Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Distributed System Based Node Property Identification Method

A distributed system and identification method technology, applied in the field of computer distributed systems, can solve problems such as difficulty in effectively fighting Sybil attacks, and achieve the effect of fighting attacks

Active Publication Date: 2021-01-12
CHINA JILIANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the existing technology is still difficult to effectively resist Sybil attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed System Based Node Property Identification Method
  • A Distributed System Based Node Property Identification Method
  • A Distributed System Based Node Property Identification Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but the present invention is not limited to these embodiments. The present invention covers any alternatives, modifications, equivalent methods and schemes made within the spirit and scope of the present invention.

[0026] In order to provide the public with a thorough understanding of the present invention, specific details are set forth in the following preferred embodiments of the present invention, but those skilled in the art can fully understand the present invention without the description of these details.

[0027] In the following paragraphs the invention is described more specifically by way of example with reference to the accompanying drawings. It should be noted that all the drawings are in simplified form and use inaccurate scales, which are only used to facilitate and clearly assist the purpose of illustrating the embodiments of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for identifying node properties based on a distributed system, comprising the following steps: treating participants who apply for resources or provide resources in the distributed system as nodes; the nodes include good faith nodes and Sybil nodes (malicious nodes) and pending nodes; if there is a record of providing resources or obtaining resources between nodes, it is considered to form a connection edge; when the pending node sends out a resource application as the applicant, it is assumed that the participant that receives the resource application and provides resources is a bona fide node. In the random routing, the characteristics of the applicant node are extracted, and based on this, the nature of the pending node that sends out the resource application is identified, so as to decide whether to provide resources to it. The invention can effectively identify Sybil nodes, so as to resist Sybil attacks.

Description

technical field [0001] The invention relates to the technical field of computer distributed systems, in particular to a distributed system-based node property identification method. Background technique [0002] Due to the characteristics of distribution, openness and anonymity in distributed systems, it is vulnerable to attacks. Sybil attack (can be translated as Sybil attack) refers to an attack method in which users can create multiple false identities and use these identities to control or affect a large number of normal nodes in the system. Resource sharing (such as file download) is an important application in distributed systems. A node that normally provides resources is called a good-faith node; if a node only obtains resources from other nodes and does not provide resources to other nodes, such a node is called a Sybil node. [0003] A trusted central certification authority can effectively prevent Sybil attacks by assigning unique identifiers to each node. But ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K9/62G06N3/04G06N3/08G06N20/10H04L12/733H04L12/751H04L45/02H04L45/122
CPCH04L63/1416G06N3/04H04L2463/146H04L45/02H04L45/122Y02D30/70
Inventor 许翔
Owner CHINA JILIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products