Key Technology Research for Content Supervision Based on KAD Network

被引:0
|
作者
Li Qiang [1 ]
Tang Bo [1 ]
Yang Jie [2 ]
机构
[1] CREEC, Inst Commun & Signal, Chengdu 610031, Peoples R China
[2] CREEC, Inst Sci & Technol, Chengdu 610031, Peoples R China
关键词
KAD; content supervision; keyword ID; reverse conversion;
D O I
10.1109/ICMIP.2016.22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To solve the issue that it is difficult to monitor the content in the file sharing system because of occult of KAD message, a novel monitoring approach was proposed to obtain the content by intercepting the interactive message for a specified node on the network. First of all, the HashID for a keyword in the message of a supervised node was extracted by using ID mapping method. Secondly, a lightweight method of reverse conversion algorithm was adopted to obtain the corresponding value for a specified HashID, which can further judge the threat level for the node. Finally, the experiment was deployed on the KAD network constructed by eMule system. When ten nodes in 0X10 zone were selected as targets, the above approach was adopted to intercept the quest and publish massages sent to supervised nodes, and the semantic content for messages was obtained successfully. The result of the experiment demonstrated the necessity for network supervision, as well as the feasibility of the approach.
引用
收藏
页码:72 / 77
页数:6
相关论文
共 50 条
  • [21] Research On The Key Technology Of Full-Service Complex Content Creation Based On Digital New Media
    Wang, Yanfeng
    Song, Qing
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 1162 - 1165
  • [22] Research of Content Based Image Retrieval Technology
    Yang, Hechao
    Zhou, Xuemei
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 314 - 316
  • [23] Key Technology Based on Network Pharmacology of Complex Networks
    Zhou, Xian
    Huang, Liping
    Xiong, Wangping
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 212 - 216
  • [24] The key technology of computer network vulnerability assessment based on neural network
    Shaoqiang Wang
    EURASIP Journal on Wireless Communications and Networking, 2020
  • [25] The key technology of computer network vulnerability assessment based on neural network
    Wang, Shaoqiang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [26] Research on Key Technology of Airport Simulation Based on OSG
    Liu Kun-Liang
    Zhang Da-Kun
    MANUFACTURING SCIENCE AND TECHNOLOGY, PTS 1-8, 2012, 383-390 : 2685 - 2690
  • [27] The Research of Key Technology in Flash-based DBMS
    Liu, Lin
    Xu, Lizhen
    2009 SIXTH WEB INFORMATION SYSTEMS AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2009, : 15 - 18
  • [28] Research on Construction Engineering Quality Supervision Based on Artificial Neural Network
    Han, Guo-bo
    Zhang, Li-ning
    ADVANCED CONSTRUCTION TECHNOLOGIES, 2014, 919-921 : 1471 - +
  • [29] Research and Application in the Key Technology of Wireless Sensor Network Location System
    Shi Chunhe
    Han Xiaowei
    Yuan Zhonghu
    Yang Daquan
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 484 - 487
  • [30] Research progress in the key device and technology for fiber optic sensor network
    Deming Liu
    Qizhen Sun
    Ping Lu
    Li Xia
    Chaotan Sima
    Photonic Sensors, 2016, 6 : 1 - 25