BitTorrent网络中的P2P蠕虫传播仿真分析

吴春江, 周世杰, 肖春静, 吴跃

吴春江, 周世杰, 肖春静, 吴跃. BitTorrent网络中的P2P蠕虫传播仿真分析[J]. 电子科技大学学报, 2007, 36(6): 1206-1210.
引用本文: 吴春江, 周世杰, 肖春静, 吴跃. BitTorrent网络中的P2P蠕虫传播仿真分析[J]. 电子科技大学学报, 2007, 36(6): 1206-1210.
WU Chun-jiang, ZHOU Shi-jie, XIAO Chun-jing, WU Yue. Simulation of Epidemic of P2P Worms in BitTorrent Networks[J]. Journal of University of Electronic Science and Technology of China, 2007, 36(6): 1206-1210.
Citation: WU Chun-jiang, ZHOU Shi-jie, XIAO Chun-jing, WU Yue. Simulation of Epidemic of P2P Worms in BitTorrent Networks[J]. Journal of University of Electronic Science and Technology of China, 2007, 36(6): 1206-1210.

BitTorrent网络中的P2P蠕虫传播仿真分析

基金项目: 

国家自然科学基金(60473090);国家242信息安全专题计划(2006B19)

详细信息
    作者简介:

    吴春江(1982-),男,硕士生,主要从事P2P仿真方面的研究.

  • 中图分类号: TP393.08

Simulation of Epidemic of P2P Worms in BitTorrent Networks

  • 摘要: 对等网络蠕虫(简称P2P蠕虫)是目前P2P网络面临的重大安全威胁之一。由于具有极强的隐蔽性和破坏性,P2P蠕虫能够控制访问感染节点的路由表,获取该节点的邻居信息,构建攻击列表,以实现精确的目标攻击。该文通过仿真的方法,分析了P2P蠕虫在BitTorrent网络中的传播特性,验证了相关参数对P2P蠕虫传播的影响。实验结果表明,P2P蠕虫的传播与BT网络的状态、蠕虫的攻击能力、初始感染蠕虫节点比例以及单位时间内免疫节点比例有着非常紧密的联系。
    Abstract: Peer-to-Peer (P2P) worms have become one of some major threats to peer-to-peer network security nowadays. With its strong hidden feature and destructivity, the P2P worms can attack the goal nodes accurately by manipulating the router table of infected nodes, getting information of their neighbors and constructing a target list. Through some simulation experiments, this paper analyzes the characteristic of P2P worms spreading through BitTorrent network, and tests the effect of some parameters. The performances of simulation experiments show that the spread of P2P worms is related to the state of BT network, the attack capacity of worms, the rate of initial infected node, and immune node per unit time.
计量
  • 文章访问数:  5457
  • HTML全文浏览量:  151
  • PDF下载量:  66
  • 被引次数: 0
出版历程
  • 收稿日期:  2005-09-06
  • 刊出日期:  2007-12-14

目录

    /

    返回文章
    返回