期刊文献+

对抗P2P蠕虫的邻居选择机制

Neighbor Selection Scheme Against P2P Worms
下载PDF
导出
摘要 P2P网络中节点的邻居列表为蠕虫提供了快速传播的途径.网络中节点系统的漏洞情况各异,致使它们抵抗蠕虫的能力不同.无结构P2P网络中节点的位置影响着蠕虫围堵策略的效果,甚至影响整个网络的安全.为了对抗P2P蠕虫,在区分漏洞级别的基础上定义节点之间距离的计算方法,根据节点抵抗蠕虫的能力为其选择邻居,使得P2P网络中的节点分布更利于抵抗蠕虫的攻击;并将这种邻居选择机制应用到无结构P2P网络KaZaA中.实验结果表明,该选择机制明显提高了P2P网络对抗蠕虫的能力. The neighbor lists of peers in P2P networks provide an easy way for the propagation of worms. The vulner abilities of peers in P2P networks always vary from one another, so their abilities against worms are different. And the peers' positions in the unstructured P2P network affect the worm containment and even the security of the whole P2P network. For countering P2P worms, based on the vulnerability rating, the distance between peers was defined, and the neighbors for a peer were selected according to its ability against worms to make the distribution of peers have an advantage in resisting the worm attacks. The neighbor selection scheme was applied to the unstructured P2P system KaZaA. Experiment results show that this scheme improves the capability of resistance against worms in P2P network observably.
出处 《天津大学学报》 EI CAS CSCD 北大核心 2012年第11期1030-1038,共9页 Journal of Tianjin University(Science and Technology)
基金 国家自然科学基金资助项目(60973141) 天津市自然科学基金资助项目(09JCYBJ00300) 高等学校博士学科点专项科研基金资助项目(20100031110030)
关键词 P2P覆盖网络 邻居选择 蠕虫围堵 漏洞 P2P overlay network neighbor selection worm containment vulnerability
  • 相关文献

参考文献20

  • 1Symantec. W32 Gnuman Worm [EB/OL]. http: //www. symantec, com/security_response/writeup, jsp?docid = 2001-022710-3046-99, 2007-02-13.
  • 2Symantec. W32 Benjamin Worm[EB/OL]. http: //www symantec, com/security_response/writeup, jsp?docid = 2002-052016-0139-99, 2007-02-13.
  • 3Symantec.通过电驴传播的感染型蠕虫病毒:W32Noobert [EB/OL]. http: //www. symantec, com/connect/ blogs/w32noobert, 2010-01-18.
  • 4Zhou Lidong, Zhang Lintao, McSherry F, et al. A first look at peer-to-peer worms: Threats and devenses [C]// Proceedings of the 1PTPS. Ithaca, New York, USA, 2005 : 24-25.
  • 5夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 6Ramachandran K, Sikdar B. Modeling malware propagation in Gnutella type peer-to-peer networks [C]// The 3rd lnternational Workshop on Hot Topics in Peer-to- Peer Systems(Hot-P2P). Rhodes Island, Greece, 2006 : 447-454.
  • 7Xie Liang, Zhu Sencun. A feasibility study on defending against ultra-fast topological worms[C]//Proceedings of the 7th IEEE International Conference on Peer-to-Peer Computing(P2P'07). Galway, Ireland, 2007: 61-68.
  • 8Filipe F, Edgar M, Rodrigo R, et al. Verme: Worm containment in overlay networks [C] // 1EEE/IFIP International Conference on Dependable Systems and Networks (DSN). Estoril Lisbon, Portugal, 2009: 155- 164.
  • 9Zhu Zhichao, Cao Guohong, Zhu Sencun, et al. A social network based patching scheme for worm containment in cellular networks [C]//IEEE 1NFOCOM 2009 Proceedings. Rio de Janeiro, Brazil, 2009: 1476-1484.
  • 10罗卫敏,刘井波,范成瑜.基于良性蠕虫对抗P2P蠕虫的策略研究[J].计算机应用研究,2009,26(12):4764-4767. 被引量:7

二级参考文献25

  • 1夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 2董健全,谢承灏,李超.P2P文件共享系统中恶意代码防治的激励机制[J].计算机工程与应用,2006,42(34):122-126. 被引量:2
  • 3ZHOU Li-dong. A first look at peer-to-peer worms threats and defenses[C]//CASTRO M, RENESSE R van. Proc of IPTPS 2005. New York : [ s. n. ] ,2005:24-35.
  • 4CASTANEDAY F, SEZERY E C, XU Jun. WORM vs. WORM: preliminary study of an active counter-attack mechanism [ C ]//Proc of ACM CCS Workshop on Rapid Malcode (WORM 2004 ). Washington: [ s. n. ], 2004.
  • 5WU Dan, LONG Dong-yang, WANG Chang-ji. et al. Modeling and analysis of worm and killer-worm propagation using the divide-andconquer strategy[ C ]//Proc of the 6th International Conference on Algorithms and Architectures for Parallel Processing. Melbourne: [ s. n. ], 2005:370-375.
  • 6ZHOU Han-xun, WEN Ying-you, ZHAO Hong. Passive worm propagation modeling and analysis [ C ]//Proc of Computing in the Global Information Technology, 2007. ICCGI 2007. International Multi-Conference. 2007:32-42.
  • 7SHAKKOTTAI S, SRIKANT R. Peer to peer networks for defense against Internet worms [ C ]//Proc of Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer& Communications Systems. Pisa, Italy. [ s. n. ], 2006.
  • 8邓映轶.对等网络蠕虫及其防御技术研究[D].成都:电子科技大学,2007.
  • 9STANIFORD S, PAXSON V, WEAVER N. How to own the Intemet in your spare time[ J]. Usenix Security Syrup, 2002,8:149-167.
  • 10Zhou L.,Zhang L.,McSherry F.,Immorlica N.,Chien S..A first look at peer-to-peer worms:Threats and defenses.In:Proceedings of the Peer-to-Peer Systems 4th International Workshop,Ithaca,NY,USA,2005,24~35

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部