期刊文献+

Research and Development of P2P Worms

Research and Development of P2P Worms
下载PDF
导出
摘要 With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail. With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.
出处 《Journal of Electronic Science and Technology》 CAS 2011年第3期202-210,共9页 电子科技学刊(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No. 60873075
关键词 Index Terms---Peer-to-peer (P2P) P2P worm worm propagation model. Index Terms---Peer-to-peer (P2P), P2P worm, worm propagation model.
  • 相关文献

参考文献7

二级参考文献93

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2郑辉,李冠一.Google Hacking与智能蠕虫防治[J].信息安全与通信保密,2005,27(8):70-73. 被引量:3
  • 3Chen G, Gray R S. Simulating non-scanning worms on peer- to-peer networks[C/OL] /]Proc of the 1st Int Conf on Scalable Information Systems. New York: ACM, 2006 [2008-04-12]. http://www.cs. uml. edu/-glchen//papers/ chen_p2pworm. pdf. 被引量:1
  • 4Zhou L, Zhang L, McSherry F, et al. A first look at peer-to- peer worms: Threats and defenses [C] //Proc of the 4th Int Workshop on Peer-to-Peer Systems. Berlin: Springer, 2005: 24-35. 被引量:1
  • 5McKendrick A G. Applications of mathematics to medical problems [C] //Proc of the 44th Edinburgh Mathematica Society. Edinburgh: Cambridge University, 1926:98-130. 被引量:1
  • 6Kephart J O, White S R. Directed-graph epidemlological models of computer viruses [C]//Proc of the IEEE Syrup on Security andPrivacy. Piscataway, NJ: IEEE, 1991: 343- 359. 被引量:1
  • 7Zou C C, Gong W, Towsley D. Code red worm propagation modeling and analysis [C/OL] //Proc of the ACM Conf on Computer and Communication Security (CCS'02). New York: ACM, 2002 [2008-01-20]. http://www. itsec.gov. cn/webportal/download/2002-Code% 20Red% 20Worm% 20Propagation%20Modeling%20and%20Analysis. pdf. 被引量:1
  • 8Zou C C, Towsley D, Gong W. Email worm modeling and defence [C]//Proc of the 13th Int Conf on Computer Communication and Networks. Piscataway, NJ: IEEE, 2004 : 409-414. 被引量:1
  • 9Qiu D, Srikant R. Modeling and performance analysis of BitTorrent-like peer-to-peer networks [C]//Proc of the ACM SIGCOMM. New York: ACM, 2004:367-378. 被引量:1
  • 10Dumitriu D, Knightly E, Kuzmanovic A, et al. Deniabofservice resilience in peer-to-peer file-sharing systems [C/OL] //Proc of ACM Sigmetrics. New York: ACM, 2005[2008-02-05]. http://iris. esail. mit. edu/irisbib/papers/dos: sigmetries04/paper. pdf. 被引量:1

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部