期刊文献+

基于云计算安全环境的僵尸网络传播模型 被引量:2

Botnet Propagation Modeling in Cloud Computing Security Environment
下载PDF
导出
摘要 针对僵尸网络在云安全体系统下的传播模型的研究,提出了一种云计算安全环境的僵尸网络传播模型CBPM(Cloud Botnet Propagation Model)。在考虑传统防御措施以及僵尸网络工作过程中造成的网络拥塞\阻塞的因素下,重点分析了云安全的部署及信息收集因素对僵尸网络传播模型的影响。采用微分方程建立CBPM的数学模型,通过仿真实验分析,并与已有传播模型进行对比,验证其有效性和合理性。 Aiming at the studying of propagation model of the Botnet under the emergence of cloud security,CBPM(cloud Botnet propagation model)is proposed. Based on considering the traditional defense measure and the working process of the botnet in network congestion,CBPM focuses on analyzing the deployment of cloud security and information collection factors on the influence of the botnet propagation model. Differential equation is adopted to establish the mathematical model of CBPM,and through the simulation analysis,compared with existing propagation model,its validity and rationality are verified.
作者 成淑萍 袁小艳 廖小平 甘元彪 CHENG Shuping;YUAN Xiaoyan;LIAO Xiaoping;GAN Yuanbiao(School of Intelligent Manufacturing,Sichuan University of Arts and Science,Dazhou 635001;Dazhou Industrial Technology Institute of Intelligent Manufacturing,Dazhou 635001;State Grid Chengkou County of Chongqing Power Supply Company,Chongqing 405900)
出处 《计算机与数字工程》 2018年第9期1830-1833,1865,共5页 Computer & Digital Engineering
基金 四川文理学院面上项目"基于特征相似性的僵尸云网络检测"(编号:2014Z011Y)资助
关键词 安全 僵尸网络 传播模型 cloud security botnet propagation modeling
  • 相关文献

参考文献10

二级参考文献126

  • 1李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 2Grizzard J B,Sharma V,Nunnery C,et al.Peer-to-Peer Botnets:Overview and Case Study[C] //Proc.of the 1st Workshop on Hot Topics in Understanding Botnets.Boston,USA:[s.n.] ,2007.
  • 3Noh Sang-Kyun,Oh Joo-Hyung,Lee Jae-Seo,et al.Detecting P2P Botnets Using a Multi-phased Folw Model[EB/OL].(2009-03-30).http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4782883.
  • 4Gu Guofei,Porras P,Yegneswaran V,et al.BotHunter:Detecting Malware Infection Through IDS-driven Dialog Correlation[C] // Proc.of the 16th USENIX Security Symposium.Boston,USA:[s.n.] ,2007.
  • 5Wang Ping,Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Botnet[C] //Proc.of the 1st Workshop on Hot Topics in Understanding Botnets.Boston,USA:[s.n.] ,2007.
  • 6Wang P, Sparks S, Zou C C. An Advanced HybridPeer to-Peer Botnet[C].//Proc. of the 1st Workshop on HotTopics in Understanding Botnets (HotBots 2007), Boston, 2007.
  • 7Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 8CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 9Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 10Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.

共引文献111

同被引文献12

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部