首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于Cloud-P2P计算模型的恶意代码联合防御网络
引用本文:徐小龙,吴家兴,杨 庚b.一种基于Cloud-P2P计算模型的恶意代码联合防御网络[J].计算机应用研究,2012,29(6):2214-2217.
作者姓名:徐小龙  吴家兴  杨 庚b
作者单位:1. 南京邮电大学计算机学院;中国科学院软件研究所信息安全国家重点实验室,北京 100190
2. 南京邮电大学计算机学院,南京,210003
3. 南京邮电大学计算机学院;计算机技术研究所 南京 210003
基金项目:国家自然科学基金资助项目(60873231);国家教育部高等学校博士学科点专项科研基金资助课题(20093223120001);中国博士后科学基金资助项目(2011M500095);江苏省自然科学基金资助项目(BK2011754,BK2009426);江苏省科技支撑计划资助项目(BE2009158);江苏省高校自然科学研究项目(09KJB520010);信息安全国家重点实验室开放课题(03-01-1);江苏高校优势学科建设工程资助项目(yx002001);江苏省博士后科研资助计划项目(1102103C)
摘    要:针对目前的反病毒系统在应对恶意代码时通常具有的滞后性,提出并构建了一种新颖的基于Cloud-P2P计算模型的恶意代码联合防御网络。Cloud-P2P计算模型将云计算与对等计算进行有机融合。恶意代码联合防御网络系统中的集群服务器与用户终端群体联合组成了一个高安全防御网,协同防御恶意代码,并快速产生群体免疫力。为了提高系统的性能表现,提出适用于Cloud-P2P融合计算环境的两种基于分布式哈希表的层次式网络结构C-DHT和D-DHT,并通过引入移动agent技术实现了恶意代码联合防御网络中的疫苗agent和巡警agent。基于Cloud-P2P计算模型的恶意代码联合防御网络具有负载均衡、反应快捷、防御全面和兼容性良好等性能表现。

关 键 词:云计算  对等计算  恶意代码  反病毒  云安全

Malicious code united-defense network based on Cloud-P2P model
XU Xiao-long,WU Jia-xing,YANG Geng b.Malicious code united-defense network based on Cloud-P2P model[J].Application Research of Computers,2012,29(6):2214-2217.
Authors:XU Xiao-long  WU Jia-xing  YANG Geng b
Affiliation:1. a. College of Computer, b. Institute of Computer Technology, Nanjing University of Posts & Telecommunications, Nanjing 210003, China; 2. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
Abstract:The current anti-virus systems are usually unable to respond to endless emerging malicious codes in time. To solve this problem, this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model. The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically. Ser-vers and user terminals in the malicious code united-defense network carry out their own duties, forming a high-security collaborative defense network against malicious codes and obtaining the whole group immunity quickly. It also proposed two kinds of hierarchical network topology, C-DHT and D-DHT, which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model. By the introduction of mobile agent technology, realized vaccine agent and patrol agent of the malicious code defense united-network. The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances, such as the network load balance, the rapid response, the comprehensive defense and the good compatibility.
Keywords:cloud computing  P2P computing  malicious code  anti-virus  cloud security
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号