• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2008, Vol. 30 ›› Issue (5): 20-22.

• 论文 • Previous Articles     Next Articles

  

  • Online:2008-05-01 Published:2010-05-19

Abstract:

In order to understand the principles of future malicious overlay networks (MONs) and establish the corresponding defense strategies, a feasible des   ign of the P2P-structured command and control (C&C) MONs is presented in this paper. In the design, a self-constrained worm based node capture strate egy, a preferential attachment based link generation strategy,and a gossip protocol based message broadcast strategy are adopted together. A simulation   analysis is also performed.

Key words: malicious overlay network, sel-constrained worm, preferential attachment gossip protocol