期刊文献+

基于多播扫描机制的双栈蠕虫研究

Research on Multicast Scanning Dual-stack Worm
下载PDF
导出
摘要 IPv4网络到IPv6网络的过渡过程中将出现两种网络协议将共同存在。研究了一种具有分层扫描策略的蠕虫——双栈蠕虫,该蠕虫利用多播扫描策略实现本地IPv6子网内主机的检测,利用IPv4随机地址扫描发现子网外的目标主机。通过在真实网络中进行传播测试和利用仿真程序模拟双栈蠕虫在大规模网络中的传播行为,发现双栈蠕虫可以在IPv4-IPv6双栈网络中快速传播。 In transition from IPv4 to the IPv6, both of them will work in the Internet. The dual - stack worm is presented in this paper, which adopts a hybrid scanning strategy. The multicast scanning is used to collect the addresses of all active hosts in the IPv6 link- local ,and the IPv4 random scanning is implemented to detect the vulnerable hosts out of the link- local. The dual - stack worm is released in the real network to study how the worm detects and infects susceptible hosts. And its propagation is simulated by the simulator to study how the worm propagates in the large - scale network. The results show that the dual - stack worm is able to spread in the IPv4 - IPv6 dual - stack network.
出处 《现代电子技术》 2008年第15期87-90,共4页 Modern Electronics Technique
关键词 蠕虫 IPV6 双栈 多播扫描 worm IPv6 dual - stack multicast scanning
  • 相关文献

参考文献11

  • 1王平,方滨兴,云晓春,彭大伟.基于用户习惯的蠕虫的早期发现[J].通信学报,2006,27(2):56-65. 被引量:9
  • 2Dubendorfer T,Wagner A, Hossmann T, et al. Flow - Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone[J]. Proceedings of DIMVA 2005, Austria,2005 : 103 - 122.
  • 3Tile Spread of the Sapphire/Slammer Worm. http://www.Silieondefense. com/research/worms/slammer. php, February 2003.
  • 4Staniford S,Paxson V,Weaver N. How to Own the Internet in Your Spare Time[C]. Proceeding of the 11th Usenix Security Symp. San Francisco, 2002:149 - 167.
  • 5Chen Z, Ji C. A Self- learning Worm Using Importance Scanning. Proc. ACM CCS 3rd Workshop on Rapid Malcode(WORM'05) ,2005,
  • 6Ma J, Voelker G M, Savage S. SelfStopping Worms. Proc. ACM CCS 3nd workshop on Rapid Malcode,2005.
  • 7Jing Y. Fast Worm Propagation In IPv6 Networks [EB/ OL]. Malware Seminar Spring, 2004. http://www.es.virginia, edu/- jy8y/FinalProjectReport.pdf.
  • 8Bellovin S M, Cheswick B,Keromytis A D. Worm Propagation Strategies in an IPv6 Internet[EB]. Login: Magazine, 2006,31(1):70 - 76.
  • 9Kamra A,Feng HH,Misra V,et al, The Effect of DNS Delays on Worm Propagation in an IPv6 Internet[C]. Proceedings of the IEEE INFOCOM 2005. Miami:INFOCOM, 2005:2405 - 2414.
  • 10Hinden R,Deering S, Internet Protocol Version 6 (IPv6) Addressing Architecture. RFC 3513, Internet Engineering Task Force, 2003.

二级参考文献14

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2Computer Economics,2001 economic impact of Malicious code attacks[EB/OL].http://www.computereconomics.com/cei/press/pr92101.html,2001.
  • 3MOORE D,PAXSON V,SAVAGE S,et al.Inside the slammer worm[J].IEEE Magazine of Security and Privacy,2003,1(4):33-39.
  • 4BERK V H,GRAY R S,BAKOS G.Using sensor networks and data fusion for early detection of active worms[A].Proc of the SPIE AeroSense[C].2003.
  • 5ZOU C C,GAO L X,GONG W B,et al.Monitoring and early warning for intemet worms[A].Proceedings of the 10th ACM Conference on Computer and Communication Security[C].2003.
  • 6MORRISON.Honeypot technology[EB/OL].http://www.xfocus.net/articles/200103/121.html,2001.
  • 7HARDER U,JOHNSON M J,BRADLEY J T,et al.Observing internet worm and virus attacks with a small network telescope[A].PASM'05,Proceedings of the 2nd Workshop on Practical Applications of Stochastic Modelling[C].Newcastle:Njgel Thomas(Ed),2005.113-126.
  • 8STREFTARIS G,GIBSON G J.Statistical inference for stochastic epidemic models[A].Proc of the 17th Int'l Workshop on Statistical Modelling[C].Chania,2002.609-616.
  • 9FRAUENTHAL J C.Mathematical Modeling in Epidemiology[M].New York:Springer-Verlag,1980.
  • 10WANG Y,WANG C X.Modeling the effects of timing parameters on virus propagation[A].Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2003)[C].Washington,2003.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部