首页 | 官方网站   微博 | 高级检索  
     

P2P软件监管模型研究
引用本文:段琪,蔡皖东,赵涛.P2P软件监管模型研究[J].微电子学与计算机,2006,23(3):30-33.
作者姓名:段琪  蔡皖东  赵涛
作者单位:西北工业大学计算机学院,陕西,西安,710072
基金项目:西北工业大学校科研和教改项目
摘    要:P2P技术正在迅猛发展,但也给国家安全、知识产权、网络资源占用等方面带来许多负面影响.所以必须对其实施有效的监控以期降低这些影响的危害程度。文章提出了一种基于目录服务器的P2P软件监管模型.通过数据库复制、多关键字模糊匹配等技术实现对目录服务器的监控,从而对有害文件的发布者进行定位井采取相关措施,防止有害文件的传播;通过设置陷阱和网络监听技术对有害文件的提取者进行定位井采取相关措施。

关 键 词:数据库复制  模糊匹配  陷阱  监听
文章编号:1000-7180(2006)03-004
收稿时间:2005-07-08
修稿时间:2005年7月8日

Research of the P2P Software Monitoring Model
DUAN Qi,CAI Wan-dong,ZHAO Tao.Research of the P2P Software Monitoring Model[J].Microelectronics & Computer,2006,23(3):30-33.
Authors:DUAN Qi  CAI Wan-dong  ZHAO Tao
Abstract:In spite of the rapid development of the technology of P2P, meanwhile it has also brought about negative impact in such areas as national security, knowledge property and occupation of network resources, so it's necessary that we implement effective monitoring to reduce such risk. This essay is on a P2P software monitoring model based upon catalogue service which can supervise the catalogue service through such technique as database replication and Obscure matching based on multi-,and as a result we can ,on one hand, position the publisher of harmful file and take certain measures to prevent the spread of dangerous file, and on the other hand we can also position the extractor of these files through setting pitfall and network monitoring and thus take corresponding measures.
Keywords:P2P
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号