Key Technology Research for Content Supervision Based on KAD Network

被引:0
|
作者
Li Qiang [1 ]
Tang Bo [1 ]
Yang Jie [2 ]
机构
[1] CREEC, Inst Commun & Signal, Chengdu 610031, Peoples R China
[2] CREEC, Inst Sci & Technol, Chengdu 610031, Peoples R China
关键词
KAD; content supervision; keyword ID; reverse conversion;
D O I
10.1109/ICMIP.2016.22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To solve the issue that it is difficult to monitor the content in the file sharing system because of occult of KAD message, a novel monitoring approach was proposed to obtain the content by intercepting the interactive message for a specified node on the network. First of all, the HashID for a keyword in the message of a supervised node was extracted by using ID mapping method. Secondly, a lightweight method of reverse conversion algorithm was adopted to obtain the corresponding value for a specified HashID, which can further judge the threat level for the node. Finally, the experiment was deployed on the KAD network constructed by eMule system. When ten nodes in 0X10 zone were selected as targets, the above approach was adopted to intercept the quest and publish massages sent to supervised nodes, and the semantic content for messages was obtained successfully. The result of the experiment demonstrated the necessity for network supervision, as well as the feasibility of the approach.
引用
收藏
页码:72 / 77
页数:6
相关论文
共 50 条
  • [11] A KAD Network Evolution Model Based on Node Behavior
    Wang Jian
    Feng Weisen
    CHINA COMMUNICATIONS, 2014, 11 (10) : 67 - 73
  • [12] Research on Fintech Supervision Model Based on Block Chain Technology
    Feng, Wei
    2018 4TH INTERNATIONAL CONFERENCE ON ECONOMICS, MANAGEMENT AND HUMANITIES SCIENCE (ECOMHS 2018), 2018, : 429 - 434
  • [13] Research, supervision, and the network society
    Dennison, Carmel
    RESEARCH IN POST-COMPULSORY EDUCATION, 2009, 14 (02) : 189 - 201
  • [14] Research on key escrow technology Based on software
    Yu, Zhengli
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [15] Research on Key Technology of Animation Scene Based on Computer Technology
    Xin, Guo
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 699 - 702
  • [16] Research on the network security supervision practical guide mode based on network resource
    Luo, Gaofeng
    Huang, Tongcheng
    Shi, Zijuan
    Information Technology Journal, 2013, 12 (23) : 7193 - 7200
  • [17] Development of standards and research on key technology in passive optical network
    Yao, Lin-Yuan
    Song, Fei
    Zhang, Hong-Ke
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (03): : 557 - 567
  • [18] Research of key technology for CAINONET network performance monitor system
    Yang, GW
    Liu, C
    Wang, Z
    Cao, Y
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 503 - 506
  • [19] Research on Key Technology of Fault Diagnosis for Vehicle Network System
    Tu, Chaoqun
    2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021), 2021, : 370 - 373
  • [20] Research on key technology of transmission and OPGW line hidden danger prediction based on neural network
    Wang X.
    Liang G.
    Li Q.
    Cui L.
    Hu C.
    Wang X.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)