[1]诸葛建伟,韩心慧,周勇林,等.僵尸网络研究与进展[J].软件学报,2008,19(3):702-715.[2]LIU J, XIAO Y, GHABOOSI K, et al. Botnet: classification, attacks, detection, tracing, and preventive measures[C]// ICICIC'09: Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control. New York:ACM, 2009:1184-1187.[3]李鹤帅,朱俊虎,周天阳,等.P2P技术在僵尸网络领域的应用[J].计算机工程,2012,14(1):1-4.[4]WANG P, WU L, ASLAM B, et al. A systematic study on peer-to-peer botnets[C]// ICCCN'09: Proceedings of International Conference on Computer Communications and Networks. Washington, DC: IEEE Computer Society, 2009:1-8.[5]DASWANI N, STOPPELMAN M. The anatomy of clickbot[C]// Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets. Berkeley: USENIX Association, 2007.[6]LI J, EHRENKRANZ T, KUENNING G, et al.Simulation and analysis on the resiliency and efficiency of malnets[C]// MMSM 2005: Proceedings of the 19 th Workshop on Principles of Advanced and Distributed Simulation.Washington, DC: IEEE Computer Society, 2005:262-269.[7]MAYMOUNKOV P, MAZIERES D. Kademlia: A peer-to-peer information system based on the xor metric[C]// IPTPS: International Workshop on Peer-to-Peer Systems. Berlin:Springer, 2002:53-65.[8]STARNBERGER G, KRUEGEL C, KIRDA E. Overbot - a botnet protocol based on Kademlia[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York:ACM, 2008:1-9.[9]WANG P, TYRA J, CHAN E, et al. Attacking the Kad network[C]// Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York:ACM, 2008:877-907.[10]WANG P, SPARKS S, ZOU C C. An advanced hybrid peer-to-peer botnet[C]// Proceedings 2007 USENIX First Workshop on Hot Topics in Understanding Botnets. Berkeley: USENIX Association, 2007:2.[11]ZHU Z S, LU G H, CHEN Y, et al.Botnet research survey[C]// COMPSAC'08: 2008 32nd Annual IEEE International Computer Software and Applications Conference.Washington, DC: IEEE Computer Society, 2008:967-972.[12]ZHUGE J, HAN X, YE Z, et al.Discover and track botnets[C]// Proceeedings of the Chinese Symposium on Network and Information Security.New York:ACM, 2005:183-189.[13]DOUCEUR J. The sybil attack [C]// Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Berlin:Springer,2002: 251-260.[14]STONE B, COVA M, CAVALLARO L, et al.Your botnet is my botnet: analysis of a botnet takeover[EB/OL].[2012-08-12]. http://www.csd.uoc.gr/~hy558/papers/torpig.pdf.[15]CERTICOM. Press release: Certicom announces elliptic curvecryptosystem (ECC) challenge winner[R/OL]. [2012-10-01].http://www.certicom.com/2002-press-releases/38-2002-press-releases/340. |