期刊文献+

基于对等网协议的BotNet防御系统的设计

Design of BotNet Defense System Based on Peer to Peer Network Protocol
下载PDF
导出
摘要 BotNet(僵尸网络)具有安全隐蔽、稳定可靠的特性,如今已成为网络攻击的工具,给网络安全来严峻的考验。为了更好地防御僵尸网络带来的危害,保证网络的安全,首先分析了基于对等网协议的BotNet的发展历程和工作过程,根据其工作特性,设计出一个基于对等网协议的Bot Net防御系统[1]。 botnet has a secret, stable and reliable characteristics, now has become a tool of network attacks, to network security to a severe test. In order to better defend against the harm of Botnet, to ensure the safety of the network, the first analysis of the characteristics and development of BotNet status, the characteristics and working principle of BotNet, design a BotNet defense system.
作者 方新丽 FANG Xin-li (Department of Computer Science, Huainan Union University, Huainan 232038, China)
出处 《电脑知识与技术》 2016年第5期30-31,共2页 Computer Knowledge and Technology
基金 基于对等网协议的BotNet的检测与防治研究(项目编号KJ2016A657)
关键词 对等网 协议 BOTNET 网络安全 防御系统 设计 peer to peer network protocol BotNet network security defense system design
  • 相关文献

参考文献10

二级参考文献179

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2闫巧,吴建平,江勇.网络攻击源追踪技术的分类和展望[J].清华大学学报(自然科学版),2005,45(4):497-500. 被引量:15
  • 3孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 4Lee S C, Shields C. Tracing the Source of Network Attack: A Technical, Legal and Societal Problem[C]//Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, NY United States Military Academy, West Point, 2001:5-6.
  • 5StefanSavage, DavidWetherall, AnnaKarlin, et al. Practical Network Support for IP Traceback[D]. WA, USA:Department of Computer Science and Engineering University of Washington Seattle. 2000.
  • 6Vadim Kuznetsov. Andrei Simkin. Helena Sandstrom. An evaluation of different IP traceback approaches[D]. Sweden Department of Computer Science and Electrical Engineering Lulea University of Technology, SE-971 87 Lulea, 2003.
  • 7Andreou M S, van Moorsel. Logging Switched Ethernets[D]. UK:School Based IP Traceback in of Computing Science Newcastle University Newcastle upon Tyne, 2006.
  • 8Snoerent A C, Partridge C, Sanchez L A, et al. Hash-Based IP Traceback[D]. Cambridge, BBN Technologies10 Moulton Street 2001.
  • 9Song D X, Perrig A. Advanced and Authenticated Marking Schemes for IP Traceback[D]. California: Computer Science Division (EECS)University of California Berkeley, 2000.
  • 10Belenky A, Ansari N. Internet Deployment of DPM-based IP Traceback[J]. Journal of Computing and Information Technology-CIT 16, 2008(02): 109-118.

共引文献134

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部