[1]Liu Jing, Xiao Yang, Ghaboosi K, et al. Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures[J]. EURASIP Journal on Wireless Communications and Networking, 2009, 10(11): 55-66. [2]诸葛建伟, 韩心慧, 周勇林, 等. 僵尸网络研究与进展[J]. 软件学报, 2008, 19(3): 702-715. [3]谢 静, 谭 良. 一种高鲁棒性的新型P2P僵尸网络[J]. 计算机工程, 2011, 37(7): 154-156. [4]Starnberger G, Kruegel C, Kirda E. Overbot——A Botnet Protocol Based on Kademlia[C]//Proc. of the 4th Int’l Conference on Security and Privacy in Communication Networks. Istanbul, Turkey: [s. n.], 2008. [5]Mazieres M. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric[C]//Proc. of International Workshop on Peer- to-Peer Systems. Cambridge, USA: [s. n.], 2002. [6]Wang Ping, Wu Lei, Aslam B, et al. A Systematic Study on Peer-to-Peer Botnets[C]//Proc. of International Conference on Computer Communications and Networks. San Francisco, USA: [s. n.], 2009. [7]Wang Ping, Sparks S, Zou C. An Advanced Hybrid Peer-to-peer Botnet[C]//Proc. of the 1st Workshop on Hot Topics in Understanding Botnets. Cambridge, USA: [s. n.], 2007. [8]Stone-Gross B, Cova M, Cavallaro L, et al. Your Botnet is My Botnet: Analysis of a Botnet Takeover[C]//Proc. of Conference on Computer and Communication Security. Chicago, USA: [s. n.], 2009. [9]Wang Peng, Tyra J, Eric C T, et al. Attacking the Kad Network[C]//Proc. of the 4th Int’l Conf. on Security and Privacy in Communication Networks. Istanbul, Turkey: [s. n.], 2008.
|