期刊文献+

基于Kademlia协议的高生存性P2P僵尸网络 被引量:2

New P2P botnet with high survivability based on Kademlia protocol
下载PDF
导出
摘要 为了提高僵尸网络的生存能力,通过对现有反僵尸网络技术的分析,从攻击者角度提出了一种基于Kademlia协议的高生存性P2P僵尸网络,通过设计一套通信加密认证和节点身份认证机制提高了僵尸网络的生存能力,理论分析表明该机制可以较为有效地应对伪造命令攻击和女巫攻击,并通过实验证明了新型僵尸网络的高生存性。 At present there are many kinds of technologies which can track, detect and counter botnet effectively, whieh are serious threats to botnet. In order to improve the survivability of botnets, with the analysis on the existing anti-botnet technology, the paper proposd a new P2P-botnet based on Kademlia protocol from an attackers prospective. A communication encryption and node authentication mechanism was designed. The theoretical analysis shows that the mechanism can effectively address improper command attack and sybil attack. Eventually, the experimental results verify that this botnet has high survivability.
机构地区 信息工程大学
出处 《计算机应用》 CSCD 北大核心 2013年第5期1362-1366,1377,共6页 journal of Computer Applications
关键词 Kademlia网络 僵尸网络 生存能力 加密认证 女巫节点 Kademlia network botnet survivability cryptographic validation sybil node
  • 相关文献

参考文献15

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2LIU J, XIAO Y, GHABOOSI K, et al. Botnet: classification, at- tacks, detection, tracing, and preventive measures [ C ]// ICICIC'09: Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control. New York: ACM, 2009: 1184- - 1187.
  • 3李鹤帅,朱俊虎,周天阳,王清贤.P2P技术在僵尸网络中的应用研究[J].计算机工程,2012,38(14):1-4. 被引量:3
  • 4WANG P, WU L, ASLAM B, et al. A systematic study on peer-to- peer botnets[ C]// ICCCN'09: Proceedings of International Confer- ence on Computer Communications and Networks. Washington, DC: IEEE Computer Society, 2009:1 -8.
  • 5DASWANI N, STOPPELMAN M. The anatomy of clickbot[ C]// Proceedings of the 1 st Workshop on Hot Topics in Understanding Botnets. Berkeley: USENIX Association, 2007.
  • 6LI J, EHRENKRANZ T, KUENNING G, et al. Simulation and a- nalysis on the resiliency and efficiency of malnets [ C ]// MMSM 2005: Proceedings of the 19 th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC: IEEE Computer Soci- ety, 2005:262 - 269.
  • 7MAYMOUNKOV P, MAZIERES D. Kadernlia: A peer-to-peer in- formation system based on the xor metric[ C]//IPTPS: International Workshop on Peer-to-Peer Systems. Berlin: Springer, 2002:53 - 65.
  • 8STARNBERGER G, KRUEGEL C, KIRDA E. Overbot - a botnet protocol based on Kademlia[ C]// Proceedings of the 4th Interna- tional Conference on Security and Privacy in Communication Net- works. New York: ACM, 2008:1 -9.
  • 9WANG P, TYRA J, CHAN E, et al. Attacking the Kad network [ C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York: ACM, 2008: 877 - 907.
  • 10WANG P, SPARKS S, ZOU C C. An advanced hybrid peer-to-peer botnet[ C]// Proceedings 2007 USENIX First Workshop on Hot Top- ies in Understanding Botnets. Berkeley: USENIX Association, 2007: 2.

二级参考文献21

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3Wang Ping, Wu Lei, Aslam B, et al. A Systematic Study on Peer- to-Peer Botnets[C]//Proceedings of International Conference onComputer Communications and Networks. San Francisco, USA: [s. n.], 2009.
  • 4Grizzard J, Sharma V, Nunnery C, et al. Peer-to-Peer Botnets: Overview and Case Study[C]//Proceedings of Workshop on Hot Topics in Understanding Botnets. Cambridge, USA: [s. n.], 2007.
  • 5Wang Ping, Sparks S, Zou C C. An Advanced Hybrid Peer-to-PeerBomet[C]//Proceedings of Workshop on Hot Topics in Understanding Botnets. Cambridge, USA: [s. n.], 2007.
  • 6Vogt R, Aycock J, Jacobson M. Army of Botnets[C]//Proceedings of the 14th Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2007.
  • 7Liu Jing, Xiao Yang, Ghaboosi K, et al. Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures[EB/OL]. [2011-04-23]. http://downloads.hindawi.eom/journals/wcn/2009/ 692654.pdf.
  • 8Dimitrios T, Nick R. Analysis and Comparison of P2P Search Methods[C]//Proceedings of the 1st International Conference on Scalable Information Systems. Hong Kong, China: [s. n.], 2006.
  • 9Ripeanu M. Peer-to-Peer Architecture Case Study: Gnutella Network[C]//Proceedings of the 1st International Conference on Peer-to-Peer Computing. Stockholm, Sweden: [s. n.], 2001.
  • 10Portmann M, Sookavatana P, Ardon S, et al. The Cost of Peer Discovery and Searching in the Gnutella Peer-to-Peer File Sharing Protocol[C]//Proceedings of the 19th International Conference on Networks. Vancouver, Canada: IEEE Press, 2001: 263-268.

共引文献157

同被引文献20

  • 1冯谷,高鹏.新型SQL注入技术研究与分析[J].计算机科学,2012,39(S3):415-417. 被引量:10
  • 2BREZO F, PUERTA J, SANTOS I, et al. C&C techniques in Bot- net development [ C]// International Joint Conference CISIS'12- ICEUTE' 12-SOCO'12 Special Sessions. Berlin: Springer, 2013:97 - 108.
  • 3SCANLON M, KECHADI T. Peer-to-peer botnet investigation: A review[M]. Berlin: Springer, 2012:231-238.
  • 4LIU J, XIAO Y, GHABOOSI K, et al. Botnet: Classification, at- tacks, detection, tracing, and preventive measures[ C]// Proceed- ings of the 2009 Fourth International Conference on Innovative Com- puting, Information and Control. Washington, DC: IEEE Computer Society, 2009: 9.
  • 5WANG P, SPARKS S, ZOU C C. An advanced hybrid peer-to-peer Botnet[ C ]// Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets. Berkeley: USENIX Association,2007:2.
  • 6WANG P, TYRA J, CHAN E, et al. Attacking the kad network [ C ]//Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks. New York : ACM, 2008 : 23.
  • 7DOUCEUR J. The Sybil attack [C]// Proceedings of the 1st International Workshop on Peer-to-Peer Systems. London: Springer- Verlag ,2002 : 251 - 260.
  • 8WANG P, WU L, ASLAM B, et al. A systematic study on peer-to-peer Botnets [ C ]// Proceedings of International Conference on Computer Communications and Networks. Washington, DC : IEEE Computer Society, 2009 : 1 -8.
  • 9STARNBERGER G, KRUEGEL C, KIRDA E. Overbot - a botnet protocol based on Kademlia [ C ]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York : ACM, 2008 : 13.
  • 10DAGON D, ZOU C, LEE W. Modeling botnet propagation using time zones[ C]// Proceedings of the 13rd Annual Network and Distributed System Security Symposium. Piscataway : IEEE, 2006 : 235 - 249.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部