基于IPV6的P2P僵尸網(wǎng)絡(luò)研究
發(fā)布時(shí)間:2018-03-20 03:29
本文選題:僵尸網(wǎng)絡(luò) 切入點(diǎn):IPv6P2P 出處:《北京郵電大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:經(jīng)過多年的發(fā)展,基于IPv4的互聯(lián)網(wǎng)已經(jīng)取得巨大成功,互聯(lián)網(wǎng)以及信息技術(shù)的蓬勃發(fā)展,使得全球越來越多的人接入到互聯(lián)網(wǎng)中。然而IPv4技術(shù)在設(shè)計(jì)之初并不完善,所以從二十世紀(jì)九十年代起,相關(guān)領(lǐng)域的專家就開始規(guī)劃和設(shè)計(jì)IPv6協(xié)議。IPv6作為下一代網(wǎng)際互聯(lián)協(xié)議,彌補(bǔ)了IPv4很多不足的地方,比如IPv6海量的地址空間、合理的地址結(jié)構(gòu)等。目前一些亞洲國(guó)家和主要的歐洲國(guó)家政府機(jī)構(gòu)、經(jīng)濟(jì)組織正在推動(dòng)IPv6試驗(yàn)和商用進(jìn)程,而一些主要的運(yùn)營(yíng)商、網(wǎng)絡(luò)設(shè)備商也已在全面部署IPv6網(wǎng)絡(luò),甚至已經(jīng)開始提供IPv6網(wǎng)絡(luò)接入服務(wù)?梢灶A(yù)見的是,在未來5到10年內(nèi),全球?qū)⒂性絹碓蕉嗟娜私尤氲絀Pv6網(wǎng)絡(luò)中來。隨著IPv6技術(shù)的發(fā)展,全球?qū)⑦M(jìn)入IPv6網(wǎng)絡(luò)快速建設(shè)和普及的時(shí)期。然而,在大規(guī)模建設(shè)網(wǎng)絡(luò)的同時(shí),并不能忽視的一個(gè)問題就是安全問題。網(wǎng)絡(luò)安全一直是困擾互聯(lián)網(wǎng)的問題,在威脅網(wǎng)絡(luò)安全的問題中僵尸網(wǎng)絡(luò)是一種十分高效的攻擊手段。僵尸網(wǎng)絡(luò)技術(shù)隨著互聯(lián)網(wǎng)技術(shù)的發(fā)展,從最初的基于中心結(jié)構(gòu)的僵尸網(wǎng)絡(luò),逐漸發(fā)展為以P2P為結(jié)構(gòu)的僵尸網(wǎng)絡(luò)。 結(jié)合IPv6技術(shù)以及僵尸網(wǎng)絡(luò)技術(shù)的發(fā)展,進(jìn)入IPv6互聯(lián)網(wǎng)時(shí)代,P2P僵尸網(wǎng)絡(luò)仍然將嚴(yán)重威脅IPv6網(wǎng)絡(luò)安全,所以在IPv6技術(shù)大規(guī)模普及之前,有必要對(duì)基于IPv6的P2P僵尸網(wǎng)絡(luò)進(jìn)行深入研究,并總結(jié)僵尸網(wǎng)絡(luò)的相關(guān)機(jī)制。本文主要研究工作如下: 1、對(duì)基于IPv6的P2P僵尸網(wǎng)絡(luò)進(jìn)行明確定義,并提出了一個(gè)基于IPv6的P2P僵尸網(wǎng)絡(luò)模型——v6-Botnet; 2、詳細(xì)介紹了v6-Botnet的基礎(chǔ)架構(gòu)、組網(wǎng)機(jī)制、鄰居列表機(jī)制以及抗抖動(dòng)機(jī)制,特別設(shè)計(jì)了適用于IPv6網(wǎng)絡(luò)的鄰居列表算法,以及兩層P2P網(wǎng)絡(luò)結(jié)構(gòu)。 3、進(jìn)行了基于該模型的IPv6的P2P僵尸網(wǎng)絡(luò)實(shí)驗(yàn)平臺(tái)的設(shè)計(jì)與實(shí)現(xiàn),并分析該實(shí)驗(yàn)平臺(tái)的相關(guān)功能和性能指標(biāo),最后的測(cè)試過程和測(cè)試結(jié)果標(biāo)模型可以充分發(fā)揮P2P僵尸網(wǎng)絡(luò)的優(yōu)勢(shì),減少了控制策略服務(wù)器的傳輸流量和負(fù)擔(dān),具有良好的性能表現(xiàn)。
[Abstract]:After years of development, the Internet based on IPv4 has achieved great success. With the rapid development of the Internet and information technology, more and more people around the world are connected to the Internet. However, the IPv4 technology is not perfect at the beginning of its design. So since 1990s, experts in related fields have begun to plan and design IPv6 Protocol .IPv6 as the next-generation Internet interconnection protocol, which makes up for many deficiencies in IPv4, such as the huge address space of IPv6. Reasonable address structure and so on. At present, some government agencies and economic organizations in Asian and major European countries are promoting the IPv6 trial and commercial process, while some