期刊文献+

一种基于P2P网络的蠕虫传播模型研究 被引量:2

Research on a Worms Propagation Model Based on P2P Networks
下载PDF
导出
摘要 P2P蠕虫是利用P2P机制进行传播的恶意代码。本文针对基于P2P(peer-to-peer)的大规模网络,对P2P蠕虫的传播展开相关研究。首先介绍三个基本的蠕虫传播模型,分析了引入良性蠕虫后的四种情况。然后根据几个P2P蠕虫的扫描策略之一,提出了基于P2P系统的网络对抗蠕虫传播模型,并进行了初步的模拟分析。 The P2P-based worm is a kind of malicious code that takes advantage of P2P system to propagate. The P2P worms propagation is researched based on P2P (peer-to-peer) large-scale networks. First, this paper introduces three basic worms propagation models and analyzes four situations after the introduction of benign worm. And then according to one of several P2P scanning strategy , it puts forward a benign worms propagation model based on P2P system, and carries out a preliminary simulation analysis.
作者 陈莹莹 蔡明
出处 《微计算机信息》 2009年第3期102-103,111,共3页 Control & Automation
关键词 P2P 良性蠕虫 传播模型 P2P benign worm propagation model
  • 相关文献

参考文献5

  • 1Bijit Hore, SharadMehrotra, and Gene Tsudik. A Privacy2Preserving In2 dex for Range Queries[J]. In Proc of 30 th International Conference on Very Large Databases, Toronto, Canada, 2004(30): 720 -731.
  • 2D.J. Daley and J. Gani. Epidemic Modelling: An Introduction [M]. Cambridge University Press, Cambridge, UK, 1999.
  • 3文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 4Zhou Lidong, Zhang Lintao, McSherry F. A First Look at Peer- to-Peer Worms: Threats and Defenses[C]//Proc. of IPTPS'05. 2005 (02).
  • 5张基温,董瑜.大规模P2P网络下蠕虫攻击的研究[J].微计算机信息,2006,22(08X):245-246. 被引量:4

二级参考文献7

  • 1吴易,王凌.Java技术在P2P环境下的应用[J].微计算机信息,2005,21(3):154-155. 被引量:30
  • 2S. Ratnasamy, "A Scalable Content Addressable Network", Proceedings of ACM SigComm., San Diego, 2001.
  • 3M. Ripeanu, I. Foster, "Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems", Proceedings of 1-th International Workshop on Peer-to-Peer Systems(IPTPS), 2002.
  • 4A. Zeitoun, S. Jamin, "Rapid Exploration of Internet Live Address Space Using Optimal Discovery Path", Proceedings of IEEE Globlecom, 2003.
  • 5W. Yu, C. Boyer, D. Xuan, "Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm attacks", Technical Report, Computer Science Dept., Texas A & M Univ, 200
  • 6Wei Yu "Analyze the Worm-based Attack in Large Scale P2P Networks" Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE'04)
  • 7左晓栋,戴英侠.“狮子”蠕虫分析及相关讨论[J].计算机工程,2002,28(1):16-17. 被引量:17

共引文献188

同被引文献6

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部