Font Size: a A A

Research On BITTORRENT Information Content Security Management Technology

Posted on:2011-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2348330533968707Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years,with the rapid development of Internet,P2 P network applications become more popular,the most important application is Bit Torrent.Extensive using of Bit Torrent brings a lot of convenience to transport piracy,for copyright protection is a big shock.In order to restrict the spreading of pirated software,audio and video files,this paper analyzes of the Bit Torrent protocol and implementation,tries to exploit its defects for Information Content Security Management,controlling the unaccredited file spreading in the Bit Torrent network.In this paper,we analyze and summarize the current Bit Torrent control technology,found that P2 P control technology research at home and abroad focused on P2 P traffic identification and block on the network edge router,some index muddle attack again structured P2 P network,seeders attack and lechers attack.All these technologies have certain limitations,the actual result is not effective.Therefore,Systematic study of P2 P Information Content Security technology is very meaningful,this paper will research P2 P Information Security system based on index Muddle and data Muddle technologies.Firstly,this paper analyzes the Bit Torrent protocol and its implementation,especially in two phases,the node acquiring and data acquiring,detailed analysis of the message formats and interaction process.Secondly,this paper proposes various management methods,including the index muddle and data muddle,aiming to different downloading stages.This paper also designs data muddle schedule system,which schedules fake nodes muddle downloading nodes' pieces,maximizing management effect.Finally,this paper designs experiments for various index muddle and data muddle methods.The experimental results present that various management methods are effective.
Keywords/Search Tags:BitTorrent, Index Muddle Attack, Data Muddle Attack, Data Muddle Schedule
PDF Full Text Request
Related items