共查询到20条相似文献,搜索用时 0 毫秒
1.
僵尸网络中的关键问题 总被引:3,自引:0,他引:3
僵尸网络是一种复杂、灵活、高效的网络攻击平台,在互联网中分布非常广泛.僵尸网络使攻击者具备了实施大规模恶意活动的能力,如发送垃圾邮件、发动分布式拒绝服务攻击等.由于其危害日益严重,僵尸网络已经成为网络安全研究的热点之一.但是近年来,僵尸网络新的发展、变化,突破了以往对僵尸网络的认知.文中分析僵尸网络的现有研究,对僵尸网络进行了重新定义,并从网络结构、网络独立性和信息传递方式等角度对僵尸网络的类型进行了划分;然后,梳理了僵尸网络检测技术、测量技术和反制技术等方面的工作;最后,给出了僵尸网络的演化趋势和未来研究方向. 相似文献
2.
基于蚁群算法的对等网模拟器的设计与实现 总被引:2,自引:0,他引:2
对等网(Peer to Peer,简称P2P)技术是在Interact上的一种分散式控制的网络技术,它将逐渐取代客户/服务器结构,使Internet的应用从中央服务器模式向网络设备边缘化方向发展。本文针对目前对等网应用范围的多样性和系统设计时性能评估难的特点,结合蚁群算法提出了一种辅助分析对等网应用方案性能的模拟器,同时深入地讨论了模拟器的设计及实现过程。 相似文献
3.
以僵尸网络为载体的各种网络攻击活动是目前互联网所面临的最为严重的安全威胁之一.虽然近年来这方面的研究取得了显著的进展,但是由于僵尸网络不断演化、越来越复杂和隐蔽以及网络和系统体系结构的限制给检测和防御带来的困难,如何有效应对僵尸网络的威胁仍是一项持续而具有挑战性的课题.首先从僵尸网络的传播、攻击以及命令与控制这3个方面介绍了近年来僵尸网络工作机制的发展,然后从监测、工作机制分析、特征分析、检测和主动遏制这5个环节对僵尸网络防御方面的研究进行总结和分析,并对目前的防御方法的局限、僵尸网络的发展趋势和进一步的研究方向进行了讨论. 相似文献
4.
Rendering is a crucial process in the production of computer generated animation movies. It executes a computer program to transform 3D models into series of still images, which will eventually be sequenced into a movie. Due to the size and complexity of 3D models, rendering process becomes a tedious, time-consuming and unproductive task on a single machine. Accordingly, animation rendering is commonly carried out in a distributed computing environment where numerous computers execute in parallel to speedup the rendering process. In accordance with distribution of computing, data dissemination to all computers also needs certain mechanisms which allow large 3D models to be efficiently moved to those distributed computers to ensure the reduction of time and cost in animation production. This paper presents and evaluates BitTorrent file system (BTFS) for improving the communication performance of distributed animation rendering. The BTFS provides an efficient, secure and transparent distributed file system which decouples the applications from complicated communication mechanism. By having data disseminated in a peer-to-peer manner and using local cache, rendering time can be reduced. Its performance comparison with a production-grade 3D animation favorably shows that the BTFS outperforms traditional distributed file systems by more than 3 times in our test configuration. 相似文献
5.
6.
浏览器cache能够有效降低网络带宽的需求,减少客户的等待时间。然而目前的浏览器cache之间并不能够共享对象,导致数据的重复利用率不高,网站的负载无法得到均衡。P2P(peer-to—peer)技术的基本思想就是希望能够平等处理所有节点,借助节点间的互助实现文件交换、分市计算等功能。在Chord协议及其算法的基础上,提出了一种合作型浏览器cache模型,实现对象的共享,并且通过日志驱动的仿真实验对该模型的节点存储、外部带宽占用和cache命中率以及延迟等指标进行了性能评估。结果和分析显示该模型在这些指标上取得了一定的提高,比如命中率和响应时间,而没有占用更多节点的资源。 相似文献
7.
基于Peer-list的混合型P2P僵尸网络代表了一类高级僵尸网络形态,这种僵尸网络的优势是可抵抗传统P2P僵尸网络易受的索引污染(Index Poisoning)攻击和女巫(Sybil)攻击,然而却引入了新的问题——易受Peer-list污染攻击。本文提出一种新颖的混合P2P僵尸网络设计模型,在僵尸网络构建和Peer-list更新的整个生命周期中引入信誉机制,使得Peer-list污染攻击难以发挥作用。实验证明该模型具备很强的抗污染能力和很高的健壮性,因此对网络安全防御造成了新的威胁。最后,我们提出了若干可行的防御方法。本文旨在增加防御者对高级僵尸网络的理解,以促进更有效的网络防御。 相似文献
8.
