Font Size: a A A

Research On Security Of JXTA P2P Application

Posted on:2007-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2178360185486897Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer and communication technology, Peer to Peer network technology has obtained huge success. P2P can be well used in distributed-search, distributed-computing and cooperate-computing. But,because the safety problem has not been well solved,which limits it's application and development seriously. So it can not replace the existing B/S and C/S to apply mode so far and be accepted by the great majority company. Therefore, the research about safety of P2P has been a hotspot and nodus in network field recently. Though many experts and technician carried on a lot of works in this realm, and alleviated the rigorous situation of the safety of the P2P to some extent. For example, the P2P platform—JXTA of the SUN carried on an improvement to the safety , but it still hard to match the tremendous needs of P2P and satisfy the user' s needs.By analyzed the characteristic about resources share of P2P, this paper put forward an idea about share security log and resources on each Peer in P2P network. Which use the common defense, counter-attacking together etc. methods and adopt such as saving security log on other peer, analysis on other peer, scout the dangerous peer on other peers, counter-attack combined with other peers, mutually support in whole network, technology of mutually notifying. It will improve the safety of P2P network. According to this thought, the paper design a safe model based on P2P application and implement it on JXTA platform of SUN. It shows this safety management thought is effectual and convenient.Moreover, because of the information asymmetry between the defence and the attack, a mathematics model , a game model and a credit evaluation model are setup in the paper. What' s more, the security charactistics of the defence and the attack is analyzed in the meawhile. These models constitute the theoretical base of the anti-attack technology and the sharing technology of the security resources. There are four parts in this paper. In the first one, the development situation and the charactistics of the network security is introduced; In the second one, the implement and the analyse of the information asymmetry, the game model and the credit evaluation model are studied; In the third one, the design model based on the sharing technology of the security resources is setup in order to improve the P2P security.Finally, an application case based on the model system is brought out and the implement shortage and development direction of the system is point out in the end of the paper.
Keywords/Search Tags:P2P, Security log, Counter-attacking, Information Asymmetry
PDF Full Text Request
Related items