期刊文献+

基于蠕虫传播机理的主动防御策略 被引量:5

Active defense strategy based on the mechanism of the worm's propagation
下载PDF
导出
摘要 分析了蠕虫病毒基本的传播途径,并就基于网络的蠕虫传播机理,分析了被动防御蠕虫的不足,指出了利用蠕虫机理,编写免疫代码主动修补系统漏洞的主动蠕虫防御技术.并简述了当今反病毒和网络设备提供商提出的新的蠕虫防卫理念. This article is written to analyze the base propagation route of the worm-virus. Then it analyzes the shortage of the passive anti-worm strategy. It also argue the active strategy by shutting down the system leak hole under the help of the immune code.
作者 亓俊红 苏波
出处 《山东理工大学学报(自然科学版)》 CAS 2006年第6期62-65,共4页 Journal of Shandong University of Technology:Natural Science Edition
关键词 蠕虫 传播机理 主动防御 worm propagation mechanism active defense
  • 相关文献

参考文献3

  • 1Spafford EH. The Interact worm program:An analysis[R].Technical Report,CSD-TR823, West Lafayette: Department of Computer Science, Purdue University, 1988. 1-29.
  • 2张运凯,王方伟,张玉清,马建峰.蠕虫病毒的传播机制研究[J].计算机应用研究,2005,22(4):137-139. 被引量:13
  • 3趋势科技,2004年网络威胁报告及十大病毒[EB/OL].http://www.trendmicro. com/cn/about/news/pr/archive/ 2004/2004-12-23. htm.

二级参考文献17

  • 1J Shoch, J Hupp. The " Worm" Programs-early Experiments with a Distributed Computation [ J ]. Communications of the ACM, 1982,22(3) :172-180.
  • 2D Seeley. A Tour of the Worm [ C ]. CA : Proceedings of the Winter Usenix Conference ,1989. 287.
  • 3D Moore,V Paxson,S Savage, et al. Inside the Slammer Worm[J].IEEE Magazine on Security and Privacy,2003,1 (4) :33-39.
  • 4D Moore, V Paxson, C Shannon, et al. The Spread of the Sapphire/Slammer Worm [ R ]. Proceedings of the CAIDA Technical Report,2003.1-9.
  • 5N Weaver, V Paxson, S Staniford,et al. A Taxonomy of Computer Worms [ C ]. Proc. ACM CCS Workshop on Rapid Malcode, 2003.http ://www. silicondefense, com/research/.
  • 6Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense[ C]. ACM Conference on Computer and Communications Security, 2003. 51-60.
  • 7Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis [ C ]. ACM Conference on Computer and Communications Security, 2002. 138-147.
  • 8J Daley, J Gani. Epidemic Modeling, an Introduction [ M ]. Cambridge Univ. Press, 1999.
  • 9D Moore, C Shannon, Geoffrey, et 02. Intemet Quarantine: Requirements for Containing Serf-propagating Code[ C]. INFOCOM 2003. http ://www. cs. ucf. edu/-jglenn/research, html.
  • 10D Moore, C Shannon. Code-red: A Case Study on the Spread and Victims of an Internet Worm [ C ]. Proceedings of the 2002 ACM SICGOMM Internet Measurement Workshop,2002. 273-284.

共引文献12

同被引文献28

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部