期刊文献+

基于P2P的僵尸网络C&C设计与仿真 被引量:1

下载PDF
导出
摘要 近些年来,基于P2P的僵尸网络凭借其网络通信的隐蔽性和网络连接的健壮性特点,逐渐成为国内外研究的热点。针对两层架构的P2P僵尸网络的命令控制(Command and Control简称C&C)协议进行了深入探讨与分析,并设计了超级节点更新邻居节点的算法,超级节点分发命令算法,并将公钥加密算法应用到P2P僵尸网络的命令控制协议中,增加了僵尸网络通信的隐蔽性和网络的健壮性。同时,对该类型的僵尸网络中普通节点接收命令时的流量和超级节点转发命令时的流量进行了模拟仿真,仿真结果证明了节点的心跳流量和命令流量与用户的正常上网流量相比较而言微乎其微。最后,对该类型的P2P僵尸网络提出了防御策略的相关建议。
出处 《中国人民公安大学学报(自然科学版)》 2015年第3期65-70,共6页 Journal of People’s Public Security University of China(Science and Technology)
基金 国家自然科学基金青年科学基金项目(71203229)
  • 相关文献

参考文献9

  • 1冉宏敏,柴胜,冯铁,张家晨.P2P僵尸网络研究[J].计算机应用研究,2010,27(10):3628-3632. 被引量:6
  • 2Vogt R, Aycock J, Jacobson Jr M J, editors. Army of Botnets [ C ]. Proceedings of the 14th Annual Network and Distributed System Security Symposium, 2007.
  • 3Wang P, Sparks S, Zon CC. An Advanced Hybrid Peer- to-peer Botnet[ C 1. Dependable and Secure Computing, IEEE Transactions on, 2010,7 ( 2 ) : 113 - 127,.
  • 4Han Q, Yu W, Zhang Y, Zhao Z. Modeling and Evalua- ting of Typical Advanced Peer-to-peer Botnet [ J]. Per- formance Evaluation, 2014,72 : 1 - 15.
  • 5Napster Website [ EB/OL]. [ 2014 - 10 - 10 ]. http: ff www. napster, com.
  • 6Phatbot Trojan Analysis[ EB/OL]. [ 2014 - 10 - 6 ]. ht- tp :/f en. wikipedia, org/wiki/Zeus ( trojan horse).
  • 7Zeus Botnet[ EB/OL]. [ 2014 - 9 - 1 ]. http : ff en. wiki- pedia, org/wiki/Zeus ( trojan horse).
  • 8Zero Access [ EB/OL ]. [ 2014 - 10 - 15 ]. http ://en. wikipedia, org/wiki/ZeroAccess_botnet.
  • 9Mayhem-a Hidden Threat for Web Servers Available[ EB! OL]. (2014 - 10 -20). https: JJ www. virusbtn, corn/ blog/2014/07_17, xml.

二级参考文献26

  • 1金澈清,钱卫宁,周傲英.流数据分析与管理综述[J].软件学报,2004,15(8):1172-1181. 被引量:161
  • 2NELLY M M. Storm worm:a P2P botnet[ D]. Trondheim: Norwegian University of Science and Technology,2008.
  • 3STEGGINK M, IDZIEJCZAK I. Detection of peer-to-peer botnets [ R ]. Amsterdam : University of Amsterdam ,2008.
  • 4ZALEWSKI M. I don't think I really love you[ EB/OL]. (2000-05- 07) [2010-03-15 ]. http ://seclists. org/vuln-dev/2000 /May /0159. html.
  • 5ZHANG Jun. Strom worm & botnet analysis[ R]. San Diego:Websense Security Labs,2008.
  • 6WANG Ping, WU Lei, BABER A, et al. A systematic study on peer-to- peer botnets[ C]//Proc of the 18th International Conference on Computer Communications and Networks. Washington DC : IEEE Computer Society ,2009 : 1 - 8.
  • 7KANG Jian, ZHANG Jun-yao, LI Qiang,et al. Detecting new P2P botnet with multi-chart CUSUM [ C]//Proc of International Conference on Networks Security, Wireless Communications and Trusted Computing. Washington DC : IEEE Computer Society,2009:688- 691.
  • 8HA D T, YAN Guan-hua, EIDENBENZ S, et al. On the effectiveness of structural detection and defense against P2P-based botnets [ C ]// Proc of IEEE/IFIP International Conference on Dependable Systems & Networks. Washington DC : IEEE Computer Society,2009 : 297 -306.
  • 9YU Jun-feng, LI Zhi-tang, HU Jun, et al. Using simulation to characterize topology of peer to peer botnets [ C ]//Proc of International Conference on Computer Modeling and Simulation. Washington DC:IEEE Computer Society,2009:78 - 83.
  • 10GU Guo-fei, PERDISCI R, ZHANG Jun-jie, et al. BotMiner: clustering analysis of network traffic for protocol-and structure-independent batnet detection [ C ]//Proc of the 17th Conference on Security Symposium. Berkeley : USENIX Association ,2008 : 139-154.

共引文献5

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部