{"title":"内容共享网络骨干节点上的长轨道","authors":"Qiang Lu, Bo Liu, Huaping Hu","doi":"10.1109/ICCSNT.2017.8343728","DOIUrl":null,"url":null,"abstract":"As a kind of sharing platform for files, information and resources, Content Sharing Networks (CSNs) are faced with a serious security situation of swarming malicious files, illegal information and spywares, especially the mainstream P2P (Peer-to-Peer) CSNs. Apart from the familiar importance for the rapid development and wide application of CSNs, backbone nodes should have been paid more attention for their significance to monitor and mitigate malicious sharing contents. In this paper, we proposed a comprehensive and effective determining method named MED to distinguish backbone nodes during the longest ever tracking and in-depth analysis of CSNs for nearly four years.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A long track on backbone nodes of content sharing networks\",\"authors\":\"Qiang Lu, Bo Liu, Huaping Hu\",\"doi\":\"10.1109/ICCSNT.2017.8343728\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a kind of sharing platform for files, information and resources, Content Sharing Networks (CSNs) are faced with a serious security situation of swarming malicious files, illegal information and spywares, especially the mainstream P2P (Peer-to-Peer) CSNs. Apart from the familiar importance for the rapid development and wide application of CSNs, backbone nodes should have been paid more attention for their significance to monitor and mitigate malicious sharing contents. In this paper, we proposed a comprehensive and effective determining method named MED to distinguish backbone nodes during the longest ever tracking and in-depth analysis of CSNs for nearly four years.\",\"PeriodicalId\":163433,\"journal\":{\"name\":\"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSNT.2017.8343728\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSNT.2017.8343728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A long track on backbone nodes of content sharing networks
As a kind of sharing platform for files, information and resources, Content Sharing Networks (CSNs) are faced with a serious security situation of swarming malicious files, illegal information and spywares, especially the mainstream P2P (Peer-to-Peer) CSNs. Apart from the familiar importance for the rapid development and wide application of CSNs, backbone nodes should have been paid more attention for their significance to monitor and mitigate malicious sharing contents. In this paper, we proposed a comprehensive and effective determining method named MED to distinguish backbone nodes during the longest ever tracking and in-depth analysis of CSNs for nearly four years.