Zhen Li 《Information Security Journal: A Global Perspective》2014,23(4-6):159-171
ABSTRACTEconomics play an increasingly important role in fighting cyber crimes. While the arms race against botnet problems has achieved limited success, we propose an approach attacking botnets through affecting a botnet market structure. The characteristics of the present underground botnet market suggest that it functions effectively as perfectly competitive. Competitive markets are usually efficient. We argue that less competition in the botnet market is actually preferred. Our economic analysis suggests that monopoly reduces the overall market output of botnets. Using a model of market structure evolution, we identify key forces that affect the botnet market structure and propose possible ways such as defaming botnet entrants to reduce competition, which ultimately reduce the size and output of the botnet market. The analysis provides useful insight to botnet defenders as a guidance on an efficient allocation of defending resources by attacking more on new entrants to the botnet market relative to the existing botmasters. 相似文献
9.
非结构化P2P系统复本研究 总被引:5,自引:1,他引:5
针对非结构化P2P系统中的复本放置问题,提出了一种新的放置策略,该策略充分考虑非结构化P2P系统中节点的异质性,将受欢迎程度高的文件的复本放置在高性能的节点上,增加了受欢迎程度高的文件的可用性,同时由于系统中受欢迎程度高的文件的复本增加,减少了系统查询文件时所要搜索的节点数.仿真实验和分析表明,该复本放置策略能有效地提高文件的可用性,降低查询带来的网络流量. 相似文献
10.
OntoZilla: An ontology-based, semi-structured, and evolutionary peer-to-peer network for information systems and services 总被引:2,自引:1,他引:2
We present a system called “OntoZilla”, which combines ontologies and peer-to-peer (P2P) technology, with a vision of improving the information search process and facilitating greater integration as well as interoperability. In OntoZilla, peers supporting the same concept are grouped into the same cluster, and the relationships between clusters are modeled according to the concepts they specialize in. Therefore, a query belonging to a specific concept can be routed to the suitable group of peers in a systematic way, thus supporting efficient concept search. Moreover, since peer relationships are based on peers’ expertises which may change over time, our semi-structured system can flexibly cope with the changing environment as peers evolve. 相似文献
11.
传统的协作存在固有的缺陷。系统可靠性和扩展性差,不能充分利用客户端资源。P2P系统不但架构灵活,有高可扩展性,而且能充分利用计算和网络资源。分析了协作系统采用P2P架构所具有的优点,并提出一个基于微软P2PSDK的协作系统设计与实现方案。 相似文献
12.
在诸如文件共享等无中心的Peer to peer环境中,资源共享是用户自愿的行为.在这类系统中,由于用户不为自身的行为担负责任,因而节点间的信任关系往往很难通过传统的信任机制建立.现有模型在计算信任度时往往采用迭代方法,计算复杂,同时缺乏对时间因素的考虑.针对上述问题,提出了一种新的基于P2P的信任模型,它结合自己的交易历史、熟悉节点的推荐及陌生节点的推荐三部分来综合评价目标节点的信任度,同时考虑了时间因素对信任度的影响.分析及实验结果表明,该模型能准确地评估节点的信任度,提高系统的可用性. 相似文献
13.
僵尸网络检测技术研究进展 总被引:3,自引:0,他引:3
僵尸网络的肆虐给互联网带来了极大的威胁,使得僵尸网络检测技术成为近年来网络安全领域的热点研究课题.首先,在对已提出的检测技术进行归纳分析的基础上,概括了僵尸网络检测的基本过程,并对这些检测技术进行了分类;然后,按照僵尸网络生命周期不同阶段的分类方法,着重分析了每种检测技术的研究思路、操作流程和优缺点;接下来,总结了现有检测技术所使用的主要方法及相应算法,提出了评价指标,并对选取的代表性技术进行了比较;最后,探讨了僵尸网络检测的关键问题及今后的研究方向. 相似文献
14.
