Paper Title:
Research of Key Nodes of Botnet Based on P2P
  Abstract

The paper applies the segmentation of peer-to- peer network to the defense process of P2P-based botnet, in order to cause the greatest damage on the P2P network. A lot of papers have been researching how to find the key nodes in P2P networks. To solve this problem, this paper proposes distributed detection algorithm NEI and centralized detection algorithm COR for detecting cut vertex, NEI algorithm not only apply to detect cut vertex of directed graph but also to the undirected graph. COR algorithm can reduce the additional communication. Then, this paper carries out simulation on P2P botnet, the simulation results show that the maximum damage on the botnet can be achieved by destructing key nodes.

  Info
Periodical
Chapter
Chapter 6: Power and Control Electronics
Edited by
Xingui He, Ertian Hua, Yun Lin and Xiaozhu Liu
Pages
386-390
DOI
10.4028/www.scientific.net/AMM.88-89.386
Citation
J. Gao, K. F. Zheng, Y. X. Yang, X. X. Niu, "Research of Key Nodes of Botnet Based on P2P", Applied Mechanics and Materials, Vols. 88-89, pp. 386-390, 2011
Online since
August 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yan Ping Du, Fang Fang Chen, Zhen Hua Zhang
Abstract:The development of urban rail transit plays the more and more important role in the public transit. It’s significant to analyze the urban...
770
Authors: Ji Ming Yu, Xiao Yong Yan, Nan Xu, Yu Wang Yang
Chapter 10: Chemistry Science and Applied Chemistry
Abstract:Vehicular Ad Hoc Networks (VANET) is a peculiar type of mobile Ad Hoc networks for ITS,compared with MANET, it has following distinguishing...
2511
Authors: Ke Qin, Zhi Yuan Li
Chapter 6: Energy & Electronic
Abstract:Neighborhood based broadcasting methods for Mobile Ad Hoc Networks (MANETs) is a kind of simple and efficient broadcasting methods. Many...
678
Authors: Xian Fu Meng, Chun Li
Chapter 11: Modeling, Analysis and Simulation of Manufacturing Processes
Abstract:In view of existing situation that large collections of music data are shared by numerous users in Peer-to-Peer network, people raise higher...
2250
Authors: Gang Yang, Ming Fei Liang, Tian Tian Xu
Chapter 5: Sensor Technology
Abstract:In large scale of WSNs (wireless sensor networks), a centralized algorithm is not suitable for WSNs. Distributed algorithm has the obvious...
866