期刊文献+

P2P僵尸网络研究

Study on Peer-to-Peer Botnets
下载PDF
导出
摘要 僵尸网络是近年来网络安全最严重的威胁之一。P2P僵尸网络是在传统僵尸网络基础上发展起来的,其命令与控制机制具有隐蔽性和健壮性,使检测和防范变得更加困难。本文对P2P僵尸网络的构建、命令与控制机制、检测与反制技术进行了研究与分析。 In recent years botnet has become one of the most serious threaten of Internet. P2P - based botnet, evoluted from traditional botnets, has a command and control mechanism more stealthy and robust, thus is more difficult to detect and prevent. This paper stud- ied the construction, C&C mechanisms of of p2p botnet, it also analysed the detection and response techniques of p2p botnet.
出处 《微计算机应用》 2011年第9期33-36,共4页 Microcomputer Applications
基金 安徽省高校自然科学研究项目(KJ2010B282)
关键词 僵尸网络 P2P 恶意代码 网络安全 botnet, peer - to - peer, malicious code, network security
  • 相关文献

参考文献8

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon: Peer - to - peer botnets : Overview and case study, Proc. 1 st USENIX Workshop on Hot Topics in Understanding Botnets ( HotBots'07), Cambridge, MA (2007).
  • 3P. Wang, S. Sparks, and C. C. Zou : An advanced hybrid peer - to - peer botnet, Proc. 1st USENIX Workshop on Hot Topics in Understanding Botnets ( HotBots'07 ), Cambridge, MA (2007).
  • 4T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F, Freiling: Measurements and mitigation of peer - to - peer - based botnets: A case study on stormworm, Proc. 1 st Usenix Workshop on Large - scale Exploits and Emergent Threats ( LEEr '08), San Francisco, CA (2008).
  • 5G. Gu, R. Perdisci, J. Zhang, and W. Lee: BotMiner: Clustering analysis of network traffic for protocol - and structure -independent botnet detection, Proc. 17th USENIX Security Syrup. ( Security'08 ), San Jose, CA (2008) pp. 139 - 154.
  • 6J. Liang,N. Naoumov,and K. W. Ross, "The index poisoning attack in p2p? le sharing systems,"in Proc. of the IEEE INFOCOM, April 2006.
  • 7C. R. Davis, J. M. Fernandez, S. Neville, and J. McHugh," Sybil attacks as a mitigation strategy against the storm botnet," in Proc. of the 3rd Int. Conf. on Malicious and Unwanted Software ( Malware ' 08), 2008.
  • 8Preventing Botnet Damage Technique and It's Effect using Bot DNS SinkholeYB Kim, DR Lee, JS Choi. Journal of KISS (C) : Computing Practices, 2009.

二级参考文献4

共引文献156

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部