期刊文献+

P2P蠕虫及其对抗技术的研究与进展综述 被引量:2

Review of Research and Development on P2P Worm and its Countermeasure Technology
下载PDF
导出
摘要 文章首先剖析了P2P蠕虫的定义、传播方式,讨论了P2P蠕虫的传播模型,分析了现有检测技术在P2P蠕虫检测方面的不足,归纳了当前针对P2P蠕虫的主要检测方法,最后给出了P2P蠕虫方向的若干研究热点问题和展望。 This paper analyzes the definition of P2P worms and modes of transmission, discussed P2P worms propagation model, analyzing deficiencies of existing detection technology in the P2P worms detection, summarized the main detection methods in the current PEP worms. Finally, this paper advances a number of hot issues and prospects on P2P worms.
出处 《舰船电子工程》 2009年第12期149-152,共4页 Ship Electronic Engineering
关键词 P2P蠕虫 蠕虫检测 传播模型 P2P worms, worm detection, propagation mode
  • 相关文献

参考文献12

  • 1S. Staniford, V. Paxson, N. Weaver. How to own the Internet in your spare time[C]. Proceedings of USE- NIX Security Symposium, 2002,8.
  • 2Kannan J. Implications of Peer-to-Peer networks on Worm attacks and defenses. California: CS294-4 Project, 2003[2003-09-01].
  • 3Zhou L, Zhang L, MeSherry F. A first look at Peer-to- Peer worms: Threats and defenses[C]. Proceedings of the Peer-to-Peer Systems 4th International Workshop Ithaca. [s. n.],2005 :24-25.
  • 4Wei Yu. Analyze the Worm-based Attack in Large Scale P2P Networks [C]. Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE'04).
  • 5夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 6张冶江,李之棠,陆垂伟,林怀清,黄庆凤.P2P蠕虫的分析与对策[J].华中科技大学学报(自然科学版),2007,35(S1):228-231. 被引量:6
  • 7Daniel R. Ellis, John G. Aiken, Kira S. Attwood, et al. A Behavioral Approach to Worm Detection. WORM'04, Washington, DC, USA,2004,29(8).
  • 8Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, et al. ACTM: Anomaly Connection Tree Method to detect Silent Worms[C]. Proceedings of the 20th Inter- national Conference on Advanced Information Networking and Applications (AINA'06).
  • 9王平,方滨兴,云晓春,彭大伟.基于用户习惯的蠕虫的早期发现[J].通信学报,2006,27(2):56-65. 被引量:9
  • 10夏春和,石昀平,李肖坚.基于应用识别的P2P蠕虫检测[J].北京航空航天大学学报,2006,32(8):998-1002. 被引量:5

二级参考文献42

  • 1罗兴睿,姚羽,高福祥.基于纯P2P原理的蠕虫传播模型的研究[J].通信学报,2006,27(z1):53-58. 被引量:5
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 4Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time[C]//Proc. of the llth VSENZX Security Symposium. San Francisco, USA: [s. n. ], 2002.
  • 5Kannan J. Implications of Peer-to-Peer Networks on Worm Attacks and Defenses[EB/OL]. (2003-09-01). http//www.Es.berkeley.edu/- kubitron/courses/cs294-4-F03/projects karthik-jayanth.Pdf.
  • 6Zhou Lidong, Zhang Lintao, MeSherry F, et al. A First Look at Peer-to-Peer Worms: Threats and Defenses[C]//Proceedings of the 4th International Workshop on Peer-to-Peer Systems. Ithaca, Greece [s. n.], 2005.
  • 7Wei Yu, Boyer C, Chellappan S, et al. Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis[C]//Proc. of IEEE International Conference on Communications. Berlin, Germany:Springer Verlag, 2005.
  • 8Wei Yu. Analyze the Worm-based Attack in Large Scale P2P Networks[C]//Proceedings of the 8th IEEE International Symposium on High Assurance Systems Engineering. [S. l.]: IEEE Press, 2004.
  • 9David W, Kranakis E, Oorschot P C V. DNS-based Detection of Scanning Worms in an Enterprise Network[C]//Proceedings of the 12th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2005.
  • 10[2]Zou C,Towsley D,Gong W.On the performance of Internet worm scanning strategies[EB/OL].(2005 -07)[2006-09-01].http://www-unix.ecs.umass.edu/~gong/papers/wormStrategy-elsevier.pdf.

共引文献40

同被引文献17

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部