{"title":"P2P网络中蠕虫的研究","authors":"Xie Chunyan, Yin Zhiyu","doi":"10.1109/CINC.2009.248","DOIUrl":null,"url":null,"abstract":"With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some advantages and disadvantages of simulation software. At last this article discusses the direction for future research.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"The Research of Worms in P2P Networks\",\"authors\":\"Xie Chunyan, Yin Zhiyu\",\"doi\":\"10.1109/CINC.2009.248\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some advantages and disadvantages of simulation software. At last this article discusses the direction for future research.\",\"PeriodicalId\":173506,\"journal\":{\"name\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINC.2009.248\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computational Intelligence and Natural Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINC.2009.248","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the rapid development of the Internet, P2P technology has changed the traditional concept of Internet; this technology has become the dominant flow and greatly satisfied the needs of the users. At the same time, P2P worm has become one of the serious threats. This article include characteristics of P2P worms, classification, propagation model, detection and defense mechanism, also analyze some advantages and disadvantages of simulation software. At last this article discusses the direction for future research.