期刊文献+

P2P文件共享系统中的恶意代码防治策略 被引量:3

A Malware Defence Strategy for P2P File-Sharing System
下载PDF
导出
摘要 目前,P2P技术已经被广泛地应用在文件共享系统中,存在多个基于P2P的文件共享软件,拥有众多用户。与此同时,也出现了针对这些P2P文件共享系统的蠕虫和病毒等恶意代码。P2P系统的分布式控制、拓扑结构动态变化等特性使得恶意代码传播更快、更难防治。文章通过分析这些P2P恶意代码的传播方式,提出了一种基于恶意代码行为特征的恶意代码识别方法,并利用这种识别方法制定了一个适合P2P文件共享系统的恶意代码防治策略来减缓、遏制恶意代码的传播。 Peer-to-Peer(P2P) has been widely adopted in file-sharing system recently.While more and more people begin to use P2P file-sharing software,many P2P worms and viruses appear and spread in those P2P file-sharing systems.The characteristics of P2P system,such as decentralized control,large scale,and extreme dynamism,make it more difficult to detect and defend malware.In this paper,we propose a P2P malware defence strategy whose core part is a baheviorbased malware detection method.This strategy can be combined with present P2P file sharing systems to restrain the spreading of malware in those systems.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第24期152-156,共5页 Computer Engineering and Applications
基金 上海市科委发展基金资助项目(编号:7A05722)
关键词 P2P 文件共享 恶意代码 P2P,file sharing system,malware
  • 相关文献

参考文献9

  • 1http://www.viruslist.com
  • 2http://www.gnutella.com
  • 3http://www.kazaa.com
  • 4Zesheng Chen,Lixin Gao,Kevin Kwiat.Modeling the Spread of Active Worms.IEEE,2003
  • 5Mark Jelasity,Maarten van Steen.Large-Scale Newscast Computing on the Internet.Amsterdam:Vrije Universiteit,2002-10
  • 6http://www.emule-proj ect.net
  • 7MD5,RFC 1321-The MD5 Message-Digest Algorithm.http://www.faqs.org/rfcs/ffc 1321.html,1992-04
  • 8William W Cohen,Pradeep Ravikumar,Stephen E Fienberg.A Comparison of String Distance Metrics for Name-Matching Tasks.American Association for Artificial Intelligence,2003
  • 9Spyros Voulgaris,Maarten van Steen.An Epidemic Protocol for Managing Routing Tables in very large Peer-to-Peer Networks.Amsterdam:Vrije Universiteit

共引文献4

同被引文献22

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部