期刊文献+

P2P僵尸网络检测技术 被引量:2

Detection of Peer-to-Peer Botnets
原文传递
导出
摘要 僵尸网络是目前互联网安全最严重的威胁之一。与IRC僵尸网络比,基于P2P协议控制的僵尸网络具有更强的安全性、鲁棒性和隐蔽性。文章介绍了典型P2P僵尸网络的工作原理,对其对等点发现机制进行了分类,分析了每类机制的弱点,在此基础上给出了相应的僵尸网络检测方法。 Botnet is one of the most serious threats to the security of the Internet nowadays.As compared with IRC Botnets, the control ofP2P Botnets is more secure, robust and stealthy. The working principles for typical P2P Botnets are presented.And then the methods for peer discovery of P2P Botnets are classified, and their weak points are analyzed respectively. Based on the analysis, the methods for detecting P2P Botnets are given.
出处 《信息安全与通信保密》 2008年第4期34-36,共3页 Information Security and Communications Privacy
基金 哈尔滨工业大学(威海)校研究基金资助项目 编号:HIT(WH)200702
关键词 网络安全 僵尸网络 P2P 对等点发现 network security Botnet P2P peer discovery
  • 相关文献

参考文献4

  • 1徐恪,叶明江,胡懋智.P2P技术现状及未来发展[J].中兴通讯技术,2007,13(6):6-10. 被引量:11
  • 2[5]Reinier Schoof,Ralph Koning.Detecting peer-to-peer botnets[DB/OL].http://staff.science.uva.nl/delaat/sne-2006-2007/p17/report.pdf,2007,2,4. 被引量:1
  • 3[6]Joe Stewart.SpamThru Trojan Analysis[DB/OL].http://www.secureworks.com/research/threats/spamthru/,2006,10,18. 被引量:1
  • 4[7]Julian B Grizzard,Vikram Sharma,Chris Nunnery.Brent ByungHoon Kang and David Dagon.Peer to-Peer Botnets.Overview and Case Study[DB/OL].http://usenix.net/events/hotbots07/tech/full_papers/grizzard/grizzard.pdf,2007,4,4. 被引量:1

二级参考文献10

  • 1RATNASAMYS,FRANCIS P,HANDLEYM,et al.A scalable content-addressable network[].Proceedings of the International Conference of the Special Interest Group on Data Communication(SIGCOMM‘).2001 被引量:1
  • 2ROWSTRON A,DRUSCHEL P.Pastry:Scalable,decentralized object location,and routing for large-scale peer-to-peer systems[].Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms(Middleware‘).2001 被引量:1
  • 3XU Z,MAHALINGAM M,KARLSSON M.Turning heterogeneity into an advantage in overlay routing[].Proceedings of Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM’).2003 被引量:1
  • 4CLARKE I,SANDBERG O,WILEYB,et al.Freenet:A distributed anonymous information storage and retrieval system[].Http://freenetprojectorg/.1999 被引量:1
  • 5Gnutella development forum,the Gnutella v0.6protocol. http://groups.yahoo.com/group/the gdf/files/ . 2001 被引量:1
  • 6FastTrack.Peer-to-Peer technology company[].Http://wwwFastTracknu/.2001 被引量:1
  • 7.KaZaA media desktop[].Http://wwwKaZaAcom/.2001 被引量:1
  • 8SAROIU S,GUMMADI P K,GRIBBLE S D.A measurement study of peer-to-peer file sharing systems[].Proceedings of Multimedia Computing and Networking.2002 被引量:1
  • 9SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[].IEEE ACM Transactions on Networking.2004 被引量:1
  • 10BASET S A,SCHRULZRINNE H.An analysis of the skype peer-to-peer Internet telephony protocol[].Proceedings ofth IEEE International Conference on Computer Communications.2006 被引量:1

共引文献10

同被引文献12

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部