期刊文献+

一种基于Cloud-P2P计算模型的恶意代码联合防御网络 被引量:6

Malicious code united-defense network based on Cloud-P2P model
下载PDF
导出
摘要 针对目前的反病毒系统在应对恶意代码时通常具有的滞后性,提出并构建了一种新颖的基于Cloud-P2P计算模型的恶意代码联合防御网络。Cloud-P2P计算模型将云计算与对等计算进行有机融合。恶意代码联合防御网络系统中的集群服务器与用户终端群体联合组成了一个高安全防御网,协同防御恶意代码,并快速产生群体免疫力。为了提高系统的性能表现,提出适用于Cloud-P2P融合计算环境的两种基于分布式哈希表的层次式网络结构C-DHT和D-DHT,并通过引入移动agent技术实现了恶意代码联合防御网络中的疫苗agent和巡警agent。基于Cloud-P2P计算模型的恶意代码联合防御网络具有负载均衡、反应快捷、防御全面和兼容性良好等性能表现。 The current anti-virus systems are usually unable to respond to endless emerging malicious codes in time.To solve this problem,this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model.The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically.Ser-vers and user terminals in the malicious code united-defense network carry out their own duties,forming a high-security collaborative defense network against malicious codes and obtaining the whole group immunity quickly.It also proposed two kinds of hierarchical network topology,C-DHT and D-DHT,which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model.By the introduction of mobile agent technology,realized vaccine agent and patrol agent of the malicious code defense united-network.The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances,such as the network load balance,the rapid response,the comprehensive defense and the good compatibility.
出处 《计算机应用研究》 CSCD 北大核心 2012年第6期2214-2217,2257,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60873231) 国家教育部高等学校博士学科点专项科研基金资助课题(20093223120001) 中国博士后科学基金资助项目(2011M500095) 江苏省自然科学基金资助项目(BK2011754 BK2009426) 江苏省科技支撑计划资助项目(BE2009158) 江苏省高校自然科学研究项目(09KJB520010) 信息安全国家重点实验室开放课题(03-01-1) 江苏高校优势学科建设工程资助项目(yx002001) 江苏省博士后科研资助计划项目(1102103C)
关键词 云计算 对等计算 恶意代码 反病毒 云安全 cloud computing P2P computing malicious code anti-virus cloud security
  • 相关文献

参考文献12

  • 1Xiaolong Xu,Ruchuan Wang,Fu Xiao.Malicious code passive propagation model and vaccine distribution model of P2P networks[J].Journal of Systems Engineering and Electronics,2010,21(1):161-167. 被引量:9
  • 2云安全[EB/OL].[2009-08-20].http://baike.baidu.com/view/1725454.htm.
  • 3百度百科.杀毒软件[EB/OL].(2010-06-06)[2010-08-12].http://baike.baidu.corn/view/33433.htm.
  • 4陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1310
  • 5MILLER M. Cloud computing [ M ]. Beijing: Machinery Industry Press, 2009.
  • 6金海,吴松,廖小飞,等.云计算的发展与挑战[M]//2009中国计算机科学技术发展报告.北京:机械工业出版社,2010:21—51.
  • 7徐小龙,王汝传.一种基于多移动Agent的对等计算动态协作模型[J].计算机学报,2008,31(7):1261-1267. 被引量:15
  • 8BARROSO L A, DEAN J, HOLZLE U. Web search for a planet : the google cluster architecture [ J ] : I EEE Micro,2003,23 (2) :22- 28.
  • 9DEAN J, GHEMAWAT S. Distributed programming with mapreduce [ M]. Sebastopol: O' Reilly Media, Inc, 2007:371-384.
  • 10LUA E K, CROWCROFT J, PIAS M, et al. A survey and comparison of peer-to-peer overlay network schemes [J]. Communications Surveys & Tutorials ,2005,7 (2) :72- 93.

二级参考文献35

  • 1盛秋戬,赵志崑,刘少辉,史忠植.多主体团队交互协议[J].软件学报,2004,15(5):689-696. 被引量:15
  • 2乐光学,李仁发,周祖德.基于Region多层结构P2P计算网络模型[J].软件学报,2005,16(6):1140-1150. 被引量:22
  • 3Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 4Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 5Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 6Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 7Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 8Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 9Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 10Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.

共引文献1325

同被引文献80

  • 1曾铭,俞俊生,刘绍华.一种用于社交网站的云安全敏感信息过滤模型[J].华中科技大学学报(自然科学版),2012,40(S1):211-214. 被引量:4
  • 2于建军,狄焰亮,董科军,南凯.科研在线:云服务模式的网络虚拟科研环境[J].华中科技大学学报(自然科学版),2011,39(S1):33-37. 被引量:15
  • 3郑倩冰,彭伟,卢锡城.ERSN:一种高效鲁棒的超结点对等网络[J].计算机研究与发展,2006,43(4):607-612. 被引量:7
  • 4雷葆华,饶少阳,江峰.云计算解码[M].北京:电子工业出版社,2011.
  • 5张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 6LIU J,RAO S G,LI B,et al. Opportunities and challenges of peer-to- peer Internet video broadcast [ J]. IEEE Special Issue on Recent Advances in Distributed Multimedia Communications, 2008,96 (1) :11-24.
  • 7HAYES B. Cloud computing [ J ]. Communications of the ACM, :2008,51 (7) :9-11.
  • 8CHEN K T,HUANG P,LEI C L. Game traffic analysis:an MMORPG perspective [J]. Computer Networks,2006,50(16) :3002-3023.
  • 9Amazon EC2 [ EB/OL ]. http ://aws. amazon, com/ec2/.
  • 10CHEN Zhi-jia, ZHAO Yang, MIAO Xin, et .al. Rapid provisioning of cloud infrastructure leveraging peer-to-peer networks [ C ]//Proc of ICDCS Workshops. Washington DC: IEEE Computer Society, 2009: 324- 329.

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部