论文部分内容阅读
近年来,随着P2P技术的广泛应用,网络攻击者利用P2P环境进行窃密,以及超大规模拒绝服务攻击成为可能。这种攻击一旦得逞,就会对国家的基础网络通信,以及金融、电力、政务等诸多关乎国计民生的重要网络信息系统产生恶劣影响。本文在详细分析P2P攻击的原理、流程、实现方式的基础上,提出建立P2P攻击的防御体系架构模型,对攻击方的P2P攻击控制链进行断裂,从而切断P2P攻击的攻击路径。
In recent years, with the wide application of P2P technology, it is possible for cyber attackers to exploit the P2P environment for theft and ultra-large-scale denial of service attacks. Once such an attack succeeds, it will have an adverse effect on the country’s basic network communications as well as on important network information systems concerning the national economy and people’s livelihood such as finance, power and government affairs. Based on the detailed analysis of the principle, process and implementation of P2P attacks, this paper proposes a defense architecture model for P2P attacks, which breaks the P2P attack control chain of the attacker and cuts off the attack path of P2P attacks.