期刊文献+

非结构化对等网中被动蠕虫传播的性能 被引量:1

Performance analysis of passive worms over unstructured P2P network
下载PDF
导出
摘要 针对被动蠕虫对非结构化对等网的安全构成的严重威胁,考虑P2P用户的实际情况,建立了一个带有死亡率、离线率和在线率的时滞SEIRS模型,得到被动蠕虫灭绝与否的阈值——基本再生数。时滞包括潜伏期和临时免疫期。潜伏期主要由下载文件的时间决定,而临时免疫期与用户的抗恶意软件性能有关。仿真研究了不同参数对模型的影响,尤其是时滞对模型的影响,为有效控制被动蠕虫的传播提供了理论指导。 Passive worm, one of the major forms of peer-to-peer (P2P) worms, has posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death rate, offline rate and online rate was constructed, which takes the actual circumstances of P2P users into consideration. The threshold, the basic reproductive number, was obtained, which governs whether a passive worm is extinct or not. In this model, the time delay includes latent and temporary immunity periods, where the former was mainly governed by the time to download a file, and the latter was related to the performance of anti malicious software. The impacts of different parameters on this model were studied by simulation. In particular, the effect of time delay can provide an important guideline for the control of unstructured P2P networks as well as passive worm defense. Some future works were introduced.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2009年第4期1069-1074,共6页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60633020) 教育部科学技术研究重点项目(208012) 河北省自然科学基金项目(F2009000322)
关键词 计算机应用 非结构化对等网 被动蠕虫 基本再生数 平衡点 性能分析 computer application unstructured peer-to-peer networks passive worms basic reproduction number equilibrium performance analysis
  • 相关文献

参考文献1

共引文献5

同被引文献6

  • 1Kienzle D M, Elder M C. Recent Worms : a Survey and Trends [ C ]//Proc of the 2003 ACMCCS Workshop on Rapid Malcode. New York: ACM Press, 2003: 1-10.
  • 2Rajab Au M, Monrose F, Terzis A. Worm Evolution Tracking via Timing Analysis [ C ]//Proc of the 2005 ACM Workshop on Rapid Malcode. New York : ACM Press, 2005 : 52-59.
  • 3XIE Ying-lian, Selear V, Maltz D A, et al. Worm Origin Identification Using Random Moonwalks [ C ]//Proc of the 2005 IEEE Symposium on Security and Privacy. Washington D C : IEEE Computer Society, 2005 : 242-256.
  • 4Kumar A, Paxson V, Weaver N. Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event [ C ]//Proc of the 5th ACM SIGCOMM Conference on Internet Measurement. Berlceley: USENIX Association, 2005: 351-364.
  • 5XIANG Yang, LI Qiang, GUO Dong. Online Accumulation: Reconstruction of Worm Propagation Path [ C]//Proc of Network and Parallel Computing, IFIP International Conference(LNCS 5245). Shanghai: Springer, 2008: 162-172.
  • 6洪征,吴礼发,王元元.三种构建无尺度蠕虫网络的蠕虫传播模型[J].吉林大学学报(工学版),2008,38(3):690-694. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部