Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Design》 2008-11
Add to Favorite Get Latest Update

Analysis of P2P Botnet of two-tier structure

FANG Yuan, WU Hao, YANG Li-ming (Institute of Information Engineering, PLA Information Engineering University, Zhengzhou 450002, China)  
A collection of bots connected to a network which is controlled by attackers is called a Botnet. P2P botnets are bots that use P2P technology to accomplish certain tasks. The two-tier structure P2P botnet is more hidden and flexible in controlling infected host, while the existing P2P botnets only have obvious tracking features. Its functions and performance are critically studied both from experi- ments and theoretical analysis. In addition, the corresponding defense and tracking schemes are given.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 FAN Yi-yan1,WU Guo-rui2(1.National Linux Technology Training and Development Center,Hunan University of Arts and Science,Changde 415000,China;2.School of Software and Microelectronics,Peking University,Beijing 100871,China);Botnet detection method based on email characteristic match[J];Computer Engineering and Design;2010-01
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Yan De - bin Ling Yong - yin;Bluetooth technology Security Architecture and Security Measures Analysis[J];Journal of Anhui Vocational College of Electrontcs & Information Technology;2004-Z1
2 XU Ji-bin~1,YE Zhen~1,CAI Min~2(1.School of Computer and Information,Hefei University of Technology,Hefei 230039,China;2.Department of Computer Science and Technology,Chaohu College,Chaohu 238000,China);A Key Management Scheme Based on HASH Function[J];Journal of Anhui Normal University(Natural Science);2006-04
3 LIU Xiao-chuan1,2,HOU Zheng-feng1 (1.School of Computer & Information,Hefei University of Technology,Hefei 230009,China;2.Anhui Vocational and Technical College,Hefei 230036,China);A Algorithm of the Subliminal Channel Safety Construction in the ElGamal Signature[J];Journal of Anhui Normal University(Natural Science);2007-06
4 SUN Jing, FU De-sheng School of computer and software, Nanjing university of information science and technology, Nanjing 210044;Research and analysis on the security of key generator[J];Information Security and Technology;2010-07
5 LI Ming(Department of Basic Science, Anhui Vocational and Technical College of Communications, Hefei 230051,China);On the establishment of practical and comprehensivenetwork security system[J];Journal of Anhui Technical College of Water Resources and Hydroelectric Power;2004-04
6 DAI Zi-bin,SUN Wan-zhong,ZHANG Yong-fu(PLA Information Engineering University,Zhengzhou 450004,China);Design of data encryption standard algorithm IP-core[J];Semiconductor Technology;2003-05
7 WANG Xiao-ni~1, YANG Gen-xing~2 (1.Division of Basic Courses,Beijing Institute of Machinery,Beijing 100085,China;2. Computing Centre, Beijing Institute of Machinery, Beijing 100085, China);Research of a dynamic password authentication system based on challenge/response authentication[J];Journal of Beijing Institute of Machinery;2003-04
8 WANG Xue-yan, CHEN Qian-bin (Mobile Communication Engineering Research Center,CUPT,Chongqing 400065,China);HASH Function Implementation of the Integrity of Data in WAP's WTLS[J];Journal of Chongqing University of Posts and Telecommunications;2002-02
9 TONG Guang-cai (Chongqing Jiaotong University, Chongqing 400074, P. R. China);Application of nesting encryption technologies in SET[J];Journal of Chongqing University of Posts and Telecommunications(Natural Science);2006-S1
10 JIN Peng,CHEN Guobin,LAI Min(School of Mathematics and Computer Science,Chongqing Normal University,Chongqing 400047,China);Multistage Image Encryption Based on TD-ERCS Chaotic System[J];Journal of Chengdu University(Natural Science Edition);2009-03
China Proceedings of conference Full-text Database 7 Hits
1 Zhang ZhaoXin, Fang BinXing, Zhang HongLi (Computer Science Of Harbin Institute Of Technology 150001);Security Analysis of Authentication Protocol for SIP Network Based on BAN Logic[A];[C];2006
2 HUANG Feng-yun, LU Xiao-hai, MO Yi-min (School of Electro Mechanical Engin. , Wuhan Univ. of Technology,Wuhan 430070,China; NSFOCUS(Beijing)Ltd. ,Beijing 100089, China);The Safety Leak and Solution of MIDAS Multi-tier Application Base on SOCKET Connection[A];[C];2005
