期刊文献+

Witty蠕虫的传播模型与分析 被引量:3

Witty worm propagation modeling and analysis
下载PDF
导出
摘要 为了能够深入了解Witty蠕虫传播的具体过程和采取更为有效的防御措施,利用动力学方法提出了一个含有潜伏期且在潜伏期内和感染阶段均具有传染性的模型.根据网络的实际情况,该模型考虑了延时因素,采用了动态感染率.利用该模型得出了蠕虫爆发的阈值.将已有的模型与该模型进行了比较,仿真结果表明:该模型能更好地符合Witty蠕虫的实际传播数据,偏差比已有的模型分别减小了4.4%和6.2%. A new model is proposed based on dynamic method to insight into witty worm deeply and guard against it effectively. This model contains the worm's incubation period and its spread period in both incubation and influence stages. The delay factors were considered, and the dynamic infection rate was used in this model according to actual networks. The threshold value of speedily propagation of witty worm was found by using this model. By the comparison of existing model with the proposed one, the results indicate that the model is good agreesment with the real data of witty worm propagation; the errors of the proposed model are less 4.4 %-6.2% than that of existing model.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第2期50-54,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金重点研究计划资助项目(60633020) 河北省自然科学基金资助项目(F2006000177) 河北省教育厅科技基金资助项目(2004445)
关键词 计算机系统结构 网络安全 网络蠕虫 witty蠕虫 传播模型 置换扫描 computer systems organization network security Internet worm witty worm propagation modeling permutation scanning
  • 相关文献

参考文献8

  • 1Carey N. The evolving virus threat[C] // The Twenty third NISSC Proceedings. Baltimore, MD: ACM Press, 2000. 141-153.
  • 2Cliff C Z, Gong W, Towsley D. Code red worm propagation modeling and analysis under dynamic quarantine defense[C]//ACM Conference on Computer and Communications Security. Washington, DC: ACM Press, 2003: 51-60.
  • 3Cliff C Z, Gong W, Towsley D. Code Red worm propagation modeling and analysis [C] // Proceedings of the ninth ACM Conference on Computer and Communication Security. Washington DC: ACM Press, 2002:138 -147.
  • 4Chen Zesheng, Gao Lixin, Kevin Kwiat. Modeling the spread of active worms[C] // Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies. Francisco: IEEE Press, 2003. 1 890-1 900.
  • 5Cliff C Z, Towsley D, Gong Weibo. On the performance of Internet worm scanning strategies[J]. Per formance Evaluation, 2006, 63(7): 700-723.
  • 6Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time[C]//Proceedings of the USENIX Security Symposium. San Francisco: ACM Press, 2002. 149-167.
  • 7Shannon C, Moore D. The spread of the witty worm [J]. IEEE Security & Privacy, 2004, 2(4): 46 -50.
  • 8Hamadeh I, Kesidis G. Toward a framework for Forensic analysis of scanning worms[C]//International Conference on Emerging Trends in Information and Communication Security (ETRICS' 06). Freiburg, Germany: Springer Press, 2006.. 282-297.

同被引文献28

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部