[1] 夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(7):952-959. Xia Chun-he,Shi Yun-ping,Li Xiao-jian.Research on epidemic modesl of P2P worms in structured peer-to-peer networks[J].Chinese Journal of Computers,2006,29(7):952-959.(in Chinese) [2] Chen G,Gray R S.Simulating non-scanning worms on peer-to-peer networks .Proc of the 1st Int Conf on Scalable Information Systems .Hong Kong:ACM,2006. [3] Zhou L,Zhang L,McSherry F,et al.A first look at peer-to-peer worms:Threats and defenses .Proc of the 4th Int Workshop on Peer-to-Peer Systems .New York:Springer,2005.24-35. [4] Nassima K,Yannick C,Nazim A.The emerging threat of peer-to-peer worms .Proc of IEEE / IST Workshop on Monitoring,Attack Detection and Mitigation .Tuebingen,Germany:IEEE,2006.18-20. [5] Frauenthal J C.Mathematical Modeling in Epidemiology[M].New York:Springer,1980. [6] Driessche P,Watmough J.Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission[J].Mathematical Biosciences,2002,180:29-48. [7] Arnio J,Davis J,Hartley D,et al.A multi-species epidemic model with spatial dynamics[J].Mathematical Medicine and Biology,2005. [8] Diekmann O,Heesterbeek J A P.Mathematical Epidemiology of Infectious Diseases:Model Builind,Analysis and Interpretation[M].Wiley,1999. [9] Thommes R W,Coates M J.Modeling Virus Propagation in Peer-to-Peer Networks .Montreal,Canada:Department of Electrical and Computer Engineering,McGill University,2005. [10] Murray W H.The application of epidemiology to computer viruses[J].Computers and Security,1988,7:130-150. [11] Kephart J O,White S R.Directed-graph epidemiological models of computer viruses .Proc of IEEE Symp.Security and Privacy .Oakland :IEEE,1991.343-359. [12] Ripeanu M.Peer-to-peer architecture case study:Gnutella network .Proc of the First International Conference on Peer-to-Peer Computing .Linkoping,Sweden:IEEE,2001. [13] Sen S,Wang J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232. [14] Stutzbach D,Rejaie R,Sen S.Characterizing unstructured overlay topologies in modern P2P file-sharing systems . Proc of the Fifth ACM Internet Measurement Conference .Berkeley:ACM,2005.49-62. [15] Pastor-Satorras R,Vespignani A.Epidemic spreading in scale-free networks[J].Physical Review Letters,2001,86(14):3200-3203. [16] Staniford S,Paxson V,Weaver N.How to Own the Internet in Your Spare Time .Proc of the 11th USENIX Security Symposium .San Francisco:ACM,2002.149-167. [17] Dumitriu D,Knightly E,Kuzmanovic A,et al.Denial-of-service resilience in peer-to-peer file-sharing systems .Proc of ACM Sigmetrics .Banff,Canada:ACM,2005. [18] 王方伟,张运凯,马剑峰.无结构P2P网络中被动型蠕虫传播建模和防治[J].天津大学学报,2008,14(1):66-72. Wang Fang-wei,Zhang Yun-kai,Ma Jian-feng.Modeling and defending passive worms over unstructured peer-to-peer networks[J].Transaction of Tianjin University,2008,14(1):66-72.(in Chinese) [19] 应凌云,冯登国,苏璞睿.基于P2P 的僵尸网络及其防御[J].电子学报,2009,37(1):31-37. Ying Ling-yun,Feng Deng-guo,Su Pu-rui.P2P-based super botnet:Threat s and defenses[J].Acta Electronica Sinica,2009,37(1):31-37.(in Chinese) |