期刊文献+

网络蠕虫目标发现策略研究 被引量:3

RESEARCH ON WORM TARGET DISCOVERY STRATEGIES
下载PDF
导出
摘要 要有效地防止蠕虫攻击,了解它的传播是很关键的。主要对蠕虫的目标发现策略进行研究,分析目标发现策略在蠕虫传播中的作用,给出了一种蠕虫目标发现策略的分类并对每种策略进行探讨。 To contain internet worms effectively, it is very important to know the target discovery strategies used by them. The target discovery strategies of worms are studied, and the impact of target discovery strategies on worm propagation is analyzed. A taxonomy is described ,and each strategy is discussed.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第1期256-258,共3页 Computer Applications and Software
关键词 网络安全 蠕虫 目标发现策略 Network security Worm Target discovery strategy
  • 相关文献

参考文献16

  • 1Zou Cliff C,Don Towsley,WerboGong.On the performance of Internet Worm Scanning Strategies.Technical Report,TR-03-CSE-07,Electrical and Computer Engineering Department,University of Massachusetts,2003.
  • 2Tom Vogt.Simulating and optimizing worm propagation algorithms.Http://web.lemuria.org/security/WormPropagation.pdf.
  • 3Stuart Staniford,David Moore,Vern Paxson,Nicholas Weaver.The Top Speed of Flash Worms.Proc.Workshop on Rapid Malcode (WORM 04),ACM Press,2004.
  • 4Stuart Staniford,Vern Paxson,Nicholas Weaves.How to Own the Internet in Your Spare Time.In Proceedings of the 11th USENIX Security Symposium.USENIX,Auguest 2002.
  • 5Nicholas Weaver,Vern Paxson,Stuart Stanifor,Robert Cunningham.A Taxonomy of Computer Worms.In the First ACM Workshop on Rapid Malcode (WORM),2003.
  • 6CAIDA.CAIDA Analysis of Code-Red.http://www.caida.org/analysis/security/code-red/.
  • 7Zou Cliff C,Don Towsley,Gong Weibo,Cai Songlin.Routing Worm:A Fast,Selective Attack Worm Based on IP Address Informatin.19th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'05),June 1 ~ 3,Monterey,2005.
  • 8Neal Hindocha.Threats to Instant Messaging.http://securityresponse.symantec.com/avcenter/ reference/threats.to.instant.messaging.pdf.
  • 9pkxp.QQ蠕虫病毒原理分析与防御.http://www.enet.com.cn/article/2005/0825/ A20050825447542.shtml.
  • 10Amichai Shulman.Web Application Worms:Myth or Reality?.http://www.imperva.com/ application_defense_center/white_papers/application_worms.html.

同被引文献16

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部