Research of Botnet Base on P2P Protocol

Article Preview

Abstract:

Because the model of Botnet posed a threat to the network security, so this paper studies the semi distributed P2P network. Base on this, we simulate the propagation model of semi distributed P2P network and obtained a more conform to the actual status's new communication model. Through the analysis of the result, we prove the effectiveness of the honeypot detection method and flow detection method. Pseudo honeypot" detection technique model is based on the first two detection, we also simulate it and get a desired result. The conclusion has important significance for the study of network security.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 860-863)

Pages:

2758-2761

Citation:

Online since:

December 2013

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Du Qin, Lv Guangli, Su Zhong, Lin fan, Zhang Shaohua. P2P botnet research and development (J). Computer science, 2011, 38 (10A): 66 - 71.

Google Scholar

[2] Zhuge Jianwei, Han Xinhui, Zhou Yonglin, Zou Wei. Research (J) botnets. Journal of software, 2008, 19 (3): 702 - 715.

Google Scholar

[3] Yang Ming, Ren Gang, Zhang Jianwei. Discussion on botnets (A). In the eleventh session of the National Youth Conference on communication set [C]. 2006: 629 633.

Google Scholar

[4] Canavan J.The evolution of malicious IRC bots.In:Proc.of the 2005 Virus Bulletin Conf. (VB 2005).(2005).

Google Scholar

[5] J Pu qiainni. P2P botnet detection (D) based on. Chengdu: University of Electronic Science and technology, (2011).

Google Scholar

[6] Ma Wenjuan. Working mechanism of Botnet analysis (J). Computer knowledge and technology, 2010, 6 (12): 2900 - 2908.

Google Scholar

[6] Ping Wang,Baber Aslam,Cliff C. Zou . A Systematic Study on Peer-to-Peer Botnets[J]. School of Electrical Engineering and Computer Science.

Google Scholar

[7] Li Zhonglong, Si Jin. Distributed denial of service attack analysis (J). Computer knowledge and technology, 2010, 6 (10): 2373 - 2374.

Google Scholar

[8] Ping Wang,Baber Aslam,Cliff C. Zou.Peer-to-Peer Botnets:The Next Generation of Botnet Attacks[J].School of Electrical Engineering and Computer Science,2010:1-25.

Google Scholar