J4 ›› 2008, Vol. 30 ›› Issue (5): 20-22.
• 论文 • 上一篇 下一篇
蒿敬波[1] 殷建平[1] 李荣波[2] 张波云[1]
出版日期:
发布日期:
Online:
Published:
摘要:
为了解未来可能出现的恶意覆盖网络的工作原理,以便制定相应的防御策略,本文提出了一套构造P2P结构C&C恶意网络的可行方案。方案中采用了基于自约束蠕虫的节点捕获 、基于偏好依附的链路生成和基于闲聊协议的消息广播等策略,并进行了仿真分析。
关键词: 恶意覆盖网络 自约束蠕虫 偏好依附 闲聊协议
Abstract:
In order to understand the principles of future malicious overlay networks (MONs) and establish the corresponding defense strategies, a feasible des ign of the P2P-structured command and control (C&C) MONs is presented in this paper. In the design, a self-constrained worm based node capture strate egy, a preferential attachment based link generation strategy,and a gossip protocol based message broadcast strategy are adopted together. A simulation analysis is also performed.
Key words: malicious overlay network, sel-constrained worm, preferential attachment gossip protocol
蒿敬波[1] 殷建平[1] 李荣波[2] 张波云[1]. 一类P2P结构C&C恶意覆盖网络的构造分析[J]. J4, 2008, 30(5): 20-22.
0 / / 推荐
导出引用管理器 EndNote|Ris|BibTeX
链接本文: http://joces.nudt.edu.cn/CN/
http://joces.nudt.edu.cn/CN/Y2008/V30/I5/20