[1]江健,葛建伟,段海新,等.僵尸网络机理与防御技术[J].软件学报,2012,23(1):82-96.[2]GRIZZARD J B,SHARMA V,NUNNERY C,et al.Peer-to-peer botnets:overview and case study [C]// Proceedings of the 1st Conference on First Workshop on Hot Topics in Understanding.Berkeley,CA,USA:USENIX Association,2007:1-8.[3]HOLZ T,STEINER M,DAHL F,et al.Measurements and mitigation of peer-to-peer botnets:a case study on storm worm [C]// Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats.Berkeley,CA,USA:USENIX Association,2008:1-9.[4]WANG P,ASLAM B,ZOU C C.Peer-to-peer botnets:The next generation of botnet attacks [M].Berlin:Springer-Verlag,2010:335-350.[5]WANG P,WU L,ASLAM B,et al.A systematic study on peer-to-peer botnets [C]// ICCCN'09:Proceedings of the 18th the International Conference on Computer Communication and Networks.Piscataway,NJ:IEEE Press,2009:1-8.[6]王海龙,龚正虎,侯婕.僵尸网络检测技术研究进展[J].计算机研究与发展,2010,47(12):2037-2048.[7]SONG L P,JIN Z,SUN G Q.Modeling and analyzing of botnet interactions [J].Physica A,2011,390(2):347-358.[8]方滨兴,催翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331.[9]FRAUENTHAL J C.Mathematical modeling in epidemiology [M].Berlin:Springer-Verlag,1980.[10]宋礼鹏,韩燮,刘冬明,等.机器更新对蠕虫传播影响[J].计算机应用,2011,31(5):1262-1264.[11]冯丽萍,王鸿斌,冯素琴.改进的SIR计算机病毒传播模型[J].计算机应用,2011,31(7):1891-1893.[12]冯朝胜,冯林,卿昱,等.P2P逻辑网络拓扑结构仿真分析[J].计算机科学,2011,38(12):121-124.[13]张志涌,杨祖樱.Matlab教程[M].北京:航空航天大学出版社,2010.[14]YUAN H,CHEN G Q.Network virus-epidemic model with the point-to-group information propagation [J].Applied Mathematics and Computation,2008,206(1):357-367.[15]DEBANY W H.Modeling the spread of Internet worms via persistently unpatched hosts [J].IEEE Network,2008,22(2):26-32. |