[1] FENG L, HAN Q, WANG H, et al. Effective immune measure on P2P botnet [J]. Journal of Computer Applications, 2012, 32(9): 2617-2619.(冯丽萍,韩琦,王鸿斌,等.P2P僵尸网络的有效免疫措施[J].计算机应用,2012,32(9):2617-2619.) [2] JIANG J, ZHUGE J, DUAN H, et al. Research on botnet mechanisms and defenses [J]. Journal of Software, 2012, 23(1): 82-96.(江健,诸葛建伟,段海新,等.僵尸网络机理与防御技术[J]. 软件学报,2012,23(1): 82-96.) [3] HOLZ T, STEINER M, DAHL F, et al. Measurements and mitigation of peer-to-peer botnets: a case study on storm worm [C]// Proceeding of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Berkeley: USENIX Association, 2008: 1-9. [4] YAN G, HA D T, EIDENBENZ S. AntBot: anti-pollution peer-to-peer botnets [J]. Computer Networks, 2011, 55(8): 1941-1956. [5] KOLESNICHENKO A, REMKE A, de BOER P T, et al. Compari-son of the mean-field approach and simulation in a peer-to-peer botnet case study [C]// EPEW 2011: Proceedings of the 8th European Performance Engineering Workshop, LNCS 6977. Berlin: Springer, 2011: 133-147. [6] van RUITENBEEK E, SANDERS W H. Modeling peer-to-peer botnets [C]// QEST'08: Proceeding of the 5th International Conference on the Quantitative Evaluation of Systems. Piscataway: IEEE, 2008: 307-316. [7] WANG P, SPARKS S, ZOU C. An advanced hybrid peer-to-peer botnet [J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(2): 113-127. [8] KHOSROSHAHY M, ALI M K, QIU D. The SIC botnet lifecycle model: a step beyond traditional epidemiological models [J]. Computer Networks, 2013, 57(2): 404-421. [9] ZHANG J, PERDISCI R, LEE W, et al. Building a scalable system for stealthy P2P-botnet detection [J]. IEEE Transactions on Information Forensics and Security, 2014, 9(1): 27-38. [10] KHATTAK S, RAMEY N R, KHAN K R, et al. A taxonomy of botnet behavior, detection, and defense [J]. IEEE Communications Surveys & Tutorials, 2014, 16(2): 898-924. [11] WANG P, ASLAM B, ZOU C. Peer-to-peer botnet: the next generation of botnet attacks [M]. Berlin: Springer, 2010: 335-350. [12] FENG L, WANG H, HAN Q, et al. Modeling peer-peer botnet on scale-free network [J]. Abstract and Applied Analysis, 2014, 2014: 1-8. [13] FENG L, LIAO X, HAN Q, et al. Modeling and analysis of peer-peer botnet [J]. Abstract and Applied Analysis, 2012: 1-18. [14] ANDERSON R M, MAY R M. Infectious diseases of humans: dynamics and control [M]. Oxford: Oxford University Press, 1991: 25-56. |