信息网络安全 ›› 2015, Vol. 15 ›› Issue (2): 46-50.doi: 10.3969/j.issn.1671-1122.2015.02.008

• • 上一篇    下一篇

Kad网络协议研究与实验

熊梅(), 周安民   

  1. 四川大学电子信息学院,四川成都 610064
  • 收稿日期:2014-10-28 出版日期:2015-02-10 发布日期:2015-07-05
  • 作者简介:

    作者简介: 熊梅(1989-),女,四川,硕士研究生,主要研究方向:信息系统安全;周安民(1963-),男,四川,研究员,主要研究方向:信息安全体系、关键技术和产品的研究、开发。

Analysis and Experiment of Kad Network Protocol

Mei XIONG(), An-ming ZHOU   

  1. College of Electronics and Information, Sichuan University, Chengdu Sichuan 610064, China
  • Received:2014-10-28 Online:2015-02-10 Published:2015-07-05

摘要:

Kad作为一种开放性的网络协议,为深入研究和改进Kad网络协议提供了可能性。文章在对Kad客户端系统的体系结构进行整体分析后,结合其开放源码的静态测试,从用户隐私、内容隐私和服务器及节点文件这3个方面来研究Kad协议通信的安全性,并指出协议的缺陷和潜在的威胁。同时,每个研究均从原理和实验数据进行具体的分析和研究,对Kad客户端的数据通信的主要方法进行剖析。最后,针对协议不同的威胁提出相应的解决方案, 识别出了设计实现中主要的抽象类,通过抽象类的方法改进,使得存在的威胁降低到使用者的可接受范围内,这样不仅保证了用户能拥有安全的Kad网络环境,也可以为Kad网络安全、查询策略、拓扑优化等领域提供实际的数据基础和必要的实验结论。

关键词: Kad协议, 安全保密, 性能, 研究

Abstract:

As an open network protocol, Kad makes the further research and improvement of its network protocol possible. After the systematic analysis of the whole Kad’s architecture,and combined with the static testing upon the open source, we study the security of the Kad protocol’s communication from the user,s privacy, the privacy of content, the files of servers list and nodes list,noted the defects and the potential threat of the protocol. At the same time,each aspects’ studing analysis and research of the experimental data are all based on the main interface of the data communication of the Kad software. Finally, facing different threats of the protocol, we offer different solutions which are based on the design and implementation of the major abstract class, then we can not only decrease the threat to the acceptable range of users and ensure that the users have a secure network environment, but also provide the data base and experimental conclusions for Kad network security, query strategy, topology optimization and so on.

Key words: kad protocol, security and secrecy, performance, research

中图分类号: