期刊文献+

基于分割的蠕虫传播抑制方法 被引量:1

The Division Based Restraint Approach of Worm Propagation
下载PDF
导出
摘要 通过对蠕虫的深入分析,发现了蠕虫的传播速度与网络的规模具有一定的关系.在此基础上,为了有效地遏制蠕虫在大规模网络上的爆发,提出了对网络进行划分以减小网络规模的方法,在划分边界上对蠕虫进行检测和隔离.建立了基于图的网络划分的模型,并提出了一种适于抑制蠕虫传播的网络划分算法. By deep analysis of the worms, the proportional relation between the propagation speed of worms and the scale of network is found. Based on this condition, an approach efficiently repress the worm in large-scale network is proposed, which is to decrease the scale of network by division, as well as detect and quarantine the worm on the border of network. The graph-based model of network division is created, an algorithm fit to worm spread restraint is brought forward, and the theoretic analysis and simulations prove the efficiency of this approach.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第5期24-27,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60403033)
关键词 网络安全 蠕虫 传播抑制 network security worm spread restraint
  • 相关文献

参考文献6

  • 1Moore D, Paxson V, Savage S, et al. Inside the slammer worm[J]. IEEE Magazine of Security and Privacy,2003, 1(4): 33-39.
  • 2柴平渲,龚向阳,程时端.分布式入侵检测技术的研究[J].北京邮电大学学报,2002,25(2):68-73. 被引量:20
  • 3Zou Cliff Changchun, Gong Weibo, Towsley Don, et al.The monitoring and early detection of Internet worms[J ]. IEEE/ACM Transactions on Networking, 2005,13: 961-974.
  • 4Moore D, Shannon C, Voelker G M, et al. Internet quarantine: requirements for containing self-propagating code [ C ] // INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco: IEEE Press, 2003:1901-1910.
  • 5Cheung S, Hoagland J, Levitt K, et al. The design of GRIDS: a graph-based intrusion detection system [ EB/OL]. Davis: U.C. Davis Computer Science Department,1999. http: // eiteseer, nj. nec. com/cheung99design.html.
  • 6张宏莉,方滨兴,胡铭曾,姜誉,詹春艳,张树峰.Internet测量与分析综述[J].软件学报,2003,14(1):110-116. 被引量:109

二级参考文献10

  • 1[1]Paxson V. End-to-End routing behavior in the Internet. IEEE/ACM Transactions on Networking, 1997,5(5):601~615.
  • 2[2]Kalidindi S, Zekauskas MJ. Surveyor: an infrastructure for Internet performance measurements. In: Proceedings of the INET'99. San Jose, 1999. http://www.isoc.org/inet99/proceedings/4h/4h_2.htm.
  • 3[3]Claffy K, Monk TE, McRobb D. Internet tomography. Nature, 1999, January 7. http://www.nature.com/nature/webmatters/tomog/ tomog.html.
  • 4[4]Burch H, Cheswick B. Mapping the Internet. IEEE Computer, 1999,32(4):97~98.
  • 5[5]Wolski R, Spring N, Hayes J. The network weather service: a distributed resource performance forecasting service for metacomputing. Journal of Future Generation Computing Systems, 1999,15(5):757~768.
  • 6[6]Chang H, Jamin S, Willinger W. Inferring AS-level Internet topology from router-level path traces. In: Proceedings of the SPIE ITCom 2001. 2001. http://citeseer.nj.nec.com/chang01inferring.html.
  • 7[7]Govindan R, Tangmunarunkit H. Heuristics for Internet map discovery. In: Proceedings of the IEEE INFOCOM 2000, Vol 3. 2000. 1371~1380. http://citeseer.nj.nec.com/govindan00heuristics.html.
  • 8[8]Munzner T. Interactive visualization of large graphs and networks [Ph.D. Thesis]. Stanford University, 2000.
  • 9[9]Tauro SL, Palmer C, Siganos G, Faloutsos M. A simple conceptual model for the Internet topology. In: Proceedings of the IEEE Conference of Global Telecommunications. 2001. http://www.cs.ucr.edu/~michalis/PAPERS/jellyfish-GI.pdf.
  • 10Mark R B,Kesdogan D.Transaction-based anomaly detection[]..1999

共引文献127

同被引文献12

  • 1邓智群,刘福,慕德俊,唐三平.网络隔离体系结构研究[J].计算机应用研究,2005,22(5):219-221. 被引量:21
  • 2孙知信,唐益慰,张伟,宫婧,王汝传.基于特征聚类的路由器异常流量过滤算法[J].软件学报,2006,17(2):295-304. 被引量:15
  • 3ARP spoofing and dsniff a tutorial[EB/OL], http://duseeurity. com/tutorials/tutorials/ARP_SPOOFING_WIN.pdf.
  • 4Chen Yufeng,Dong Yabo,Lu Dongming,et al.Detecting randomly scanning worms based on heavy-tailed property[C].Proc of 2005 IEEE International Conference on Networking, Sensing and Control,2005:354-358.
  • 5国家计算机网络应急技术处理协调中心.CNCERT/CC2007年网络安全工作报告[EB/OL].http://www.cert.org.on/articles/docs/common/2008040823865.shtml,2008.
  • 6David Moore,CoUeen Shannon,Geoffrey M Voelker, et al.Intemet quarantine:Requirements for containing self-propagating code[C].Proc of IEEE INFOCOM Conference,2003.
  • 7E-Gap WebSite. Products and technology: E-Gap application fire-wall[EB/OL].http://www.whalecommunications.com,2003.
  • 8Rechard Stevens W.TCP/IP详解卷1[M].北京:机械工业出版社,1993.
  • 92007年全国信息网络安全状况与计算机病毒疫情调查分析[J].信息网络安全,2007(10):1-2. 被引量:3
  • 10向郑涛,陈利,董亚波.基于Bro的蠕虫检测系统设计及实现[J].湖北汽车工业学院学报,2008,22(1):29-32. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部