期刊文献+
共找到88篇文章
< 1 2 5 >
每页显示 20 50 100
A novel mathematical model on Peer-to-Peer botnet
1
作者 任玮 宋礼鹏 冯丽萍 《Journal of Measurement Science and Instrumentation》 CAS 2014年第4期62-67,共6页
Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P b... Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P botnet. Then, the local stability at equilibria is carefully analyzed by considering the eigenvalues' distributed ranges of characteristic equations. Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic re- production number and time delay r. The results can help us to better understand the propagation behaviors of P2P botnet and design effective counter-botnet methods. 展开更多
关键词 peer-to-peer (p2p) botnet STABILITY SEIR model time delay
下载PDF
Monitoring Peer-to-Peer Botnets:Requirements,Challenges,and Future Works
2
作者 Arkan Hammoodi Hasan Kabla Mohammed Anbar +2 位作者 Selvakumar Manickam Alwan Ahmed Abdulrahman Alwan Shankar Karuppayah 《Computers, Materials & Continua》 SCIE EI 2023年第5期3375-3398,共24页
The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as P... The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer(P2P)networks.The P2P botnets leverage the privileges of the decentralized nature of P2P networks.Consequently,the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures.Some P2P botnets are smarter to be stealthy in their Commandand-Control mechanisms(C2)and elude the standard discovery mechanisms.Therefore,the other side of this cyberwar is the monitor.The P2P botnet monitoring is an exacting mission because the monitoring must care about many aspects simultaneously.Some aspects pertain to the existing monitoring approaches,some pertain to the nature of P2P networks,and some to counter the botnets,i.e.,the anti-monitoring mechanisms.All these challenges should be considered in P2P botnet monitoring.To begin with,this paper provides an anatomy of P2P botnets.Thereafter,this paper exhaustively reviews the existing monitoring approaches of P2P botnets and thoroughly discusses each to reveal its advantages and disadvantages.In addition,this paper groups the monitoring approaches into three groups:passive,active,and hybrid monitoring approaches.Furthermore,this paper also discusses the functional and non-functional requirements of advanced monitoring.In conclusion,this paper ends by epitomizing the challenges of various aspects and gives future avenues for better monitoring of P2P botnets. 展开更多
关键词 p2p networks botnet p2p botnet botnet monitoring HONEYpOT crawlers
下载PDF
Peer-to-Peer网络中文件查询的研究 被引量:1
3
作者 王涛 卢显良 侯孟书 《计算机科学》 CSCD 北大核心 2005年第10期49-51,145,共4页
随着P2P网络应用研究的热化,文件查询即给出文件名后如何确定文件的存放位置,已经成为大规模分布式网络中最常遇到的问题之一。文件查询的效率直接影响到整个P2P网络的性能。本文从P2P网络的基本现状出发,给出了目前文件查询在非结构化... 随着P2P网络应用研究的热化,文件查询即给出文件名后如何确定文件的存放位置,已经成为大规模分布式网络中最常遇到的问题之一。文件查询的效率直接影响到整个P2P网络的性能。本文从P2P网络的基本现状出发,给出了目前文件查询在非结构化,结构化和松散结构化P2P网络中的解决方案并进行了深入分析和比较。文章最后指出了目前P2P网络中文件查询算法的缺点和今后的研究方向。 展开更多
关键词 p2p 文件查询 分布式 peer-to-peer 文件查询 网络应用 p2p网络 非结构化 分布式网络 存放位置 查询算法 文件名
下载PDF
蜜罐先知型半分布式P2P Botnet的构建及检测方法
4
作者 谢静 谭良 周明天 《计算机工程与应用》 CSCD 北大核心 2011年第7期89-92,共4页
蜜罐技术在僵尸网络(botnet)的防御和检测中扮演着重要的角色。攻击者可能会利用已有的基于蜜罐防御技术的漏洞,即防御者配置蜜罐要担当一定的责任,不允许蜜罐参与真实的攻击,进而构建出可以躲避蜜罐的botnet。针对这一问题,提出了攻击... 蜜罐技术在僵尸网络(botnet)的防御和检测中扮演着重要的角色。攻击者可能会利用已有的基于蜜罐防御技术的漏洞,即防御者配置蜜罐要担当一定的责任,不允许蜜罐参与真实的攻击,进而构建出可以躲避蜜罐的botnet。针对这一问题,提出了攻击者利用认证sensor组建的蜜罐先知型半分布式P2P botnet,针对此类botnet,提出了用高交互性蜜罐和低交互性蜜罐相结合的双重蜜罐检测技术,并与传统蜜罐技术做了比较。理论分析表明,该检测方法能够有效地弥补蜜罐防御技术的漏洞,提高了蜜罐先知型半分布式P2P botnet的检出率。 展开更多
