期刊文献+

一种基于社会网络分析的P2P僵尸网络反制策略 被引量:8

P2P Botnet Control Strategy Based on Social Network Analysis
下载PDF
导出
摘要 设计并实现了一种基于社会网络分析的P2P僵尸网络反制策略。该策略包括两个方面:第一,挖掘网络中的关键节点和桥梁节点,重点防护这两类节点;第二,挖掘网络中的社区结构,重点监控社区间的关键通讯。模拟实验表明,该策略能准确挖掘网络中的关键节点、桥梁节点和关键通讯边,挖掘桥梁节点和关键边的准确率分别达到了95%和93%。使用提出的策略可有效控制僵尸网络病毒和黑客攻击指令的传播,从而达到反制P2P僵尸网络的目的。 A P2P botnet control strategy based on social network analysis was designe& The strategy includes two aspects:the first is to mine and protect the key nodes and bridge nodes in the P2P botnet; the other is to detect communities in the network and survey the key edges between communities. Experimental results show that the strategy proposed in this paper could mine the key nodes, bridge nodes and key edges precisely. Precision of bridge nodes and key edges mining is 95% and 93%, respectively. The propagation of botnet virus and hackers' attacking commands could be controlled effectively by the strategy proposed in this paper.
出处 《计算机科学》 CSCD 北大核心 2009年第6期101-104,111,共5页 Computer Science
基金 国家高技术研究发展计划(编号:06AA01Z414 07AA01Z440) 国家242信息安全计划项目(编号:2007B27) 四川省应用技术研究与开发项目支撑计划(编号:2008GZ0009)资助
关键词 社会网络分析 P2P僵尸网络 社区结构 反制策略 Social network analysis, P2P botnet,Community structure, Control strategy
  • 相关文献

参考文献17

  • 1Arce I,Levy E. An analysis of the slapper worm[J]. IEEE Security & Privacy,2003,1(1):82-87
  • 2Sinit P2P Trojan analysis[OL], http: //www. lurhq.com/sinit. html
  • 3Phatbot Trojan analysis[OL]. http://www. lurhq.com/phat- 130t. html
  • 4Grizzard J B, Sharma V, Nunnery C. Peer-to-Peer botnets: Overview and case study[C]// Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets. Cambridge, MA, USA, Apr. 2007
  • 5Wang P, Sparks S, Zou C C. An advanced hybrid peer - to- peer botnet[C]//Proeeedings of the 1st Workshop on Hot Topics in Understanding Botnets. Cambridge, MA, USA, Apr. 2007
  • 6Vogt R, Ayeoek J,Jacobson M J. Army of botnets[C]//Proceedings of the 14th Annual Network & Distributed System Security Conference. San Diego,California,USA,Mar. 2007:111-123
  • 7Overton M. Bots and botnets:Risks,issues and prevention[C]// Proceedings of the 15th Virus Bulletin Conference. Dublin, Ireland, Oct. 2005. http://momusings. com/papers/VB2005-Bots and Bomets-1.0. 2. pdf
  • 8Dagon D, Zou C C, Lee W. Modeling bother propagation using time zones[C]//Proceedings of the 13th Annual Network and Distributed System Security Symposium. San Diego, Feb. 2006. http://www. isoc. org/isoc/conferenees/ndss/06/proceedings/ papers/modeling_botnet_propagation. pdf
  • 9温粉莲 唐常杰 乔少杰 等.基于社会网络最短路径挖掘犯罪集团核心.计算机科学,2006,33(11):266-268.
  • 10Wu F, Huberman B A. Finding communities in linear time: a physics approach[J]. European Physical Journal B, 2004, 38 (2) :331-338

共引文献4

同被引文献113

  • 1王海龙,胡宁,龚正虎.Bot_CODA:僵尸网络协同检测体系结构[J].通信学报,2009,30(S1):15-22. 被引量:9
  • 2金澈清,钱卫宁,周傲英.流数据分析与管理综述[J].软件学报,2004,15(8):1172-1181. 被引量:161
  • 3孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 4温粉莲 唐常杰 乔少杰 等.基于社会网络最短路径挖掘犯罪集团核心.计算机科学,2006,33(11):266-268.
  • 5[加]Jiawei Han,Micheline Kamber.数据挖掘:概念与技术[M].北京:机械工业出版社,2007.
  • 6NELLY M M. Storm worm:a P2P botnet[ D]. Trondheim: Norwegian University of Science and Technology,2008.
  • 7STEGGINK M, IDZIEJCZAK I. Detection of peer-to-peer botnets [ R ]. Amsterdam : University of Amsterdam ,2008.
  • 8ZALEWSKI M. I don't think I really love you[ EB/OL]. (2000-05- 07) [2010-03-15 ]. http ://seclists. org/vuln-dev/2000 /May /0159. html.
  • 9ZHANG Jun. Strom worm & botnet analysis[ R]. San Diego:Websense Security Labs,2008.
  • 10WANG Ping, WU Lei, BABER A, et al. A systematic study on peer-to- peer botnets[ C]//Proc of the 18th International Conference on Computer Communications and Networks. Washington DC : IEEE Computer Society ,2009 : 1 - 8.

引证文献8

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部