参考文献
[1]Nagaraja S,Mittal P,Hong Chiyao,et al.BotGrep:Finding P2P Bots with Structured Graph Analysis[C]//Proceedings of the 19th USENIX Conference on Security.New York,USA:ACM Press,2010:7.
[2]Holz T,Steiner M,Dahl F,et al.Measurements and Mitigation of Peer-to-Peer-based Botnets:A Case Study on Storm Worm[C]//Proceedings of the 1st Usenix Workshop on Large-scale Exploits and Emergent Threats.New York,USA:ACM Press,2008:115-124.
[3]Wang Binbin,Li Zhitang,Tu Hao,et al.Actively Measuring Bots in Peer-to-Peer Networks[M].New York,USA:ACM Press,2009.
[4]谢晃,张昱,王云凯.非结构化P2P 网络中基于节点的MQR 算法设计与实现[J].计算机工程,2014,40(9):111-116.
[5]王君,冀常鹏,汪洋,等.P2P网络中基于云模型的信任机制研究[J].计算机工程,2014,40(5):124-128.
[6]Sarat S,Terzis A.Measuring the Storm Worm Network:01-10-2007[R].HiNRG Johns Hopkins University,2007.
[7]Kutzner K,Fuhrmann T.Measuring Large Overlay Networks——The Overnet Example[C]//Proceedings of the 14th Conference on Kommunikation in Verteilten Systemen.Berlin,Germany:Springer,2005:193-204.
[8]黎梨苗,陈志刚,桂劲松,等.基于优先权的P2P网络信任模型[J].计算机工程,2013,39(5):148-151.
[9]Starnberger G,Kruegel C,Kirda E.Overbot:A Botnet Protocol Based on Kademlia[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York,USA:ACM Press,2008:241-242.
[10]Wang Ping,Wu Lei,Aslam B,et al.A Systematic Study on Peer-to-Peer Botnets[C]//Proceedings of the 18th International Conference on Computer Communications and Networks.Washington D.C.,USA:IEEE Press,2009:1-8.
[11]Wang Ping,Aslam B,Zou C C.Peer-to-Peer Botnets:The Next Generation of Botnet Attacks[J].Electrical Engineering,2010,24(4):1-25.
[12]成淑萍,谭良.基于网络流量的僵尸网络动态检测模型[J].计算机工程,2014,40(11):106-112.
[13]Liu Xuejiao,Xiao Debao,Ma Nian,et al.A Scalable,Vulnerability Modeling and Correlating Method for Network Security[C]//Proceedings of the 4th Inter-national Conference on Scalable Information Systems.Washington D.C.,USA:IEEE Press,2009:217-227.
[14]Liu Xuejiao,Fang Chengfang,Xiao Debao,et al.A Goal-oriented Approach for Modeling and Analyzing Attack Graph[C]//Proceedings of International Conference on Information Science and Application.Washington D.C.,USA:IEEE Press,2010:1-8.
[15]Stoica I,Morris R,Karger D,et al.Chord:A Scalable Peer-to-Peer Lookup Service for Internet Applications[C]//Proceedings of ACM SIGCOMM Computer Communi-cation Review.New York,USA:ACM Press,2001:149-160.
[16]Rowstron A,Druschel P.Pastry:Scalable,Decentralized Object Location,and Routing for Large-scale P2P Systems[C]//Proceedings of International Conference on Distributed Systems Platforms.New York,USA:ACM Press,2001:23-29.
[17]Maymounkov P,Mazieres D.Kademlia:A Peer-to-Peer Information System Based on the Xor Metric[J].Peer-to-Peer Systems,2002,32(2):53-65.
[18]Wang Binbin,Li Zhitang,Tu Hao,et al.Actively Measuring Bots in Peer-to-Peer Networks[C]//Proceedings of Inter-national Conference on Networks Security,Wireless Com-munications and Trusted Computing.New York,USA:ACM Press,2009:603-607.
[19]邵秀丽,蒋鸿玲,耿梅洁,等.基于关联关系和Map Reduce的僵尸网络检测[J].计算机工程,2014,40(5):115-119.
编辑顾逸斐 |