Key Technology Research for Content Supervision Based on KAD Network

被引:0
|
作者
Li Qiang [1 ]
Tang Bo [1 ]
Yang Jie [2 ]
机构
[1] CREEC, Inst Commun & Signal, Chengdu 610031, Peoples R China
[2] CREEC, Inst Sci & Technol, Chengdu 610031, Peoples R China
关键词
KAD; content supervision; keyword ID; reverse conversion;
D O I
10.1109/ICMIP.2016.22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To solve the issue that it is difficult to monitor the content in the file sharing system because of occult of KAD message, a novel monitoring approach was proposed to obtain the content by intercepting the interactive message for a specified node on the network. First of all, the HashID for a keyword in the message of a supervised node was extracted by using ID mapping method. Secondly, a lightweight method of reverse conversion algorithm was adopted to obtain the corresponding value for a specified HashID, which can further judge the threat level for the node. Finally, the experiment was deployed on the KAD network constructed by eMule system. When ten nodes in 0X10 zone were selected as targets, the above approach was adopted to intercept the quest and publish massages sent to supervised nodes, and the semantic content for messages was obtained successfully. The result of the experiment demonstrated the necessity for network supervision, as well as the feasibility of the approach.
引用
收藏
页码:72 / 77
页数:6
相关论文
共 50 条
  • [1] Key technology research for content supervision based on KAD network
    Wang, Jian
    Feng, Wei-Sen
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2013, 45 (01): : 133 - 137
  • [2] RESEARCH AND IMPLEMENT OF THE KEY TECHNOLOGY FOR IP QOS BASED ON NETWORK PROCESSOR
    Li, Min
    Ma, Biao
    Zhang, Wei-wei
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 1004 - 1007
  • [3] Research of Network Business Identification Key Technology
    He, Zhenfeng
    Tan, Shunhua
    Ma, Haojian
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 605 - 608
  • [4] The Research on Network Security Visualization Key Technology
    Li, Xiaoyan
    Wang, Qingxian
    Yang, Lin
    Luo, Xiangyang
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 983 - 988
  • [5] Research on network-based collaborative commodity design key technology development
    Wang, Yantao
    Ying, Hua
    Xing, Yifei
    PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 892 - +
  • [6] The Research on Video Supervision Technology based on Mathematical Morphology
    Shao Bin
    Jiang Yunliang
    Yang Zhen
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 57 - 60
  • [7] A-Kad: an anonymous P2P protocol based on Kad network
    Ni, YongQing
    Nyang, DaeHun
    Wang, Xu
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 978 - 983
  • [8] Emergency communication network design and key technology research
    Meng, Jin
    Liu, Hongyan
    Zhang, Xiao
    Xing, Mingshun
    Li, Hui
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 425 - 428
  • [9] Research on Key Technology of Space Laser Communication Network
    Chang Chengwu
    Huang Huiming
    Liu Hongyang
    Gao Shenghua
    Cheng Liyu
    OPTICAL COMMUNICATION AND OPTICAL FIBER SENSORS AND OPTICAL MEMORIES FOR BIG DATA STORAGE, 2016, 10158
  • [10] Research on the Key Technology of Distributed Network Management System
    Ran, Xu
    Zhong, Ming
    Qiao, Liang
    Cheng, Fang
    Xiong, Yali
    Liu, Jia
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1346 - 1352