[1]王天佐,王怀民,刘波,等.僵尸网络中的关键问题[J].计算机学报,2012,35(6):1192-1208.
[2]诸葛建伟,韩心慧,周勇林,等.僵尸网络研究[J].软件学报,2008,19(3):702-715.
[3]方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331.
[4]白涛,刘成龙,曲武,等.基于网络流量异常的僵尸网络受控主机检测研究[J].计算机工程,2015,41(11):170-179.
[5]李景,姚一杨,卢新岱,等.基于Challenge策略的大规模恶意P2P僵尸节点检测技术[J].计算机工程,2016,42(10):158-163.
[6]成淑萍,谭良.基于网络流量的僵尸网络动态检测模型[J].计算机工程,2014,40(11):106-112.
[7]BACHER P,HOLZ T,KOTTER M,et al.Know your enemy:tracking botnets[EB/OL].[2017-08-25].http://www.honeynet.org /papers /bots.
[8]李大伟.基于Iaas的网络靶场试验系统设计与实现[J].指挥信息系统与技术,2015,6(5):1-6.
[9]李大伟.大规模IP网络仿真试验环境构建方法[J].指挥信息系统与技术,2013,4(6):70-74.
[10]DAVIS C R,FERNANDEZ J M,NEVILLE S.Optimising sybil attacks against P2P-based botnets[C]//Proceedings of International Conference on Malicious and Unwanted Software.Washington D.C.,USA:IEEE Press,2009:78-87.
[11]DAVIS C R,FERNANDEZ J M,NEVILLE S,et al.Sybil attacks as a mitigation strategy against the Storm botnet[C]//Proceedings of International Conference on Malicious and Unwanted Software.Washington D.C.,USA:IEEE Press,2008:32-40.
[12]JACKSON A W,LAPSLEY D,JONES C,et al.SLINGbot:a system for live investigation of next generation bot-nets[C]//Proceedings of CATCH’09.Washington D.C.,USA:IEEE Press,2009:313-318.
[13]BARFORD P,BLODGETT M.Toward botnet mesoco-sms[C]//Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets.[S.l.]:USENIX Association,2007:15-26.
[14]KEPHART J O,WHITE S R.Directed-graph epidemio-logical models of computerviruses[C]//Proceedings of 1991 IEEE Computer Society Symposium on Research in Security and Privacy.Washington D.C.,USA:IEEE Press,1991:343-359.
[15]李华波.P2P僵尸网络检测技术研究[D].南京:中国人民解放军理工大学,2012.
|