FIELD: protocols for interaction of peer entities of network structure and, in particular, concerns protective infrastructures for protocols of interaction of peer entities.
SUBSTANCE: methods are provided, which suppress capability of malicious node to disrupt normal operation of peer-to-peer network. Claimed methods allow nodes to use both protected and unprotected data about identity, ensuring self-check thereof. Then necessary or comfortable, association of ID is checked by "enclosing" a trustworthiness checking procedure into appropriate messages. Probability of connection to malicious node is initially reduced due to random selection of node with which connection is established. Also, information from malicious nodes is identified and may be discarded by recording information about previous connections, which will require a response in the future.
EFFECT: creation of protection infrastructure for a system with peer-to-peer network structure.
4 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
NAMES RESOLUTION PROTOCOL FOR WIRE CONNECTION OF EQUIVALENT DEVICES AND STRUCTURE OF MESSAGE FORMAT DATE USED IN IT | 2004 |
|
RU2385488C2 |
SYSTEM AND METHOD TO COMBINE PASSIVE AND ACTIVE MODES | 2008 |
|
RU2454820C2 |
PEER-TO-PEER CONTACT EXCHANGE | 2007 |
|
RU2444054C2 |
METHOD FOR ESTABLISHMENT OF CONNECTION | 2008 |
|
RU2460231C2 |
METHOD, SYSTEM AND DEVICE FOR SUPPORT OF HIERARCHICAL MOBILE IP SERVICE | 2004 |
|
RU2368086C2 |
METHOD FOR AUTOMATIC CLASSIFICATION OF NETWORK TRAFFIC BASED ON HEURISTIC ANALYSIS | 2018 |
|
RU2690758C1 |
ONE-RANGE CONTENT DELIVERY NETWORK, METHOD AND CONTROL DEVICE | 2014 |
|
RU2633111C1 |
SYSTEM FOR ORGANIZING DECENTRALIZED TRUSTED COMMUNICATION | 2024 |
|
RU2839571C1 |
ROUTING IN SELF-ORGANISING PEER-TO-PEER NETWORK | 2005 |
|
RU2369976C2 |
WIRELESS COMMUNICATION DEVICE, INFORMATION PROCESSING DEVICE AND METHOD OF COMMUNICATION | 2013 |
|
RU2630752C2 |
Authors
Dates
2008-03-20—Published
2003-04-24—Filed