- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
Discrete Dynamics in Nature and Society
Volume 2012 (2012), Article ID 865075, 18 pages
Modeling and Analysis of Peer-to-Peer Botnets
1State Key Laboratory of Power Transmission Equipment and System Security, College of Computer Science, Chongqing University, Chongqing 400044, China
2Department of Computer Science and Technology, Xinzhou Normal University, Shanxi 034000, Xinzhou, China
3Department of Computer Science and Technology, North University of China, Shanxi 030051, Taiyuan, China
Received 23 July 2012; Revised 28 September 2012; Accepted 28 September 2012
Academic Editor: Xiaofan Yang
Copyright © 2012 Liping Feng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
- L. P. Song, Z. Jin, and G. Q. Sun, “Modeling and analyzing of botnet interactions,” Physica A, vol. 390, no. 2, pp. 347–358, 2011.
- W. F. Zhang and C. Jin, “The research on approaches for botnet detection,” Energy Procedia, vol. 13, pp. 9726–9732, 2011.
- “Symantec Internet Security Threat Report,” 2011, http://www.symantec.com/threatreport/topic.jsp?id=threatreport.
- A. K. Seewald and W. N. Gansterer, “On the detection and identification of botnets,” Computers and Security, vol. 29, no. 1, pp. 45–58, 2010.
- C. Elliott, “Botnets: to what extent are they a threat to information security?” Information Security Technical Report, vol. 15, no. 3, pp. 79–103, 2010.
- W. Lu, G. Rammidi, and A. A. Ghorbani, “Clustering botnet communication traffic based on n-gram feature selection,” Computer Communications, vol. 34, no. 3, pp. 502–514, 2011.
- J. Rrushi, E. Mokhtari, and A. A. Ghorbani, “Estimating botnet virulence within mathematical models of botnet propagation dynamics,” Computer & Security, vol. 30, pp. 791–802, 2011.
- G. P. Schaffer, “Worms and viruses and botnets, Oh My!: rational responses to emerging internet threats,” IEEE Security and Privacy, vol. 4, no. 3, pp. 52–58, 2006.
- D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “Inside the slammer worm,” IEEE Security and Privacy, vol. 1, no. 4, pp. 33–39, 2003.
- G. Goth, “Fast-moving Zombies: botnets stay a step ahead of the fixes,” IEEE Internet Computing, vol. 11, no. 2, pp. 7–9, 2007.
- P. Barford and V. Yegneswaran, “An inside look at botnets,” Malware Detection, vol. 27, pp. 171–191, 2007.
- D. Dagon, C. C. Zou, and W. K. Lee, “Modeling botnet propagation using time and zones,” in Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS' 06), 2006.
- J. B. Grizzard, V. Sharma, C. Nunnery, and B. B. H. Kang, “Peer-to-peer botnet: overview and case study,” in Proceedings of the 1st conference on First Workshop on Hot Topics in understanding Botnets, pp. 1–8, 2007.
- T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, “Measurements and mitigation of peer-to- peer-based botnets: a case study on storm eorm,” in Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008.
- E. Van Ruitenbeek and W. H. Sanders, “Modeling peer-to-peer botnets,” in Proceedings of the 5th International Conference on the Quantitative Evaluation of Systems (QEST '08), pp. 307–316, September 2008.
- A. Kolesnichenko, A. Remke, P. T. Boer, and B. R. Haverkort, “Comparison of the mean-field approach and simulation in a peer-to-peer botnet case study,” Computer Performance Engineering, vol. 6977, pp. 133–147, 2011.
- G. Yan, D. T. Ha, and S. Eidenbenz, “AntBot: anti-pollution peer-to-peer botnets,” Computer Networks, vol. 55, no. 8, pp. 1941–1956, 2011.
- P. Wang, B. Aslam, and C. C. Zou, Peer-to-Peer Botnets: The Next Generation of Botnet Attacks, School of Electrical Engineering and Computer Science, University of Central Florida, Orlando, Fla, USA, 2010.
- J. G. Ren, X. F. Yang, Q. Y. Zhu, L. X. Yang, and C. M. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012.
- Q. Y. Zhu, X. F. Yang, L. X. Yang, and C. M. Zhang, “Optimal control of computer virus under a delayed model,” Applied Mathematics and Computation, vol. 218, no. 23, pp. 11613–11619, 2012.
- L. P. Feng, X. F. Liao, H. Q. Li, and Q. Han, “Hopf bifurcation analysis of a delayed viral infection model in computer networks,” Mathematics and Computer Modeling, vol. 56, pp. 167–179, 2012.
- L. X. Yang and X. F. Yang, “Propagation behavior of virus code in the situation that infected computers are connected to the Internet with possible probability,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 693695, 13 pages, 2012.
- X. F. Yang and L. X. Yang, “Towards the epidemiological modeling of computer viruses,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 259671, 2012.
- Q. Y. Zhu, X. F. Yang, and J. G. Ren, “Modeling and analysis of the spread of computer virus,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, pp. 5117–5124, 2012.
- C. Q. Gan, X. F. Yang, W. P. Liu, Q. Y. Zhu, and X. L. Zhang, “Propagation of computer virus under human intervention: a dynamical model,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 106950, 8 pages, 2012.
- H. Yuan and G. Q. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008.