期刊文献+

P2P僵尸网络的新型数学模型(英文)

A novel mathematical model on Peer-to-Peer botnet
下载PDF
导出
摘要 P2P僵尸网络已成为互联网安全领域最严重的威胁之一。为了有效地遏制P2P僵尸网络,本文提出刻画P2P僵尸网络形成过程的一种新模型,该模型是带时滞的SEIR模型。基于特征方程特征值的分布范围,分析了模型在平衡点的局部稳定性。理论分析和数值模拟结果都表明,该时滞模型的动力学特征依赖于基本再生数R0和时间延迟τ。本文的结果有助于更好地了解P2P僵尸网络的传播行为,并据此设计有效的反制措施。 Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P botnet. Then, the local stability at equilibria is carefully analyzed by considering the eigenvalues' distributed ranges of characteristic equations. Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic re- production number and time delay r. The results can help us to better understand the propagation behaviors of P2P botnet and design effective counter-botnet methods.
出处 《Journal of Measurement Science and Instrumentation》 CAS 2014年第4期62-67,共6页 测试科学与仪器(英文版)
基金 National Natural Science Foundation of China(No.61379125) Program for Basic Research of Shanxi Province(No.2012011015-3) Higher School of Science and Technology Innovation Project of Shanxi Province(No.2013148)
关键词 P2P僵尸网络 稳定性 SEIR模型 时滞 Peer-to-Peer (P2P) botnet stability SEIR model time delay
  • 相关文献

参考文献24

  • 1SONG Li-peng, JIN Zhen, SUN Gui-quan. Modeling and analyzing of botnet interactions. Physica A, 2011, 390 (2) : 347-358.
  • 2ZHANG Wen-fang, JIN C. The research on approaches for botnet detection. Energy Procedia, 2011, 13: 9726- 9732.
  • 3Symantec lnternet security threat report. [2014-06-12]. http://www, symantec, com/threatreport/topic, jsp? id - threatreport.
  • 4Holz T, Steiner M, Dahl F, et al. Measurements and mit- igation of peer-to-peer-based botnets: a case study on storm worm. In: Proceedings of the 1st USENIX Work- shop on Large-Scale Exploits and Emergent Threats, San Francisco, CA, 2008: 1-9.
  • 5Ruitenbeek E V, Sanders W H. Modeling peer-to-peer botnets. In: Proceedings of the 5th International Confer- ence on Quantitative Evaluation of Systems (QEST'08), St. Malo, France, 2008: 307-316.
  • 6YAN Guan-hua, Ha D T, Eidenbenz S. AntBot: Anti- polllution peer-to-peer botnets. Computer Network: The International Journal of Computer and Telecommunica- tions Networking, 2011, 55 (8): 1941-1956.
  • 7Kolesnichenko A, Remke A, Boer P T, et al. Compari- son of the mean-field approach and simulation in a peer- to-peer botnet case study. Computer Performance Engi- neering, 2011, 6977: 133-147.
  • 8Schneider D. The state of network security. Network Se- curity, 2012: 14-20.
  • 9JIANG Hong-ling, SHAO Xiu-li. Detecting P2P botnets by discovering flow dependency in C & C traffic. Peer-to- Peer Network and Application, 2012 : 1-12.
  • 10HAN Qin-ting, YU Wen-qiu, ZHANG Yao-yao, et al. Model and evaluating of typical advanced Peer-to-Peer botnet. Performance Evaluation, 2014, 72: 1-15.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部