|
计算机应用研究 2012
Malicious code united-defense network based on Cloud-P2P model
|
Abstract:
The current anti-virus systems are usually unable to respond to endless emerging malicious codes in time. To solve this problem, this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model. The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically. Ser-vers and user terminals in the malicious code united-defense network carry out their own duties, forming a high-security collaborative defense network against malicious codes and obtaining the whole group immunity quickly. It also proposed two kinds of hierarchical network topology, C-DHT and D-DHT, which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model. By the introduction of mobile agent technology, realized vaccine agent and patrol agent of the malicious code defense united-network. The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances, such as the network load balance, the rapid response, the comprehensive defense and the good compatibility.