关键词 半分布式p2p botnet 蜜罐先知 双重蜜罐 检测模型
下载PDF
半分布式P2P Botnet的检测方法研究
5
作者 谢静 谭良 《计算机应用研究》 CSCD 北大核心 2009年第10期3925-3928,共4页
Botnet近来已经是网络安全中最为严重的威胁之一,过去出现的Botnet大多数是基于IRC机制,检测方法也大都是针对这种类型的。随着P2P技术的广泛应用,半分布式P2P Botnet已经成为一种新的网络攻击手段。由于半分布式P2P Botnet的servent bo... Botnet近来已经是网络安全中最为严重的威胁之一,过去出现的Botnet大多数是基于IRC机制,检测方法也大都是针对这种类型的。随着P2P技术的广泛应用,半分布式P2P Botnet已经成为一种新的网络攻击手段。由于半分布式P2P Botnet的servent bot的分布范围大、网络直径宽而冗余度小,造成的危害已越来越大,对半分布式的Botnet的检测研究具有现实意义。阐述了半分布式P2P Botnet的定义、功能结构与工作机制,重点分析了目前半分布式P2P Botnet几种流行的检测方法,并进行了对比;最后,对半分布式P2P Botnet检测方法的发展趋势进行了展望。 展开更多
关键词 半分布p2p botnet 检测模型 蜜罐 流量分析 钩子
下载PDF
一种新型P2P Botnet的分析与检测 被引量:1
6
作者 周永嘉 庄洪林 张毓森 《计算机安全》 2008年第7期16-19,共4页
Botnet是一种新型网络攻击方式,它为攻击者提供了灵活高效的命令与控制机制,对Internet安全造成了巨大的威胁。该文概要介绍了Botnet技术,分析了基于P2P技术的Botnet的特点,并对一种新型P2P Botnet进行了深入的分析和研究,提出了对新型P... Botnet是一种新型网络攻击方式,它为攻击者提供了灵活高效的命令与控制机制,对Internet安全造成了巨大的威胁。该文概要介绍了Botnet技术,分析了基于P2P技术的Botnet的特点,并对一种新型P2P Botnet进行了深入的分析和研究,提出了对新型P2P Botnet的检测方法。 展开更多
关键词 botnet BOT p2p 命令与控制 检测
下载PDF
Detection of P2P botnet based on network behavior features and Dezert-Smarandache theory 被引量:1
7
作者 Song Yuanzhang Chen Yuan +2 位作者 Wang Junjie Wang Anbang Li Hongyu 《Journal of Southeast University(English Edition)》 EI CAS 2018年第2期191-198,共8页
In order to improve the accuracy of detecting the new P2P(peer-to-peer)botnet,a novel P2P botnet detection method based on the network behavior features and Dezert-Smarandache theory is proposed.It focuses on the netw... In order to improve the accuracy of detecting the new P2P(peer-to-peer)botnet,a novel P2P botnet detection method based on the network behavior features and Dezert-Smarandache theory is proposed.It focuses on the network behavior features,which are the essential abnormal features of the P2P botnet and do not change with the network topology,the network protocol or the network attack type launched by the P2P botnet.First,the network behavior features are accurately described by the local singularity and the information entropy theory.Then,two detection results are acquired by using the Kalman filter to detect the anomalies of the above two features.Finally,the above two detection results are fused with the Dezert-Smarandache theory to obtain the final detection results.The experimental results demonstrate that the proposed method can effectively detect the new P2P botnet and that it considerably outperforms other methods at a lower degree of false negative rate and false positive rate,and the false negative rate and the false positive rate can reach 0.09 and 0.12,respectively. 展开更多
关键词 p2p(peer-to-peer)botnet local singularity ENTROpY Kalman filter Dezert-Smarandache theory
下载PDF
Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks 被引量:1
8
作者 Ajay Arunachalam Vinayakumar Ravi +2 位作者 Moez Krichen Roobaea Alroobaea Jehad Saad Alqurni 《Computers, Materials & Continua》 SCIE EI 2021年第7期983-1001,共19页
