期刊文献+

P2P僵尸网络研究 被引量:6

Research of peer-to-peer botnets
下载PDF
导出
摘要 为了更好地探索研究新型P2P僵尸网络的跟踪、检测与反制方法,介绍了P2P僵尸网络的基本定义和演化历史,对P2P僵尸网络的分类和工作机制进行研究,分析P2P僵尸网络的拓扑结构及其逃避检测的方法,报告对P2P僵尸网络进行跟踪、检测与反制的研究现状,并对各种方法的性能进行了比较。最后对P2P僵尸网络的发展与进一步研究提出展望。 In order to search a profound method in tracking,detecting and countering P2P based botnets,the paper introduced the basic definition of P2P botnets and their evolutionary history,and then studied the classification and working mechanism of them. After analysing the topology of P2P botnets and their methods to evade detection,it reported the approaches of tracking, detecting and countering P2P botnets,and compared the performance of various methods. Finally gave the P2P botnet development and further research prospects.
出处 《计算机应用研究》 CSCD 北大核心 2010年第10期3628-3632,共5页 Application Research of Computers
基金 吉林省科技发展计划资助项目(20090111)
关键词 对等网络 恶意代码 僵尸网络 命令与控制机制 P2P( peer-to-peer) malware botnet C&C( command and control) mechanism
  • 相关文献

参考文献26

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2NELLY M M. Storm worm:a P2P botnet[ D]. Trondheim: Norwegian University of Science and Technology,2008.
  • 3STEGGINK M, IDZIEJCZAK I. Detection of peer-to-peer botnets [ R ]. Amsterdam : University of Amsterdam ,2008.
  • 4ZALEWSKI M. I don't think I really love you[ EB/OL]. (2000-05- 07) [2010-03-15 ]. http ://seclists. org/vuln-dev/2000 /May /0159. html.
  • 5ZHANG Jun. Strom worm & botnet analysis[ R]. San Diego:Websense Security Labs,2008.
  • 6WANG Ping, WU Lei, BABER A, et al. A systematic study on peer-to- peer botnets[ C]//Proc of the 18th International Conference on Computer Communications and Networks. Washington DC : IEEE Computer Society ,2009 : 1 - 8.
  • 7KANG Jian, ZHANG Jun-yao, LI Qiang,et al. Detecting new P2P botnet with multi-chart CUSUM [ C]//Proc of International Conference on Networks Security, Wireless Communications and Trusted Computing. Washington DC : IEEE Computer Society,2009:688- 691.
  • 8HA D T, YAN Guan-hua, EIDENBENZ S, et al. On the effectiveness of structural detection and defense against P2P-based botnets [ C ]// Proc of IEEE/IFIP International Conference on Dependable Systems & Networks. Washington DC : IEEE Computer Society,2009 : 297 -306.
  • 9YU Jun-feng, LI Zhi-tang, HU Jun, et al. Using simulation to characterize topology of peer to peer botnets [ C ]//Proc of International Conference on Computer Modeling and Simulation. Washington DC:IEEE Computer Society,2009:78 - 83.
  • 10GU Guo-fei, PERDISCI R, ZHANG Jun-jie, et al. BotMiner: clustering analysis of network traffic for protocol-and structure-independent batnet detection [ C ]//Proc of the 17th Conference on Security Symposium. Berkeley : USENIX Association ,2008 : 139-154.

二级参考文献92

共引文献354

同被引文献36

  • 1Geer D. Malicious Bots Threaten Network Security[J]. IEEE Computer, 2005, 38(1): 18-20.
  • 2余小雨.被植僵尸程序中国量冠全球[EB/OL].[2010-Ol-25].http://pdf.wenweipo.com/2010/01/25/al1-06-0125m.pdf.
  • 3王晓霞.复杂网络模型及其动力学性质的研究[D].长春:吉林大学,2009.
  • 4Wang Ping, Sparks S, Zou Changchun. An Advanced Hybrid Peer-to-Peer Botnet[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(2): 113-127.
  • 5Barabasi A L, Albert R. Emergence of Scaling in Random Networks[J]. Science, 1999, 286(5439): 509-512.
  • 6贾秀丽,蔡绍洪,刘浩广,汪红,张芙蓉.无标度网络BA模型的物理内涵及其改进模型的比较[J].贵州大学学报(自然科学版),2007,24(6):578-582. 被引量:3
  • 7Fossi M,Turner D,Johnson E,Mack T,Adams T,Blackbird J,Entwisle S,Graveland B,McKiuney D,Mulcahy J. Symantec global Internet security threat report:Trends for 2010[A].2011.
  • 8Vogt R, Aycock J, Jacobson Jr M J, editors. Army of Botnets [ C ]. Proceedings of the 14th Annual Network and Distributed System Security Symposium, 2007.
  • 9Wang P, Sparks S, Zon CC. An Advanced Hybrid Peer- to-peer Botnet[ C 1. Dependable and Secure Computing, IEEE Transactions on, 2010,7 ( 2 ) : 113 - 127,.
  • 10Han Q, Yu W, Zhang Y, Zhao Z. Modeling and Evalua- ting of Typical Advanced Peer-to-peer Botnet [ J]. Per- formance Evaluation, 2014,72 : 1 - 15.

引证文献6

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部