J4 ›› 2008, Vol. 30 ›› Issue (5): 20-22.
• 论文 • Previous Articles Next Articles
Online:
Published:
Abstract:
In order to understand the principles of future malicious overlay networks (MONs) and establish the corresponding defense strategies, a feasible des ign of the P2P-structured command and control (C&C) MONs is presented in this paper. In the design, a self-constrained worm based node capture strate egy, a preferential attachment based link generation strategy,and a gossip protocol based message broadcast strategy are adopted together. A simulation analysis is also performed.
Key words: malicious overlay network, sel-constrained worm, preferential attachment gossip protocol
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2008/V30/I5/20