One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying que... One of the key challenges in ad-hoc networks is the resource discovery problem.How efciently&quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question?Broadcasting is a basic technique in the Mobile Ad-hoc Networks(MANETs),and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive ooding technique oods the network with query messages,while the random walk scheme operates by contacting subsets of each node’s neighbors at every step,thereby restricting the search space.Many earlier works have mainly focused on the simulation-based analysis of ooding technique,and its variants,in a wired network scenario.Although,there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of mobile P2P networks.In this article,we mathematically model different widely used existing search techniques,and compare with the proposed improved random walk method,a simple lightweight approach suitable for the non-DHT architecture.We provide analytical expressions to measure the performance of the different ooding-based search techniques,and our proposed technique.We analytically derive 3 relevant key performance measures,i.e.,the avg.number of steps needed to nd a resource,the probability of locating a resource,and the avg.number of messages generated during the entire search process. 展开更多
关键词 Mathematical model MANET p2p networks p2p MANET UNSTRUCTURED search algorithms peer-to-peer AD-HOC ooding random walk resource discovery content discovery mobile peer-to-peer broadcast pEER
下载PDF
Study on semantic-oriented hybrid indexing strategy of resource metadata in peer-to-peer network 被引量:1
9
作者 LIU Zhen ZHOU Mao-wei +1 位作者 HUANG Hong-bin LUO Xue-shan 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第1期88-94,共7页
Applying ontology to describe resource metadata richly in the peer-to-peer environment has become current research trend. In this semantic peer-to-peer environment, indexing semantic element of resource description to... Applying ontology to describe resource metadata richly in the peer-to-peer environment has become current research trend. In this semantic peer-to-peer environment, indexing semantic element of resource description to support efficient resource location is a difficult and challenging problem. This paper provided a hybrid indexing architecture, which combines local indexing and global indexing. It uses community strategy and semantic routing strategy to organize key layer metadata element and uses DHT (distributed hash table) to index extensional layer metadata element. Compared with related system, this approach is more efficient in resource location and more scalable. 展开更多
关键词 peer-to-peer (p2p) ONTOLOGY METADATA Resource indexing
下载PDF
KRBKSS: a keyword relationship based keyword-set search system for peer-to-peer networks 被引量:1
10
作者 张亮 邹福泰 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期577-582,共6页
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ... may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query. 展开更多
关键词 peer-to-peer (p2p) Keyword-set search (KSS) Keyword relationship
下载PDF
Rate-distortion optimized bitstream switching for peer-to-peer live streaming
11
作者 Jin-feng ZHANG Rong-gang WANG +2 位作者 Jian-wei NIU Yuan DONG Hai-la WANG 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期445-456,共12页
