期刊文献+

P2P文件共享网络中被动蠕虫传播建模与分析 被引量:5

Propagation Modeling and Analysis of Passive Worms in Peer-to-Peer File-Sharing Networks
在线阅读 下载PDF
导出
摘要 为了抑制P2P被动型蠕虫在大规模P2P文件共享网中的传播和攻击,对P2P网络中文件共享的特点和被动型蠕虫传播的特点进行了深入的分析,并在此基础上提出了3个分别适用于蠕虫传播不同阶段的传播模型。为了证明模型的正确性,进行了大规模仿真实验。使用专门的数值分析工具求出相应模型的理论值。为了仿真大规模P2P文件共享网,专门基于P2P仿真平台开发出能真实模拟流行P2P文件共享网的软件并基于该软件进行了仿真。理论值与仿真值匹配的事实表明,该模型基本上反映了蠕虫的传播情况,可以用来预测蠕虫的传播趋势和行为。 To counter the attack and propagation of passive worms in large-scale peer-to-peer(P2P) file-sharing networks, three propagating models of passive worms suitable for different stages of worm propagation, are proposed based on deep analysis on the features of file sharing and passive worm propagation. In order to verify the validity of the three modes, large scale simulating experiments are carried out. To simulate the true popular P2P file-sharing networks, a simulating software is developed based on the P2P simulating platform PeerSim. Theory analysis and simulation show that these models are valid and can predict the tendency and behaviors of worm propagation.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2009年第2期262-265,273,共5页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60473090) 国家自然科学基金与英国皇家科学会合作项目(60711130232)
关键词 文件共享 被动型蠕虫 P2P网络 传播模型 仿真 file sharing passive worms P2P networks propagating models simulation
作者简介 冯朝胜(1971-),男。博士生,主要从事信息安全方面的研究.
  • 相关文献

参考文献12

  • 1CHEN Guan-ling, ROBERT S G. Simulating non-scanning worms on Peer-to-Peer networks[C]//Proceedings of the 1 st International Conference on Scalable Information Systems. Hong Kong, China: ACM, 2006.
  • 2STUTZBACH D, REJAIE R, SEN S. Characterizing unstructured overlay topologies in modem P2P file-sharing systems[C]//Proceedings of the Filth ACM Intemet Measurement Conference. Berkeley, CA: ACM, 2005: 49-62.
  • 3STUART S, VERN P, NICHOLAS W. How to own the internet in your spare time[C]//Proceedings of the 11th USENIX Security Symposium. San Francisco, CA: USENIX, 2002.
  • 4KANNAN J, LAKSHM1NARAYANAN K. Implications of Peer-to-Peer networks on worm attacks and defense[R]. 2003.
  • 5ZHOU Li-dong, ZHANG Lin-tao, MCSHEERY F. A first look at Peer-to-Peer worms threats and defenses[C]// Proceedings of Peer-to-Peer Systems 4th International Workshop (IPTPS). New York: Springer, 2005: 24-35.
  • 6WEI Yu. Analyze the worm-based attack in large scale P2P networks[C]//Proceedings of the 8th IEEE International Symposium on High Assurance Systems Engineering. Tampa, Florida: IEEE, 2004: 308-309.
  • 7WEI Yu. Analyzing the performance of intemet worm attack approaches[C]//Proceedings of the 13th International Conference on Computer Communications and Networks. Texas: IEEE, 2004: 1095-2055.
  • 8MA Jie, CHEN Xin-meng, XIANG Guang-li. Modeling passive worm propagation in Peer-to-Peer system[C]// Proceedings of IEEE 2006 International Conference on Computational Intelligence and Security. Guangzhou, China: IEEE, 2006: 1129-1132.
  • 9WEI Yu, BOYER C, CHELLAPPAN S, et al. Peer-to-Peer system-based active worm attacks: modeling and analysis[C]//Proceedings of IEEE International Conference on Communications (ICC). Texas: IEEE, 2005.
  • 10夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26

二级参考文献22

共引文献31

同被引文献27

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部