[1]Wang Ping, Wu Lei, Aslam B, et al. A Systematic Study on Peer- to-Peer Botnets[C]//Proceedings of International Conference on Computer Communications and Networks. San Francisco, USA: [s. n.], 2009.
[2]诸葛建伟, 韩心慧, 周勇林, 等. 僵尸网络研究与进展[J]. 软件学报, 2008, 19(3): 702-715.
[3]Grizzard J, Sharma V, Nunnery C, et al. Peer-to-Peer Botnets: Overview and Case Study[C]//Proceedings of Workshop on Hot Topics in Understanding Botnets. Cambridge, USA: [s. n.], 2007.
[4]Wang Ping, Sparks S, Zou C C. An Advanced Hybrid Peer-to-Peer Botnet[C]//Proceedings of Workshop on Hot Topics in Understanding Botnets. Cambridge, USA: [s. n.], 2007.
[5]Vogt R, Aycock J, Jacobson M. Army of Botnets[C]//Proceedings of the 14th Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2007.
[6]Liu Jing, Xiao Yang, Ghaboosi K, et al. Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures[EB/OL]. [2011-04-23]. http://downloads.hindawi.com/journals/wcn/2009/ 692654.pdf.
[7]Dimitrios T, Nick R. Analysis and Comparison of P2P Search Methods[C]//Proceedings of the lst International Conference on Scalable Information Systems. Hong Kong, China: [s. n.], 2006.
[8]Ripeanu M. Peer-to-Peer Architecture Case Study: Gnutella Network[C]//Proceedings of the 1st International Conference on Peer-to-Peer Computing. Stockholm, Sweden: [s. n.], 2001.
[9]Portmann M, Sookavatana P, Ardon S, et al. The Cost of Peer Discovery and Searching in the Gnutella Peer-to-Peer File Sharing Protocol[C]//Proceedings of the 19th International Conference on Networks. Vancouver, Canada: IEEE Press, 2001: 263-268.
[10]Cohen E, Shenken S. Replication Strategies in Unstructured Peer-to-Peer Networks[C]//Proceedings of ACM SIGCOM’02. [S. l.]: ACM Press, 2002: 177-190.
[11]Starnberger G, Kruegel C, Kirda E. Overbot——A Botnet Protocol Based on Kademlia[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. Istanbul, Turkey: [s. n.], 2008.
[12]Mazieres M. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric[C]//Proceedings of International Workshop on Peer-to-Peer Systems. Cambridge, USA: [s. n.], 2002.
[13]Wang Peng, Tyra J, Chan T E, et al. Attacking the Kad Network[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. Istanbul, Turkey: [s. n.], 2008.
[14]Lv Qin, Cao Pei, Cohen E, et al. Search and Replication in Unstructured Peer-to-Peer Networks[C]//Proceedings of Multi- media Computing and Networking Conference. San Jose, USA: [s. n.], 2002: 84-95.
[15]Stutzbach D, Rejaie R. Understanding Churn in Peer-to-Peer Networks[C]//Proceedings of Internet Measurement Conference. Janeiro, Brazil: [s. n.], 2006.
[16]Jiang Song, Guo Lei, Zhang Xiaodong. Light Flood: An Efficient Flooding Scheme for File Search in Unstructured Peer-to-Peer Systems[C]//Proceedings of ICPP’03. Kaohsiung, China: [s. n.], 2003: 627-635.
[17]Steiner M, En-Najjary T, Biersack E W. A Global View of Kad[C]// Proceedings of the Internet Measurement Conference. San Diego, USA: [s. n.], 2007. |