Peer-to-peer (P2P) technology provides a cost-effective and scalable way to distribute video data. However, high heterogeneity of the P2P network, which rises not only from heterogeneous link capacity between peers bu... Peer-to-peer (P2P) technology provides a cost-effective and scalable way to distribute video data. However, high heterogeneity of the P2P network, which rises not only from heterogeneous link capacity between peers but also from dynamic variation of available bandwidth, brings forward great challenge to video streaming. To attack this problem, an adaptive scheme based on rate-distortion optimization (RDO) is proposed in this paper. While low complexity RDO based frame dropping is exploited to shape bitrate into available bandwidth in peers, the streamed bitstream is dynamically switched among multiple available versions in an RDO way by the streaming server. Simulation results show that the proposed scheme based on RDO achieves great gain in overall perceived quality over simple heuristic schemes. 展开更多
关键词 Stream switching Frame dropping peer-to-peer (p2p) Rate-distortion optimization (RDO)
下载PDF
A PEER-TO-PEER INCENTIVE SCHEME FOR OVERCOMING FREE RIDING
12
作者 Tian Junfeng Yang Lidan Li Juan Tian Rui 《Journal of Electronics(China)》 2010年第1期60-67,共8页
Free riding has a great influence on the expandability,robustness and availability of Peer-to-Peer(P2P) network.Controlling free riding has become a hot research issue both in academic and industrial communities.An in... Free riding has a great influence on the expandability,robustness and availability of Peer-to-Peer(P2P) network.Controlling free riding has become a hot research issue both in academic and industrial communities.An incentive scheme is proposed to overcoming free riding in P2P network in this paper.According to the behavior and function of nodes,the P2P network is abstracted to be a Distributed and Monitoring-based Hierarchical Structure Mechanism(DMHSM) model.A utility function based on several influencing factors is defined to determine the contribution of peers to the whole system.This paper also introduces reputation and permit mechanism into the scheme to guarantee the Quality of Service(QoS) and to reward or punish peers in the network.Finally,the simulation results verify the effectiveness and feasibility of this model. 展开更多
关键词 peer-to-peer(p2p) network Free riding Incentive mechanism REpUTATION Utility function
下载PDF
Detecting P2P Botnet by Analyzing Macroscopic Characteristics with Fractal and Information Fusion
13
作者 SONG Yuanzhang 《China Communications》 SCIE CSCD 2015年第2期107-117,共11页
Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which... Towards the problems of existing detection methods,a novel real-time detection method(DMFIF) based on fractal and information fusion is proposed.It focuses on the intrinsic macroscopic characteristics of network,which reflect not the "unique" abnormalities of P2P botnets but the "common" abnormalities of them.It regards network traffic as the signal,and synthetically considers the macroscopic characteristics of network under different time scales with the fractal theory,including the self-similarity and the local singularity,which don't vary with the topology structures,the protocols and the attack types of P2P botnet.At first detect traffic abnormalities of the above characteristics with the nonparametric CUSUM algorithm,and achieve the final result by fusing the above detection results with the Dempster-Shafer evidence theory.Moreover,the side effect on detecting P2P botnet which web applications generated is considered.The experiments show that DMFIF can detect P2P botnet with a higher degree of precision. 展开更多
关键词 p2p botnet fractal information fusion CUSUM algorithm
下载PDF
基于P2P网络的大规模视频直播系统 被引量:38
