期刊文献+

多令牌桶P2P网络蠕虫衰竭方法

Multiple Token Bucket P2P Worms Throttle Method
下载PDF
导出
摘要 在分析P2P网络中蠕虫攻击特点的基础上,接合病毒衰竭方法,提出多令牌桶蠕虫衰竭方法.该方法针对P2P网络服务端口特定以及蠕虫攻击地址发散的特性,根据端口不同设立多数据表,避免了不同端口流量之间的相互影响;针对蠕虫发出连接请求速率高的特性,该方法使用令牌桶控制延迟队列处理速度,阻塞漏洞端口队列,衰竭蠕虫对P2P网络的危害性,阻止蠕虫增加P2P网络负载,避免因蠕虫引起P2P网络负载过重而导致P2P网络瘫痪.仿真分析表明,衰竭方法能在P2P网络内蠕虫爆发增长前发挥作用. The multiple token buckets P2P worms throttle method is proposed after the P2P worms' characteristic attacking P2P networks was analyzed. The method is the evolution of the application of Virus Throttle to P2P worms. Considering the P2P networks characters of employing unique port and the worm characters of dispersed IP addresses, the method uses port-based multiple work sets to identify worm connection requests in worm detection process. Considering the worms characters of the frequency connection requests, the method employs multiple delay queues to control the speed of procession, to blocks the queue of the worm employ, to throttles the worm destructive power to P2P networks, and to avoids the P2P networks paralysis conduced by worms. The analysis shows P2P worms can be detected by watching the change of the queue's length.
出处 《武汉理工大学学报(交通科学与工程版)》 2009年第3期515-518,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 国家863计划项目资助(批准号:2006AA12Z132)
关键词 P2P网络蠕虫 控制 蠕虫衰竭 P2P worms control worms throttle
  • 相关文献

参考文献6

  • 1Williamson M M.Throttling viruses:restricting propagation to defeat malicious mobile code[C]// Proceedings of the 18th Annual Computer Security Applications Conference.Washington:IEEE Computer Society,2002:61-68.
  • 2Twycross J,Williamson M M.Implementing and testing a virus throttle[C]//Proceedings of the 12th USENIX Security Symposium.Boston:USENIX Association,2003:285-294.
  • 3Kienzle D M,Elder M C.Recent worms:a survey and trends[C]//WORM'03-Proceedings of the 2003 ACM workshop on rapid malcode.New York:ACM Press,2003:1-10.
  • 4Chen Guanling,Gray R S.Simulating non-scanning worms on peer-to-peer networks[C]// INFOSCALE'06.-Proceedings of the First International Conference on Scalable Information Systems.New York:ACM Press,2006:29-41.
  • 5张冶江,李之棠,陆垂伟,林怀清,黄庆凤.P2P蠕虫的分析与对策[J].华中科技大学学报(自然科学版),2007,35(S1):228-231. 被引量:6
  • 6Weaver N,Paxson V,Staniford S,et al.A taxonomy of computer worms[C]//WORM'03-Proceedings of the 2003 ACM Workshop on Rapid Malcode.New York:ACM Press,2003:11-18.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部