-to peer systems based on distributed hash lookup systems. We examine different types of problems that this kind of systems might face, taking examples from existing systems. Here we propose some design principles for detecting as well preventing those problems. Keywords - Distributed hash lookup systems, verifiable system invariants, verifiable key assignment, Server selection in routing.
  • 关键词:- Distributed hash lookup systems; verifiable system invariants; verifiable key assignment; Server selection in routing.
国家哲学社会科学文献中心版权所有