期刊文献+

蠕虫在P2P网络中的传播研究 被引量:5

Research on Propagation of Worms in P2P Networks
下载PDF
导出
摘要 P2P蠕虫是利用P2P机制进行传播的恶意代码。通过P2P节点的共享列表,蠕虫很容易获得攻击目标的信息,所以其爆发时传播速度很快,这种大量的快速传播导致的直接后果是网络阻塞。该文分析蠕虫在P2P网络中的传播原理,在经典病毒传播模型基础上提出了考虑带宽及治愈响应起始时间因素的蠕虫传播模型,从带宽饱和与阻塞两个方面分析带宽对蠕虫传播的影响,在此基础上分析了蠕虫的防御措施。通过模拟实验,该模型能够较真实地描述蠕虫大规模爆发时引起带宽拥塞的情况。 The P2P-based worm is a kind of malicious code that takes advantage of P2P system to propagate. Because hosts in P2P system maintain a lot of neighbors list, infected hosts in P2P systems can easily propagate the worms to its neighbors. It can spread with high speed, which would lead to network congestion. This paper addresses the ssue by analyzing the theory of P2P worm's propagation and presents a mathematical model that takes into account bandwidth and the time of treatment response. In particular, it studies bandwidth affecting the worm propagation in the aspects of saturation and congestion. Furthermore, it studies the measure of defense based on the propagating model. From the simulation experiment, it can describe the process of worm's propagation in a P2P system.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第8期139-141,147,共4页 Computer Engineering
基金 中国工程物理研究院面上基金资助项目(20050657 20060651)
关键词 蠕虫 P2P系统 传播模型 防御措施 Worms Peer-to-peer (P2P) system Propagation model Defense measure
  • 相关文献

参考文献6

  • 1Zhou Lidong, Zhang Lintao, McSherry F. A First Look at Peer-to-Peer Worms: Threats and Defenses[C]//Proc. of IPTPS'05. 2005-02.
  • 2Hethcote H W. The Mathematics of Infectious Diseases[J]. SIAM Review, 2000, 42(4): 599-653.
  • 3Serazzi G, Zanero S. Computer Virus Propagation Models[C]//Proc. of the 11^th IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Tutorials.2003: 26-50.
  • 4Zou C C, Gong W, Towsley D. Code Red Worm Propagation Modeling and Analysis[C]//Proceedings of the 9^th ACM Conference on Computer and Communications Security. ACM Press, 2002:138-147.
  • 5Yu W, Boyer C, Xuan D. Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm attacks[R]. Computer Science Dept.,Texas A&M University, 2004.
  • 6Moore D, Paxson V, Savage S, et al. Inside the Slammer Worm[J]. IEEE Magazine of Security and Privacy, 2003, 1(4): 33-39.

同被引文献23

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部