期刊文献+

P2P蠕虫遏制方法的研究与建模

Research and Modeling of P2P Worm Containment Method
下载PDF
导出
摘要 传统的蠕虫遏制方法无法及时地遏制P2P蠕虫。针对该问题,提出一种基于P2P良性蠕虫的快速遏制方法。P2P良性蠕虫利用P2P软件漏洞进行自动传播,能够清除恶性蠕虫并修补软件漏洞,从而彻底阻断恶性蠕虫的传播渠道。对该遏制方法进行数学建模,给出相应的离散差分数学模型。仿真实验验证,该方法遏制效果好且对网络资源消耗少。 Traditional methods are not competent to quarantine Peer to Peer(P2P) worm in time.Aiming at this problem,this paper brings forward a fast containment method based on benign P2P worm.Benign P2P worm automatically propagates itself through software vulnerabilities.It is able to eliminate malicious worm and fix software vulnerabilities,thus it prevents the propagation of malicious worm outright.The method is efficient and has few bandwidth resources consumption.It models the method and proposes the related discrete difference model.Simulations validate the efficacy of this method.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第11期176-177,183,共3页 Computer Engineering
基金 广东省自然科学基金资助项目(9151027501000039) 湛江市科技攻关基金资助项目(2007C09017)
关键词 P2P蠕虫 快速遏制 良性蠕虫 P2P拓扑结构 低网络资源消耗 Peer to Peer(P2P) worm fast containment benign worm P2P topology structure low network resource consumption
  • 相关文献

参考文献2

二级参考文献17

  • 1夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 2Debany W H.Modeling the Spread of Internet Worms via Persistently Unpatched Hosts[J].IEEE Network,2008,22(3): 26-32.
  • 3Zhou Lidong,Zhang Lintao,Mcsherry F,et al.A First Look at Peer-to-Peer Worms: Threats and Defenses[C]//Proc.of the 4th International Workshop on Peer-to-Peer Systems.Ithaca,New York,USA: [s.n.],2005: 24-35.
  • 4Yu Wei.Analyze the Worm-based Attack in Large Scale P2P Networks[C]//Proc.of the 8th IEEE International Symposium on High Assurance Systems Engineering.Tampa,Florida,USA: IEEE Press,2004: 308-309.
  • 5Chunhe Xia,Yunping Shi,Xiaojian Li,Wei Gao.P2P worm detection based on application identification[J].Frontiers of Computer Science in China.2007(1)
  • 6Feng, C,Qin, Z,Cuthbet, L,Tokarchuk, L.Propaga-tion Model of Active Worms in P2P Networks[].Proc th Int Conf for Young Computer Scientists.2008
  • 7Khiat, N,Charlinet, Y,Agoulmine, N.The Emerging Threat of Peer-to-Peer Worms[].Proc st EEE Workshop on Monitoring Attack Detection and Mitigation.2006
  • 8McIlwraith, D,Paquier, M,Kotsovinos, E.Di-Jest: Autonomic Neighbour Management for Worm Resilience in P2P Systems[].Proc IEEE Int Symp on a World of Wireless Mobile and Multimedia Networks.2008
  • 9Nie, X,Wang, Y,Jing, J,Liu, Q.Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation[].Proc Int Conf on Computer Science and Software Engineering.2008
  • 10Random Nut.The PACKET 0’ DEATH FastTrack Net-work Vulnerability. http://archive.cert. uni-stuttgart.de/bugtraq/2003/05/msg00277.html . 2003

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部