期刊文献+

结构化P2P网络中主动型蠕虫研究现状与展望 被引量:1

Status and Prospects on structured P2P network active worms
下载PDF
导出
摘要 首先探讨了结构化P2P网络中主动型蠕虫的发展历程、概念与特点,进而从传播模型、检测、防御3个方面综述了主动型P2P蠕虫的研究现状,最后对主动型P2P蠕虫研究未来的发展进行了展望。 This survey firstly discusses the development history,concept and characteristics of structured P2P network active worms,and then reviews the status of active P2P worms from the respects of propagation modeling, detection method, defense tech-nology.Lastly,this survey presents the prospects of active P2P worms.
出处 《自动化与仪器仪表》 2014年第3期3-5,8,共4页 Automation & Instrumentation
关键词 结构化P2P网络 主动型蠕虫 现状 展望 structured P2P network active P2P worms status prospect
  • 相关文献

参考文献20

  • 1Staniford S, Paxson v, Weaver N.How to own the Intemet in your space time//Proceedings of the 1 lth Usenix Security Symp.San Fran- cisco, 2002.
  • 2Kannan J.Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.Califomia:CS29424 Project, 2003.
  • 3Zhou L, Zhang L, MeSherry F.A first look at peer-to-peer worms: threats and defenses//Proceedings of the 4th International Workshop, 2005:24-25.
  • 4夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 5Streftaris G, Gibson GJ. Statistical inference for stochastic epidemic models. In: Proc. of the 17th Int'l Workshop on Statistical Modelling. Chania, 2002.609-616.
  • 6FRAUENTHAL J C. Mathematical modeling in epidemiology[Z]. New York: Springer-Verlag, 1980.
  • 7ZOU C C, GONG W, TOWSLEY D. Code red worm propagation modeling and analysis[C]//Proceeding of the 9th ACM Symposium on Computer and Communication Security. Washington: ACM Press, 2002:138-147.
  • 8Chen Z, Gao L, Kevin K. Modeling the Spread of Active Worms[C]// Proc.of the IEEE INFOCOM'03.[S. 1 .]: IEEE Press,2003.
  • 9WANG X S, ZHU J L, LIN H Z, et al. Modeling Propagation of Ac- tive P2P Worm in Chord Network[J]. Advances in Intelligent and Soft Computing, 2012, 133(2012):389-396.
  • 10ZHANG Y J, LI Z T, HU Z B, et al. Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation[C]//Proc of the Second International Conference on Genetic and Evolutionary Computing. Hu- bei: IEEE Computer Society, 2008:261-264.

二级参考文献26

  • 1罗兴睿,姚羽,高福祥.基于纯P2P原理的蠕虫传播模型的研究[J].通信学报,2006,27(z1):53-58. 被引量:5
  • 2王平,方滨兴,云晓春,彭大伟.基于用户习惯的蠕虫的早期发现[J].通信学报,2006,27(2):56-65. 被引量:9
  • 3Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time[C]//Proc. of the llth VSENZX Security Symposium. San Francisco, USA: [s. n. ], 2002.
  • 4Kannan J. Implications of Peer-to-Peer Networks on Worm Attacks and Defenses[EB/OL]. (2003-09-01). http//www.Es.berkeley.edu/- kubitron/courses/cs294-4-F03/projects karthik-jayanth.Pdf.
  • 5Zhou Lidong, Zhang Lintao, MeSherry F, et al. A First Look at Peer-to-Peer Worms: Threats and Defenses[C]//Proceedings of the 4th International Workshop on Peer-to-Peer Systems. Ithaca, Greece [s. n.], 2005.
  • 6Wei Yu, Boyer C, Chellappan S, et al. Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis[C]//Proc. of IEEE International Conference on Communications. Berlin, Germany:Springer Verlag, 2005.
  • 7Wei Yu. Analyze the Worm-based Attack in Large Scale P2P Networks[C]//Proceedings of the 8th IEEE International Symposium on High Assurance Systems Engineering. [S. l.]: IEEE Press, 2004.
  • 8David W, Kranakis E, Oorschot P C V. DNS-based Detection of Scanning Worms in an Enterprise Network[C]//Proceedings of the 12th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2005.
  • 9Zhou L.,Zhang L.,McSherry F.,Immorlica N.,Chien S..A first look at peer-to-peer worms:Threats and defenses.In:Proceedings of the Peer-to-Peer Systems 4th International Workshop,Ithaca,NY,USA,2005,24~35
  • 10Stoica I.,Morris R.,Karger D.,Kaashoek M.F.,Balakrishnan H..Chord:A scalable peer-to-peer lookup service for internet applications.In:Proceedings of the ACM SIGCOMM2001,San Diego,2001,149~160

共引文献29

同被引文献8

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部