期刊文献+

一种无线Adhoc网络中恶意程序的传播模型

A Malware Propagation Model in Wireless Ad Hoc Networks
下载PDF
导出
摘要 提出了一种描述无线Adhoc网络上恶意程序传播的模型,并通过仿真实验研究了恶意程序的传播行为.研究表明,无线Adhoc网络中恶意程序的传播临界值明显高于Internet中恶意程序的传播临界值,并且恶意程序在无线网络中的传播速度远远低于它在Internet中的传播速度.同时,无线MAC协议的引入会影响恶意程序在Adhoc网络中的传播特性. A malware propagation model in wireless ad hoc networks is presented and the propagating behaviors of the malware in these networks are investigated by means of simulations. The study results show that the threshold of the malware in wireless ad hoc networks is greatly higher than the value found in the Internet while the propagation speed is remarkably slower than that in the Intemet. It is also found that the active MAC protocol can affect the propagating properties of the malware.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第B12期79-82,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.90204012,No.60573036)
关键词 AD HOC网络 恶意程序 传播模型 ad hoc networks malware propagation model
  • 相关文献

参考文献9

  • 1Jose Nazario. Worm blog[OL], http://www. wormblog. com/ im_worms/, 2007-07-25.
  • 2Santi P,Blough D. The critical transmitting range for connectivity in sparse wireless ad hoc networks [ J ]. IEEE Transactions on Mobile Computing,2003,1 (2):25 - 29.
  • 3WANG Changguang,WANG Fangwei,ZHANG Yangkai,MA Jianfengi.Malicious Code Modeling and Analysis in Weighted Scale-Free Networks[J].Wuhan University Journal of Natural Sciences,2007,12(1):51-54. 被引量:2
  • 4Staniford S,Paxson V,Weaver N. How to own the Intemet in your spare time [A]. In 11th USENIX Security Symposium [C]. San Francisco: USENIX Press, 2002. 149 - 167.
  • 5Boguna M, Pastor-Satorras R. Epidemic spreading in correlated complex networks[ J] .Phys Rev E,2002(65):047104.
  • 6Moreno Y, Pastor-Satorras R, Vespignani A. Epidemic outbreaks in complex heterogeneous networks[ J]. The European Physical Journal B,2002, (26) :521 - 529.
  • 7Mickens J W,Noble B D. Modeling epidemic spreading in mobile environmentsl A ]. In Proceedings of the 4th ACM workshop on Wireless security[C]. Cologne, Germany:ACM Press, 2005.77 - 86.
  • 8Bettstetter C. On the connectivity of Ad-hoc networks[J]. The Computer Journal, Special Issue on Mobile and Pervasive Computing. 2004,47 (4):432 - 437.
  • 9Khelil A,Becker C, Tian J, et al. An epidemic model for information diffusion in MANETs[ A ]. In Proceedings of the 5th ACM International Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems [ C ]. Atlanta: ACM Press, 2002.54 - 60.

二级参考文献10

  • 1Pastor S R,,Vespignani A.Evolution and Structure of the Internet: A statistical Physics Approach[]..2004
  • 2Martin H.The Virus Bulletin: Independent Maleware Advice[]..2006
  • 3Kermack W O,McKendrick A G.A Contribution to the Mathematical Theory of Epidemics[].Proceedings of the Royal Society of London Series A.1927
  • 4Barthelemy M,,Barrat A,Pastor-Satorras R, et al.Velocity and Hierarchical Spread of Epidemic Outbreaks in Scale-Free Neworks[].Physical Review Letters.2004
  • 5Ebel H,Mielsch L I,Bornholdt S.Scale-Free Topology of E-mail Networks. http://www.theo- physik.uni-kiel.de/~bornhol /pre035103.pdf . 2005
  • 6Murray W.The Application of Epidemiology to Computer Viruses[].Computers and Security.1988
  • 7Albert R,,Jeong H,Albert L, et al.Diameter of the World-Wide Web[].Nature.1999
  • 8Cohen F.Computer Viruses-Theory and Experiments[].Computers and Security.1987
  • 9Barrat A,Barthelemy M,Vespignani A.Weighted Evolving Networks: Coupling Topology and Weight Dynamics[].Physical Review Letters.2004
  • 10Kephart,Jeffrey O,White S R.Measuring and Modeling Computer Virus Prevalence[C]//[].Proc of the IEEE Computer Society Symposium on Research in Security and Privacy.1993

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部