期刊文献+

一种蓝牙环境下恶意程序的传播模型 被引量:2

Malware propagation model in bluetooth networks
下载PDF
导出
摘要 在分析蓝牙恶意程序传播过程的基础上,将蓝牙协议的作用及设备移动方式抽象为若干个统计学参数,通过理论推导建立了一种蓝牙恶意程序传播动力学的分析模型.该模型表明,认证机制等安全措施的引入可大大降低蓝牙恶意程序的传播过程,这对设计安全的蓝牙协议及设备具有积极的意义.仿真结果表明,该模型能够很好地描述蓝牙环境下恶意程序的传播特性. Based on the analysis of the Bluetooth malware propagation process, an analytical model of its propagation dynamics is established by means of theoretical derivation after abstracting the function of Bluetooth protocols and the mobility of Bluetooth devices into several statistical metrics. The model illustrates that the introduction of authentication mechanism can greatly decrease the propagation speed of Bluetooth malware, which is of great importance to design security Bluetooth protocols and devices. Simulation results show that our model works well.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第1期94-98,110,共6页 Journal of Xidian University
基金 国家“863”项目资助(2007AA01Z429,2007AA01Z405) 国家自然科学基金重点项目资助(60633020) 国家自然基金项目资助(60573036,60702059,60503012) 河北省自然科学基金项目资助(F2006000177) 教育部科学技术研究重点项目资助(208012)
关键词 蓝牙 恶意程序 传播模型 Bluetooth networks malware propagation model
  • 相关文献

参考文献8

  • 1IMS Ltd. Bluetooth Evolution-opportunities and Challenges[EB/OL]. [2008-05-15]. http://www. imsresearch.corn/ product/wireless.asp.
  • 2张运凯,马建峰,王方伟,王长广.一种基于防火墙的蠕虫传播与控制模型[J].西安电子科技大学学报,2006,33(1):33-36. 被引量:5
  • 3WANG Changguang,WANG Fangwei,ZHANG Yangkai,MA Jianfengi.Malicious Code Modeling and Analysis in Weighted Scale-Free Networks[J].Wuhan University Journal of Natural Sciences,2007,12(1):51-54. 被引量:2
  • 4Bray J, Sturman C F. Bluetooth 1.1 : Connect Without Cables[M]. 2nd Edition. New Jersey: Prentice Hall, 2002: 135- 230.
  • 5Mickens J W, Noble B D. Modeling Epidemic Spreading in Mobile Environments[C]//Proceedings of the 4th ACM Workshop on Wireless Security. Cologne: ACM Press, 2005: 77-86.
  • 6Khelil A, Becker C, Tian J, et al. An Epidemic Model for Information Diffusion in MANETs[C]//Proceedings of the 5th ACM International Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. Atlanta: ACM Press, 2002: 54-60.
  • 7Free Software Foundation. GUN Octave[EB/OL]. [2008-5-21]. http://www.gnu. org/software/oetave/.
  • 8The ISI of USC. The Network Simulator-ns-2[EB/OL]. [2008-07-01]. http://www.isi. edu/nsnam/ns/index.html.

二级参考文献15

  • 1张运凯,王方伟,张玉清,马建峰.蠕虫病毒的传播机制研究[J].计算机应用研究,2005,22(4):137-139. 被引量:13
  • 2Seeley D.A Tour of the Worm[DB/OL].http://securitydigest.org/phage/resource/seely.pdf,2004-10-30.
  • 3Zou C C,Towsley D,Gong W.On the Performance of Internet Worm Scanning Strategies[DB/OL].http://www.cs.ucf.edu/~czou/research/wormStrategy-elsevier.pdf,2003-11-20.
  • 4Zou C C,Gong W,Towsley D.Code Red Worm Propagation Modeling and Analysis[A].In 9th ACM Symposium on Computer and Communication Security[C].New York:ACM Press,2002.138-147.
  • 5Zou C C,Towsley D,Gong W.A Firewall Network System for Worm Defense in Enterprise Networks[DB/OL].http://www.cs.ucf.edu/~czou/research/FirewallNetwork-techreport.pdf,2004-06-08.
  • 6Pastor S R,,Vespignani A.Evolution and Structure of the Internet: A statistical Physics Approach[]..2004
  • 7Martin H.The Virus Bulletin: Independent Maleware Advice[]..2006
  • 8Kermack W O,McKendrick A G.A Contribution to the Mathematical Theory of Epidemics[].Proceedings of the Royal Society of London Series A.1927
  • 9Barthelemy M,,Barrat A,Pastor-Satorras R, et al.Velocity and Hierarchical Spread of Epidemic Outbreaks in Scale-Free Neworks[].Physical Review Letters.2004
  • 10Ebel H,Mielsch L I,Bornholdt S.Scale-Free Topology of E-mail Networks. http://www.theo- physik.uni-kiel.de/~bornhol /pre035103.pdf . 2005

共引文献5

同被引文献15

  • 1Mickens J W,Noble B D.Modeling Epidemic Spreading in Mobile Envimnments[C]//Proc.of the 4th ACM Workshop on Wireless Secudty.Cologne,Germany:ACM Press,2005:77-86.
  • 2Sun Bo,Yah Guanhua,Xiao Yang.Self-propagating Mal-packets in Wireless Sensor Network:Dynamics and Defense Implicarlons[J].Ad Hoe Networks,2009,7(8):1489-1500.
  • 3Akyildiz L F,Wang Su.Wireless Sensor Networks:A Survey[J].Computer Networks,2002,38(4):393-422.
  • 4De P,Liu Yonghe,Das S K.Modeling Node Compromise Spreading in Wireless Sensor Networks Using Epidemic Theory[C]//Proc.of IEEE WoWMoM'06.Buffalo-Niagara Falls,USA:[s.n.],2006.
  • 5王长广.无线环境下恶意程序的传播机制研究[D].西安:电子科技大学,2006.
  • 6Royer E,Melliar-Smith P M,Moser L.An analysis of optimum node density for ad Hoc mobile networks[C]//Proc.IEEE.ICC,June 2001:857-861.
  • 7Yoon J,Liu Ming-yan,Noble B.Random waypoint considered harmful[C]//Twenty-Second Annual Joint Conference of the IEEE Computer and Communications.2003:1312-1321.
  • 8Bettstetter C,Krause O.On border effects in modeling mo simulation of wireless ad hoc networks[C]// The 3rd IEEE International Conference on Mobile and Wireless Communication Networks.August 2001.
  • 9Bettstetter C,Resta G,Santi P.The node distribution of the random waypoint mobility mobility for wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2003,2 (3):257-269.
  • 10方宝平.复杂网络的病毒传播及免疫策略[D].合肥:安徽大学,2011.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部