14
作者 罗建光 张萌 +1 位作者 赵黎 杨士强 《软件学报》 EI CSCD 北大核心 2007年第2期391-399,共9页
介绍了一种基于P2P(peer-to-peer)网络的大规模视频直播系统Gridmedia.该系统采用Gossip协议构建无结构的应用层覆盖网络,每个节点可以独立地选择自己的伙伴节点.在覆盖网络上,每个节点通过一种推拉结合的流传输策略从邻居节点获取数据.... 介绍了一种基于P2P(peer-to-peer)网络的大规模视频直播系统Gridmedia.该系统采用Gossip协议构建无结构的应用层覆盖网络,每个节点可以独立地选择自己的伙伴节点.在覆盖网络上,每个节点通过一种推拉结合的流传输策略从邻居节点获取数据.与DONet中的纯拉策略相比,推拉结合策略大幅度减小了终端用户观看视频的延迟,并有效降低了直播系统的控制开销.PlanetLab上的大量实验充分表明了该策略的有效性.Gridmedia的原型系统通过300Kbps的视频码流对2005年春节联欢晚会进行了全球互联网直播.晚会期间,全球范围内有超过500000人次通过系统观看了直播,最高在线人数达到了15239人,充分验证了系统的性能. 展开更多
关键词 p2p(peer-to-peer)络 视频直播 无结构覆盖网络 推拉结合策略 低延迟
下载PDF
用Small-World设计无组织P2P系统的路由算法 被引量:31
15
作者 周晋 路海明 李衍达 《软件学报》 EI CSCD 北大核心 2004年第6期915-923,共9页
由于peer-to-peer系统在文件共享方面有着巨大的应用前景,peer-to-peer搜索问题已成为目前学术界重点的研究问题之一.对于缺乏缓存机制的无组织P2P系统,已有的分布式路由算法缺乏全局导航能力,属于无序搜索.为此,提出一种key clusterin... 由于peer-to-peer系统在文件共享方面有着巨大的应用前景,peer-to-peer搜索问题已成为目前学术界重点的研究问题之一.对于缺乏缓存机制的无组织P2P系统,已有的分布式路由算法缺乏全局导航能力,属于无序搜索.为此,提出一种key clustering算法,将路由空间分为HUB和AUT两层,从全局角度进行有序搜索.为提高key clustering算法的可扩展性,借鉴Small-world领域的研究成果,在路由表中以一定概率插入连接远距离节点的快捷连接,以缩短平均路径长度.初步仿真实验表明,引入快捷连接的key clustering算法具有良好的搜索能力和扩展性. 展开更多
关键词 p2p路由 聚类 小世界 无组织peer-to-peer系统
下载PDF
P2P数据管理 被引量:17
16
作者 余敏 李战怀 张龙波 《软件学报》 EI CSCD 北大核心 2006年第8期1717-1730,共14页
P2P(peer-to-peer)技术是未来重构分布式体系结构的关键技术,拥有广阔的应用前景.P2P系统的大多数问题都可归结为数据放置和检索问题,因此,P2P数据管理成为数据库领域活跃的研究课题.当前,P2P数据管理主要有信息检索、数据库查询和连续... P2P(peer-to-peer)技术是未来重构分布式体系结构的关键技术,拥有广阔的应用前景.P2P系统的大多数问题都可归结为数据放置和检索问题,因此,P2P数据管理成为数据库领域活跃的研究课题.当前,P2P数据管理主要有信息检索、数据库查询和连续查询3个子领域,取得了许多研究成果.在介绍P2P技术的优点后,指出了P2P数据管理研究的目标.然后针对上述3个方面,论述P2P数据管理研究的现状,着重讨论了P2P数据库查询的索引构造策略、语义异构的解决方法、查询语义、查询处理策略、查询类型和查询优化技术.通过比较,指出了现状与目标的差距,提出了需要进一步研究的问题. 展开更多
关键词 p2p(peer-to-peer) 索引 语义调和 查询语义 复杂查询处理 查询优化
下载PDF
P2P—对等网络的未来 被引量:34
17
作者 汤晟 吴朝晖 《计算机应用研究》 CSCD 北大核心 2004年第1期13-16,22,共5页
P2P(Peer-to-Peer)引导网络计算模式从集中式向分布式偏移,网络应用的核心从中央服务器向网络边缘的终端设备扩散。P2P是一种基于互联网的新的应用型技术,主要为软件技术。主要介绍了P2P技术的背景起源,关键技术和应用趋势,并重点分析了... P2P(Peer-to-Peer)引导网络计算模式从集中式向分布式偏移,网络应用的核心从中央服务器向网络边缘的终端设备扩散。P2P是一种基于互联网的新的应用型技术,主要为软件技术。主要介绍了P2P技术的背景起源,关键技术和应用趋势,并重点分析了SUN公司提出的P2P平台:JXTA的体系机构。 展开更多
关键词 p2p(peer-to-peer) JXTA 网络计算 对等联网
下载PDF
Study on the Distributed Routing Algorithm and Its Security for Peer-to-Peer Computing
18
作者 ZHOUShi-jie 《Journal of Electronic Science and Technology of China》 2005年第2期187-188,共2页
关键词 peer-to-peer computing p2p distributed computing information security distributed routing algorithm bidding-electing algorithm one-way accumulator
下载PDF
一种高鲁棒性的新型P2P僵尸网络 被引量:3
19
作者 谢静 谭良 《计算机工程》 CAS CSCD 北大核心 2011年第7期154-156,共3页
提出一种利用认证sensor组建的蜜罐先知型半分布式P2P僵尸网络(Botnet),通过连接比C(p)和度数比D(p)2个度量函数,并在peer-list更新过程中使用不同数量servent bots,讨论其鲁棒性的变化。结果表明,与传统Botnet相比,该类Botnet具有较高... 提出一种利用认证sensor组建的蜜罐先知型半分布式P2P僵尸网络(Botnet),通过连接比C(p)和度数比D(p)2个度量函数,并在peer-list更新过程中使用不同数量servent bots,讨论其鲁棒性的变化。结果表明,与传统Botnet相比,该类Botnet具有较高的鲁棒性。 展开更多
关键词 僵尸网络 鲁棒性分析 半分布式p2p botnet 反检测
下载PDF
一种新的P2P网络自组织数据路由模型 被引量:1
20
作者 刘云 沈波 张宏科 《高技术通讯》 EI CAS CSCD 2004年第12期16-20,共5页
提出了一种新的P2P(Peer-to-Peer)网络数据路由模型(SPDR)。SPDR利用具有数据转发能力的P2P节点构造虚拟数据路由,使P2P节点能够动态地突破网络对通信双方的限制,从而解决当前P2P网络中许多节点无法进行数据交换的问题,增强P2P网络... 提出了一种新的P2P(Peer-to-Peer)网络数据路由模型(SPDR)。SPDR利用具有数据转发能力的P2P节点构造虚拟数据路由,使P2P节点能够动态地突破网络对通信双方的限制,从而解决当前P2P网络中许多节点无法进行数据交换的问题,增强P2P网络的通信能力。此外,SPDR采用自组织的方式管理P2P网络的数据路由建立过程,保持了P2P网络的可扩展性。仿真结果表明,SPDR明显改善了P2P资源的可访问性。 展开更多
关键词 p2p网络 路由模型 peer-to-peer 行数据 仿真结果 网络数据 可扩展性 数据转发 通信能力 节点
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部