您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Modeling Peer-to-Peer Botnets

  2. Peer-to-peer botnets are a relatively new yet rapidly growing Internet threat. In the year since its introduction in January 2007, the Storm Worm peer-to-peer botnet has become the largest botnet on the Internet. Unlike previous botnets operating ov
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:947200
    • 提供者:borelist
  1. Measurements and Mitigation of Peer-to-Peer-based Botnets - A Case Study on Storm Worm

  2. Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised machines connect to the central server and wait for commands. However, t
  3. 所属分类:网络基础

    • 发布日期:2010-05-01
    • 文件大小:1043456
    • 提供者:borelist
  1. Analysis of the Storm and Nugache Trojans--P2P is here

  2. Since the advent of distributed intruder tools in the late 1990s, defenders have striven to identify and take down as much of the attack network as possible, as fast as possible.This has never been an easy task, owing in large part to thewide distri
  3. 所属分类:C

    • 发布日期:2010-05-01
    • 文件大小:278528
    • 提供者:borelist
  1. Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation

  2. Computer worms evolved continually, faster and smarter. Proactive P2P worms with new “gene” propagate over logical P2P overlay networks defined by peer relationship. Observations suggest that the node degrees of an unstructured P2P network are power
  3. 所属分类:专业指导

    • 发布日期:2010-05-01
    • 文件大小:245760
    • 提供者:borelist
  1. 计算机网络第六版答案

  2. Computer Networking: A Top-Down Approach, 6th Edition Solutions to Review Questions and Problems Version Date: May 2012 This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Appr
  3. 所属分类:讲义

    • 发布日期:2015-06-14
    • 文件大小:2097152
    • 提供者:u014715363