3 SUN Ying-ming, TANG Dan, ZHANG Hai, CHEN Yu-xiao (Institute of Electronic and Engineering, CAEP, Mianyang, Sichuan 621000, China);A long-distance Internet safety data transmission solution based on ARM platform[A];[C];2006
4 XUE Weimin~1 LIN Benjing~2 1 Department of Computer Science & Technology,Tsinghua University,Beijing 100089 2 College of Information,Beijing University of Chemical Technology,Beijing 100029;Research of Wireless Network Security Based on Status Authentication[A];[C];2008
5 Jiang yanjie,Cai hongliu,li dong Information Department,The Academy of Armored Forces Engineering,Beijing 100072;Research and Realization of Key Management In Group Communication of WirelessNetwork[A];[C];2009
6 Li Haiyan Liu Liandong Yu Bin Institute of Electronic Technology, Information Engineering University, Zhengzhou, 450004, China;Research and Design of Key Agreement Scheme in Bluetooth[A];[C];2008
7 Zhao Zhuo LI Jingyun General Equipment Headquarters of PLA,Beijing,100720,China;Research and Design of E-Government Network Defense in Depth System[A];[C];2010
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ZHANG Jia-xi (Computer Science & Technology Dept of Suzhou College,Suzhou 234000,China);Research on Technology of Data Capture Based on Honeynet[J];Journal of Anqing Teachers College(Natural Science Edition);2005-04
2 LIN Ping,YU Xun-yi,LIU Fang,LEI Zhen-ming(Key Laboratory of Information Processing and Intelligent Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);A Network Traffic Classification Algorithm Based on Flow Statistical Characteristics[J];Journal of Beijing University of Posts and Telecommunications;2008-02
3 YU Ge1,YU Xiao-cong2,DONG Xiao-mei1,QIN Yu-hai2(1.School of Information Science & Engineering,Northeastern University,Shenyang 110004,China;2.Department of Computer Crime Detection,China Criminal Police College,Shenyang 110035,China);Rapid Detection Technique for P2P-Based Botnets[J];Journal of Northeastern University(Natural Science);2010-12
4 ZHANG Hui (Shandong Police College,Jinan 250014,China);Detection and Tracking Botnet[J];Computer Knowledge and Technology(Academic Exchange);2007-19
5 JIA Hua-ping (Department of Computer Science, Weinan Teachers College, Weinan 714000, China);Harm and the Botnet Coping Strategies[J];Computer Knowledge and Technology;2008-04
6 LU Yuan-rong(Guangdong Polytechnic College,Department of Computer,Guangzhou 510520,China);Using Weka as Data Mining Tool[J];Computer Knowledge and Technology;2008-06
7 LI Wen-jing(Guangzhou Computer Information Network Security Association,Guangzhou 510050,China);Network Intrusion Prevention System Analysis and Design[J];Computer Knowledge and Technology;2010-06
8 Lu Weizhou,Yu Shunzheng (Department of Electronics and Communication Engineering, Sun Yat-Sen University, Guangzhou 510275, China);Research on Detecting Botnets[J];Telecommunications Science;2007-12
9 ZHOU Yong-jia,ZHUANG Hong-lin,ZHANG Yu-seng(Institute of Command Automation,PLA Univ. of Sci. & Tech. Nanjing Jiangsu 210007,P.R. China);Analysis and Detection of a new P2P Botnet[J];Computer Security;2008-07
10 WANG Yu-lin SHEN Pu-bing (Xi’an Communication Institute, Xi’an, 710106,P.R.China);The principle and defending of DDoS attack[J];Computer Security;2008-07
【Secondary References】
Chinese Journal Full-text Database 2 Hits
1 CAI Liang (CNPC ChangQing Oilfield Digitization & Information Department,Xi'an 710018,China);The Design and Implementation of Lightweight Short Message Platform[J];Computer Knowledge and Technology;2011-17
2 FAN Yi-yan1,WU Guo-rui2,CHEN Jian-li1,TANG Bo1(1.National Linux Technology Training and Development Center,Hunan University of Arts and Science,Changde 415000,China;2.School of Software and Microelectronics,Peking University,Beijing 100871,China);Botnet detection model based on sequential analysis[J];Computer Engineering and Design;2011-09
China Proceedings of conference Full-text Database 1 Hits
1 Yiyan Fan School of Computer Science and Technology Hunan University of Arts and Science Changde 415000,China Xiaoyong Mei School of Computer Science and Technology Hunan University of Arts and Science Changde 415000,China;A Novel Botnet Detection Model Based on Sequential Analysis[A];[C];2010
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved