检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]四川大学计算机学院,四川成都610065 [2]四川大学锦城学院,四川成都611731
出 处:《四川大学学报(工程科学版)》2013年第1期133-137,共5页Journal of Sichuan University (Engineering Science Edition)
摘 要:为了解决由于KAD消息的隐匿性造成对文件共享系统中内容难以监督的问题,一种通过对网络中指定节点的交互消息进行截获,并快速提取出对应消息内容的监督方法被提出。首先,对确定的目标节点使用ID名称映射方法,从消息中提取出其中的关键字HashID值。其次,使用轻量级的ID值逆向转换算法得到对应的语义内容,利用转换后的内容可进一步对该节点的威胁程度进行判定。最后,在eMule系统搭建的KAD网络中部署了实验,将0X10区域内10个节点作为监督对象,使用上述监督方法对发往目标节点的查询与发布请求消息进行拦截,并成功地得到对应的语义内容。实验结果表明了对网络监督的必要性以及该方法的可行性。To solve the issue that it is difficult to monitor the content on the KAD network because of occult of KAD message, a novel monitoring approach was proposed to obtain the content by intercepting the interactive message for a specified node on the network. First of all, the HashID for a keyword in the message of a supervised node was extracted by using ID mapping method. Secondly, a lightweight method of reverse conversion algorithm was adopted to obtain the corresponding value for a specified HashID, which can further judge the threat level for the node. Finally, the experiment was deployed on the KAD network constructed by eMule system. When ten nodes in OX10 zone were selected as targets, the above approach was adopted to intercept the quest and publish massages that send to supervised nodes, and the semantic content for messages is obtained successfully. The result of the experiment demonstrated the necessity for network supervision, as well as the feasibility of the approach.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.63