期刊文献+

蠕虫传播特性的研究 被引量:3

Study of Worm Propagation Characteristic
下载PDF
导出
摘要 本文描述了蠕虫传播的四个数学模型和近年来快速发展起来的各项蠕虫传播模拟技术,分析并比较了每种研究方法的优势与不足。在文章的最后给出了一些可以更准确地研究蠕虫传播特性的方法,指出今后的研究方向。 This paper describes four mathematical models and a variety of techniques of simulating worm propagation, analyses and compares the predominance and the deficiency of each method. Some methods to study the worm propagation characteristic more accurately are put forward at the end of this paper, pointing out future research trends.
出处 《微计算机信息》 北大核心 2008年第15期63-65,共3页 Control & Automation
关键词 蠕虫 数学模型 计算机模拟 worm mathematical models computer simulation
  • 相关文献

参考文献8

  • 1董瑜,张基温.改进的双要素蠕虫传播模型[J].微计算机信息,2005,21(12X):80-81. 被引量:4
  • 2Z Chen, L Gao, K Kwiat. Modeling the spread of active worms [C]. Proc of IEEE Infocom.San Francisco:IEEE Press,2003:1890- 1900.
  • 3M Liljenstam, Y Yuan, BJ Premore. A Mixed Abstraction Level Simulation Model of Large-scale Internet Worm Infestations [C]. IEEE/ACM MASCOTS 2002.
  • 4A Wagner, T Dubendorfer, B Plattner. Experiences with Worm Propagation Simulations [C]. Proceedings of the 2003 ACM workshop on Rapid maleode,2003 o
  • 5GE Riley, MLW Lee. Simulating Internet Worms[C]. Proceedings of 12th Annual Meeting of IEEE/ACM International Symposium on Modeling,2004.
  • 6KS Perumalla, S Sundaragopalan. High-fidelity Modeling of Computer Network Worms[C]. Annual Computer Security Applications Conference (ACSAC),2004.
  • 7S Wei, J Mirkovic, M Swany. Distributed Worm Simulation with a Realistic Internet Model [C]. In Workshop on Parallel and Distributed Simulation archive Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, 2005.
  • 8林思明,程学旗,马铭.网络安全研究中的建模环境分析与实现[J].系统仿真学报,2006,18(5):1233-1238. 被引量:5

二级参考文献15

  • 1戴启华,高西全,韩学义.话路时间校对和认证系统的安全策略研究[J].微计算机信息,2005,21(2):200-201. 被引量:10
  • 2White B,Lepreau J,Stoller L.An Integrated Experimental Environment for Distributed Systems and Networks[C]// In Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York:ACM Press,2002.255-270.
  • 3Breslau L,Estrin D,Fall K,et al.Advances in Network Simulation[J].IEEE Computer(S0018-9162),2000,33(5):59-67.
  • 4[3]Bajcsy R,Kesidis G,Levitt K.Cyber Defense Technology Networking and Evaluation[J].Communications of the ACM(S0001-0782),2004,47(3):58-61.
  • 5Chow A C H,Zeigler B P.Parallel DEVS:Parallel Hierarchical Modular Modeling Formalism[C]// In Proceedings of the 26th Conference on Winter Simulation.San Diego:Society for Computer Simulation International,1994.716-722.
  • 6Vahdat A,Yocum K,Walsh K,et al.Scalability and Accuracy in a Large-Scale Network Emulator[C]// In Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York:ACM Press,2002:271-284.
  • 7Chang X.Network Simulations with OPNET[C]// In Proceedings of the 31st Conference on Winter Simulation:Simulation-a Bridge to the Future.New York:ACM Press,1999:307-314.
  • 8Simmonds R,Bradford R,Unger B.Applying Parallel Discrete Event Simulation to Network Emulation[C]// In Proceedings of the Fourteenth Workshop on Parallel and Distributed Simulation.Washington,DC:IEEE Computer Society,2000:15-22.
  • 9Gross D C.Report from the Fidelity Implementation Study Group[R].Technical Report 99S-SIW-167,Simulation Interoperability Standards Organization (SISO),1999.
  • 10CERT/CC.CERT Advisory CA-2003-16 Buffer Overflow in Microsoft RPC[EB/OL].(2003-07-17)[2004-12-20].http://www.cert.org/advisories.

共引文献7

同被引文献14

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部