Learn More
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the most important newly threat of the network security. In this paper, the propagation process of active P2P worms are studied by a dynamic model over the overlay topology which modeled as a power-law undirected graph. Firstly, GLP power law generator is used to(More)
In recent years, social spammers become rampant and evolve a number of variations in most social networks. In micro-blogging community, there are a typical type of anomalous groups consisting of cooperative and organized spammers, and they are hired by public relation companies and paid for posting tweets with certain content. They intentionally evolve(More)
—In order to achieve large-scale Trojan control in an effective way, a Trojan control model based on layered and P2P structure has been proposed in this paper. According to our model a hundred thousand magnitude Trojan server could be under control. This model could adjust the number of Trojan dynamically by revising the layer number. In addition, the load(More)