期刊文献+

A novel mathematical model on Peer-to-Peer botnet

P2P僵尸网络的新型数学模型(英文)
在线阅读 下载PDF
导出
摘要 Peer-to-Peer (P2P) botnet has emerged as one of the most serious threats to lnternet security. To effectively elimi- nate P2P botnet, a delayed SEIR model is proposed,which can portray the formation process of P2P botnet. Then, the local stability at equilibria is carefully analyzed by considering the eigenvalues' distributed ranges of characteristic equations. Both mathematical analysis and numerical simulations show that the dynamical features of the proposed model rely on the basic re- production number and time delay r. The results can help us to better understand the propagation behaviors of P2P botnet and design effective counter-botnet methods.
出处 《Journal of Measurement Science and Instrumentation》 CAS 2014年第4期62-67,共6页 测试科学与仪器(英文版)
基金 National Natural Science Foundation of China(No.61379125) Program for Basic Research of Shanxi Province(No.2012011015-3) Higher School of Science and Technology Innovation Project of Shanxi Province(No.2013148)
关键词 Peer-to-Peer (P2P) botnet STABILITY SEIR model time delay P2P僵尸网络 稳定性 SEIR模型 时滞
  • 相关文献

参考文献24

  • 1SONG Li-peng, JIN Zhen, SUN Gui-quan. Modeling and analyzing of botnet interactions. Physica A, 2011, 390 (2) : 347-358.
  • 2ZHANG Wen-fang, JIN C. The research on approaches for botnet detection. Energy Procedia, 2011, 13: 9726- 9732.
  • 3Symantec lnternet security threat report. [2014-06-12]. http://www, symantec, com/threatreport/topic, jsp? id - threatreport.
  • 4Holz T, Steiner M, Dahl F, et al. Measurements and mit- igation of peer-to-peer-based botnets: a case study on storm worm. In: Proceedings of the 1st USENIX Work- shop on Large-Scale Exploits and Emergent Threats, San Francisco, CA, 2008: 1-9.
  • 5Ruitenbeek E V, Sanders W H. Modeling peer-to-peer botnets. In: Proceedings of the 5th International Confer- ence on Quantitative Evaluation of Systems (QEST'08), St. Malo, France, 2008: 307-316.
  • 6YAN Guan-hua, Ha D T, Eidenbenz S. AntBot: Anti- polllution peer-to-peer botnets. Computer Network: The International Journal of Computer and Telecommunica- tions Networking, 2011, 55 (8): 1941-1956.
  • 7Kolesnichenko A, Remke A, Boer P T, et al. Compari- son of the mean-field approach and simulation in a peer- to-peer botnet case study. Computer Performance Engi- neering, 2011, 6977: 133-147.
  • 8Schneider D. The state of network security. Network Se- curity, 2012: 14-20.
  • 9JIANG Hong-ling, SHAO Xiu-li. Detecting P2P botnets by discovering flow dependency in C & C traffic. Peer-to- Peer Network and Application, 2012 : 1-12.
  • 10HAN Qin-ting, YU Wen-qiu, ZHANG Yao-yao, et al. Model and evaluating of typical advanced Peer-to-Peer botnet. Performance Evaluation, 2014, 72: 1-15.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部