针对当前传统安全技术不能对P2P环境下的僵尸网络进行有效防御的问题,在P2P僵尸网络病毒的一般性行为特征的基础上,设计了一种基于域的P2P僵尸网络的防御体系,并提出了利用僵局网络通信数据流特征向量的相似度分析解决因僵尸结点过少,无法检测出IP聚焦而无法识别僵尸结点的问题.该防御体系采用层次化结构,按P2P网络的逻辑地址段划分域,在城内采用将主机恶意行为与P2P流识别相结合的方法判别僵尸网络的通信数据流并提取特征向量.实验结果表明,该体系具有较高的性能和通用性. 相似文献
15.
近年来僵尸网络成为互联网最严重威胁之一,研究僵尸网络检测技术具有现实意义。讨论了P2P僵尸网络的组成和工作机制,分析P2P僵尸网络的检测方法,提出一P2P僵尸网络检测系统设计方案。 相似文献
16.
近年的互联网络攻击日益增多,其攻击方式种类,技术革新速度远远超过了网络防御技术发展,各种类型的僵尸网络攻击数据流给网络管理人员带来了更大的挑战,提出了更高的要求。本文以一次针对某高校的持续僵尸网络攻击为案例,记录了其攻击过程,概述了其攻击原理,陈述了高校采取的针对型防御措施。最后总结了网络攻击的趋势,针对性的从用户和运营商角度提出一些改进应对思路,以期提供更稳定优质的网络服务。 相似文献
17.
ZHANG Hui 《数字社区&智能家居》2008,(27)
近年来,随着网络的高速发展,僵尸网络犯罪已成为一个备受人们关注的问题。本文分析僵尸网络犯罪的现状、主要的攻击方式,并提出打击僵尸网络犯罪的防控对策。 相似文献
18.
Attia Qammar Ahmad Karim Yasser Alharbi Mohammad Alsaffar Abdullah Alharbi 《计算机系统科学与工程》2022,43(3):915-930
Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination of static and dynamic methods that relies on machine learning to detect android botnet applications is proposed. Furthermore, results are evaluated using machine learning classifiers. The Random Forest (RF) classifier outperform as compared to other ML techniques i.e., Naïve Bayes (NB), Support Vector Machine (SVM), and Simple Logistic (SL). Our proposed framework achieved 97.48% accuracy in the detection of botnet applications. Finally, some future research directions are highlighted regarding botnet attacks detection for the entire community. 相似文献
19.
Gal Badishi Germano Caronni Idit Keidar Raphael Rom Glenn Scott 《Journal of Parallel and Distributed Computing》2009
Celeste is a robust peer-to-peer object store built on top of a distributed hash table (DHT). Celeste is a working system, developed by Sun Microsystems Laboratories. During the development of Celeste, we faced the challenge of complete object deletion, and moreover, of deleting “files” composed of several different objects. This important problem is not solved by merely deleting meta-data, as there are scenarios in which all file contents must be deleted, e.g., due to a court order. Complete file deletion in a realistic peer-to-peer storage system has not been previously dealt with due to the intricacy of the problem — the system may experience high churn rates, nodes may crash or have intermittent connectivity, and the overlay network may become partitioned at times. We present an algorithm that eventually deletes all file contents, data and meta-data, in the aforementioned complex scenarios. The algorithm is fully functional and has been successfully integrated into Celeste. 相似文献
20.
CollectCast: A peer-to-peer service for media streaming 总被引:8,自引:0,他引:8
Mohamed Hefeeda Ahsan Habib Dongyan Xu Bharat Bhargava Boyan Botev 《Multimedia Systems》2005,11(1):68-81
We present CollectCast, a peer-to-peer (P2P) service for media streaming where a receiver peer is served by multiple sender
peers. CollectCast operates at the application level but infers underlying network properties to correlate end-to-end connections
between peers. The salient features of CollectCast include: (1) a novel multisender selection method that exploits the performance
correlation and dependency among connections between different candidate senders and the receiver, (2) a customization of network tomography techniques and demonstration of improved practicality and efficiency, and (3) an aggregation-based P2P streaming mechanism
that sustains receiver-side quality in the presence of sender/network dynamics and degradation. We have performed both real-world
(on PlanetLab) and simulation evaluation of CollectCast. Our simulation results show that for a receiver, CollectCast makes
better selection of multiple senders than other methods that do not infer underlying network properties. Our PlanetLab experiments
are performed using a P2P media streaming application (called PROMISE) which we developed on top of CollectCast. Both packet-level
and frame-level performance of MPEG-4 video streaming demonstrates the practicality and effectiveness of CollectCast. 相似文献