major operators, network equipment vendors, are already fully deploying IPv6 networks. It can be predicted that in the next 5 to 10 years, more and more people will be connected to the IPv6 network around the world. With the development of IPv6 technology, The world will enter the period of rapid construction and popularization of IPv6 network. However, while building the network on a large scale, a security problem can not be ignored. Network security has always been a problem puzzling the Internet. Botnet is a very efficient attack method in the problem of threatening network security. With the development of Internet technology, botnet technology has gradually developed from the original botnet based on central structure to the botnet with P2P structure. With the development of IPv6 technology and botnet technology, P2P botnet will still threaten the security of IPv6 network seriously in the era of IPv6 Internet, so before the large-scale popularization of IPv6 technology, It is necessary to study P2P botnet based on IPv6 and summarize the related mechanism of botnet. The main work of this paper is as follows:. 1. Define the P2P botnet based on IPv6, and propose a P2P botnet model based on IPv6: v6-Botnet; 2. The basic architecture, networking mechanism, neighbor list mechanism and anti-jitter mechanism of v6-Botnet are introduced in detail. Especially, the neighbor list algorithm suitable for IPv6 network and the two-layer P2P network structure are designed. 3. The design and implementation of P2P botnet experiment platform based on IPv6 model is carried out, and the related function and performance index of the platform are analyzed. Finally, the test process and test result standard model can give full play to the advantages of P2P botnet. It reduces the transmission flow and burden of the control policy server, and has good performance.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.04;TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前5條
1 胡擁兵;;針對(duì)IPv6的鄰居發(fā)現(xiàn)協(xié)議的DoS攻擊分析[J];電腦知識(shí)與技術(shù);2010年09期
2 張蕾;;僵尸網(wǎng)絡(luò)特性與發(fā)展研究分析[J];河西學(xué)院學(xué)報(bào);2010年05期
3 李振強(qiáng);趙曉宇;馬嚴(yán);;IPv6安全脆弱性研究[J];計(jì)算機(jī)應(yīng)用研究;2006年11期
4 諸葛建偉;韓心慧;周勇林;葉志遠(yuǎn);鄒維;;僵尸網(wǎng)絡(luò)研究[J];軟件學(xué)報(bào);2008年03期
5 趙鋒;;國(guó)內(nèi)外IPv6標(biāo)準(zhǔn)進(jìn)展及存在的問題[J];現(xiàn)代電信科技;2010年08期
相關(guān)博士學(xué)位論文 前2條
1 李雪峰;P2P僵尸網(wǎng)絡(luò)體系結(jié)構(gòu)研究[D];清華大學(xué);2011年
2 高見;基于P2P的僵尸網(wǎng)絡(luò)及關(guān)鍵技術(shù)研究[D];北京郵電大學(xué);2011年
,本文編號(hào):1637326
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1637326.html
最近更新
教材專著