期刊文献+

基于信息关联的P2P蠕虫检测方法 被引量:3

P2P Worm Detection Method Based on Information Correlation
下载PDF
导出
摘要 P2P蠕虫对P2P网络和Internet构成巨大安全威胁。该文根据P2P网络报文之间的关系,提出一种P2P蠕虫检测方法,通过建立过滤规则实现对P2P蠕虫的检测与抑制。模拟实验结果表明,该方法对P2P蠕虫传播的抑制效果与资源分布存在较大联系,其检测效果良好。 P2P worm has become a severe threat to the P2P network and Internet. This paper presents a P2P worm detection method according to the relations between the messages in P2P network, and establishes a series of filter rules to realize the detection and containment for P2P worm. Simulation experimental results show that the distribution of resources has a great influence on the effect of containment for P2P worm propagation in this method and this method has a good effect on P2P worm detection.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第21期115-117,135,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60573136) 福建省高校重点实验室开放课题基金资助项目“网络安全与密码技术”(07A004)
关键词 P2P蠕虫 传播 检测 抑制 P2P worm spread detection containment
  • 相关文献

参考文献7

  • 1罗兴睿,姚羽,高福祥.基于纯P2P原理的蠕虫传播模型的研究[J].通信学报,2006,27(z1):53-58. 被引量:5
  • 2Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time[C]//Proc. of the llth VSENZX Security Symposium. San Francisco, USA: [s. n. ], 2002.
  • 3Kannan J. Implications of Peer-to-Peer Networks on Worm Attacks and Defenses[EB/OL]. (2003-09-01). http//www.Es.berkeley.edu/- kubitron/courses/cs294-4-F03/projects karthik-jayanth.Pdf.
  • 4Zhou Lidong, Zhang Lintao, MeSherry F, et al. A First Look at Peer-to-Peer Worms: Threats and Defenses[C]//Proceedings of the 4th International Workshop on Peer-to-Peer Systems. Ithaca, Greece [s. n.], 2005.
  • 5Wei Yu, Boyer C, Chellappan S, et al. Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis[C]//Proc. of IEEE International Conference on Communications. Berlin, Germany:Springer Verlag, 2005.
  • 6Wei Yu. Analyze the Worm-based Attack in Large Scale P2P Networks[C]//Proceedings of the 8th IEEE International Symposium on High Assurance Systems Engineering. [S. l.]: IEEE Press, 2004.
  • 7David W, Kranakis E, Oorschot P C V. DNS-based Detection of Scanning Worms in an Enterprise Network[C]//Proceedings of the 12th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2005.

二级参考文献9

  • 1[1]SHANKAR U,PAXSON V.Active mapping:resisting NIDS evasion without altering traffic[A].Proceedings of IEEE Symposium on Security and Privacy[C].2003.
  • 2[2]CLIFF C Z,WEIBO G,DON T.Code red worm propagation modeling and analysis[A].Proceedings of the 9th ACM Conference on Computer and Communications Security(CCS)[C].2002.138-147.
  • 3[3]YU W,BOYER C,CHELLAPPAN S,et al.Peer-to-peer system-based active worm attacks:modeling and analysis[A].Proceedings of IEEE International Conference on Communications[C].2005,295-299.
  • 4[4]QING S H,WEN W P.A survey and trends on Intemet worms[J].Computers & Security,2005,24:334-346.
  • 5[5]ZHOU L,ZHANG L,MCSHERRY F,et al.A first look at peer-to-peer worms:threats and defenses[A].Proceedings of 4th International Workshop on Peer-to-Peer Systems(IPTPS)[C].2005.
  • 6[6]MICHAEL Y L,JAMES S M.Global stability for the SEIR model in epidemiology[J].Mathematical Biosciences,1995,125:155-164.
  • 7[7]MICHAEL Y L,LIANCHENG W.Global stability in some SEIR epidemic models[J].Mathematical Approaches for Emerging and Reemerging Infectious Diseases Part Ⅱ:Models,Methods and Theory,IMA Volumes in Mathematics and its Applications,Springer-Verlag,2002,126:295-311.
  • 8[8]BARABASI A L,BONABEAU E.Scale-free networks[J].Scientific American,2003:50-59.
  • 9[9]BARABASI A L,ALBERT R.Emergence of scaling in random networks[J].Science,1999,286:509-512.

共引文献4

同被引文献39

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部