期刊文献+

P2P僵尸网络研究 被引量:2

Research of P2P Botnets
下载PDF
导出
摘要 P2P僵尸网络是一种新型网络攻击方式,因其稳定可靠、安全隐蔽的特性被越来越多地用于实施网络攻击,给网络安全带来严峻挑战.为深入理解P2P僵尸网络工作机理和发展趋势,促进检测技术研究,首先分析了P2P僵尸程序功能结构,然后对P2P僵尸网络结构进行了分类,并分析了各类网络结构的特点;在介绍了P2P僵尸网络生命周期的基础上,着重阐述了P2P僵尸网络在各个生命周期的工作机制;针对当前P2P僵尸网络检测研究现状,对检测方法进行了分类并介绍了各类检测方法的检测原理;最后对P2P僵尸网络的发展趋势进行了展望,并提出一种改进的P2P僵尸网络结构. P2P botnet is a new type of network attack. Because of reliable, safe and hidden characteristics, P2P botnets are increasingly used in network attacks, which have posed serious challenges to network security. In order to further understand the mechanism and the development trend of P2P botnets and promote the detection technology research, this paper first analyzes the functional structure of P2P botnets program, then introduces the classification of P2P botnets structure, and analyzes the characteristics of the various types of P2P botnets structure. Based on introducing the life cycle of P2P botnets, this paper focuses on the working mechanism of the P2P botnets in each life stage. Besides, the detection methods are classified and the principle of each detection method is introduced, which is based on the current research of P2P botnet detection. Finally, the development trend of P2P botnets is calculated and an improved P2P botnet structure is proposed.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第10期2203-2207,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61170286)资助
关键词 P2P 僵尸网络 网络安全 网络结构 工作机制 peer to peer botnet network security network structure working mechanism
  • 相关文献

参考文献12

  • 1Chen Gui-hai ,Li Zhen-hua. Peer-to-Peer network:structure, applica- tion and design [ M ]. Beijing: Tsinghua University Press,2007. 被引量:1
  • 2Barford P,Yegneswaran V. An inside look at botnets[ J]. Malware Detection ,2007 : 171-191. 被引量:1
  • 3Wang P,Sparks S,Zou C C. An advanced hybrid peer-to-peer bob net [ C ]. Proc. of the 1 st Workshop on Hot Topics in Understand- ing Botnets( HotBots 2007 ) ,Boston,2007. 被引量:1
  • 4诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 5柴胜,胡亮,梁波.一种p2p Botnet在线检测方法研究[J].电子学报,2011,39(4):906-912. 被引量:10
  • 6王海龙,龚正虎,侯婕.僵尸网络检测技术研究进展[J].计算机研究与发展,2010,47(12):2037-2048. 被引量:22
  • 7Wang P,Wu L,Aslam B. A systematic study on peer- to-peer bot- nets[ C ]. Proc. of International Conference on Computer Commu- nications and Networks(ICCCN2009) ,Aug,2009. 被引量:1
  • 8Rajab M,Zarfoss J,Monrose F. A multi-faceted approach to under- standing the botnet phenomenon[ A]. Proc. of the 6th ACM Sig- comm Conf on Internet Measurement Conference( IMC'06 ) [ C ], New York: ACM ,2006:41-52. 被引量:1
  • 9Gu Guo-fei, 7_,hang Jun-jie, Perdisci R. Botminer :clustering analysis of network traffic for protocol and structure-independent hornet de- tection[ C]. Proc. of the 17th USENIX Security Symposium( Se- curity'08 ), Berkeley, CA: USENIX Association,2008 : 139 -154. 被引量:1
  • 10Steggink M, Idziejczak I. Detection of peer-to-peer botnets [ D ]. Amsterdam,Holland: University of Amsterdam,2008. 被引量:1

二级参考文献86

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 4Geer D.Malicious bots threaten network security[J].IEEE Computer,2005,38(1):18-20. 被引量:1
  • 5Rajab M,Zarfoss J,Monrose F,et al.A multi-faceted approach to understanding the botnet phenomenon[C]//Proc of the 6th ACM SIGCOMM Conf on Internet Measurement Conference(IMC'06).New York:ACM,2006:41-52. 被引量:1
  • 6Dean T,Marc F,Eric J,et al.Symantec global Internet security threat report:Trends for July-December 07(Volume ⅩⅢ)[R].Cupertino,CA,USA:Symantec Inc.,2008. 被引量:1
  • 7Marc F,Eric J,Mack T,et al.Symantec global Internet security threat report:Trends for 2008(Volume ⅩⅣ)[R].Cupertino,CA,USA:Symantec Inc,2009. 被引量:1
  • 8Baecher P,Koetter M,Holz T,et al.The Nepenthes platform:An efficient approach to collect malware[G]//LNCS 4219:Proc of the Int Symp on Recent Advances in Intrusion Detection(RAID'06).Berlin:Springer,2006:165-184. 被引量:1
  • 9Zhu Zhaosheng,Fu Zhi Judy,Lu Guohan,et al.Botnet research survey[C]//Proc of the 32nd Int Computer Software and Applications Conference.Washington,DC:IEEE Computer Society,2008:967-972. 被引量:1
  • 10Govil J,Govil J.Criminology of botnets and their detection and defense methods[C]//Proc of 2007 IEEE Int Conf on Electro/Information Technology(EIT2007).Washington,DC:IEEE Computer Society,2007:215-220. 被引量:1

共引文献173

同被引文献22

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部