期刊文献+

双层架构的P2P Botnet研究 被引量:1

Analysis of P2P Botnet of two-tier structure
下载PDF
导出
摘要 Botnet(僵尸网络)是由bot(僵尸主机)组成的可通信、可被攻击者控制的网络,而P2P botnet是一种利用P2P技术构建控制信道的僵尸网络。对比于以往具有明显追踪特征的P2P botnet而言,一种基于双层架构的P2Pbotnet在控制感染主机方面采用了更加隐蔽和灵活的方式,使追踪难度增大。通过模拟实验对基于这种通信控制模型的僵尸网络进行了功能和性能方面的研究,并提出了相应的防御与追踪方案。 A collection of bots connected to a network which is controlled by attackers is called a Botnet, P2P botnets are bots that use P2P technology to accomplish certain tasks, The two-tier structure P2P botnet is more hidden and flexible in controlling infected host, while the existing P2P botnets only have obvious tracking features. Its functions and performance are critically studied both from experiments and theoretical analysis, In addition, the corresponding defense and tracking schemes are given.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第11期2724-2726,2747,共4页 Computer Engineering and Design
关键词 僵尸网络 双层架构 感染 再感染 防御策略 botnet two-tier structure infection reinfection defense strategy
  • 相关文献

参考文献8

  • 1Lurhq Threat Intelligence Group.Sinit P2P Trojan analysis[EB/OL].http://www.lurhq.com/sinit.html,2003.
  • 2Lurhq Threat Intelligence Group.Phatbot Trojan analysis[EB/OL].http://www.lurhq.com/phatbot.html,2004.
  • 3Reinier Schoof,Ralph Koning.Detecting peer-to-peer bornets[EB/OL].http://staff.science.uva.nl/-delaat/sne-2006-2007/p17/report.pdf,2007.
  • 4Ping Wang,Sherri Sparks,Cliff C Zou.An advanced hybrid peer-to-peer botet[EB/OL].http://www.usenix.org/events/hotbots07/tech/full_papers/wang/wang.pdf,2007.
  • 5诸葛建伟,韩心慧,叶志远,等.僵尸网络的发现与跟踪[C].全国网络与信息安全技术研讨会,2005.
  • 6Bruce Schneier.应用密码学[M].北京:机械工业出版社,2000.
  • 7Eng Keong Lua,Jon Crocroft.A survey and comparison of peerto-peer overlay network schemes[EB/OL].http://www.cl.cam.ac.uk/teaching/2005/AdvSysTop/survey.pdf,2005.
  • 8Julian B Grizzard,Bikram Sharrna,Chris Nunnery.Peer-to-peer botnets:Overview and case study[EB/OL].http://www.usenix.org/events/hotbots07/tech/full_papers/grezzard/grizzard_html/,2007.

共引文献15

同被引文献12

  • 1王斌,潘文锋.基于内容的垃圾邮件过滤技术综述[J].中文信息学报,2005,19(5):1-10. 被引量:129
  • 2Symantec Inc.Symantec's global internet security threat report [R].Symantec,2008:5-6.
  • 3Banday M T, Qadri J A, Shah N A.Study of Botnets and their threats to intemet security[EB/OL].Sprouts: Working Papers on Information Systems,http://sprouts.aisnet.org/9-24,2009-07-30.
  • 4Timothy Strayer W, Lapsely D,Walsh R, et al.Botnet detection countering the largest security threat[M].Springer, 2008:1-24.
  • 5Li Zhuang,John Dunagan,Daniel R Simon,et al.Characterizing Botnets from Email spare records [C]. Proc of First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
  • 6Yinglian Xie,Fang Yu, Kannan Achan,et al.Spamming Botnets: signatures and characteristics [J]. ACM SIGCOMM Computer Communication Review,2008,38(4): 171 - 182.
  • 7Anestis Karasaridis, Brian Rexroad, David Hoelin. Wide-scale Bomet detection and characterization[C].Proc of the first conference on First Workshop on Hot Topics in Understanding Botnets,2007.
  • 8陈光英.CCERT中文垃圾邮件过滤规则集[EB/OL].http://www.ccert.edu.cn/spam/sa/Chinese_rules.htm#1,2009-08-08.
  • 9Parzen E. On estimation of a probability density function and mode[J].Annual Mathematic Statistics, 1962,3 (33): 1065-1076.
  • 10Sheather S J,Jones M C.A reliable data-based bandwidth selection method for kernel density estimation[J].Journal of the Royal Statistical Society Series B, 1991,53(3):683-690.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部