期刊文献+

蠕虫建模仿真及检测技术研究进展 被引量:2

Progress on Modeling, Simulation and Detection of Internet Worm
原文传递
导出
摘要 计算机网络蠕虫作为当前互联网所面临的最为严重的安全威胁之一,对其进行细致的研究显得尤为重要。为了体现网络蠕虫技术研究方面的最新成果,针对当前网络蠕虫技术研究领域的热门方向,整理并分析了蠕虫传播模型和蠕虫软件仿真技术等方面的研究思路和成果,并对多种新型的网络蠕虫检测技术进行了分析和评估。最后根据研究结果,对网络蠕虫技术研究的新方向进行了总结与展望。 It is very important to study on the network worm, one of the most important security threats against the Internet. In the light of the most hot research areas, this paper summarizes the results in the research of worm modeling and simulation while describes the up-to-date worm detection technologies. Finally, this paper analyzes these research aspects and forecasts the future worm study.
出处 《信息安全与通信保密》 2010年第1期99-101,共3页 Information Security and Communications Privacy
关键词 蠕虫建模 蠕虫仿真 蠕虫检测 worm modeling worm simulation worm detection
  • 相关文献

参考文献19

  • 1Streftaris G, Gibson G J. Statistical Inference for Stochastic Epidemic Models[C]// Proc. of the 17th IWSM.Chania: [s.n.], 2002: 609-616.
  • 2Frauenthal JC. Mathematical Modeling in Epidemiology[M]. New York: Springer Verlag, 1980.
  • 3Zou CC, Gong W, Towsley D. Code Red Worm Propagation Modeling and Analysis[C]//Proc. of the 9th ACM CCS.Washington: ACM Press, 2002: 138- 147.
  • 4Chen Z, Gao L, Kwiat K. Modeling the Spread of Active Worms[C]// Proc. of IEEE INFOCOM 2003. San Francisco: IEEE, 2003: 1890-1900.
  • 5文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 6干国政,贾坤,王宪栋.对抗网络蠕虫的良性蠕虫的设计[J].信息安全与通信保密,2006(12):100-102. 被引量:2
  • 7Mickens J W, Noble B D. Analytical Models for Epidemics in Mobile Networks[C]//IEEE. Third IEEE WiMob.New York: IEEE, 2007: 77.
  • 8Abdelhafez M, Riley G, Cole R G, et al. Modeling and Simulations of TCP MANET Worms[C]// Proc Of the 21st ACM PADS.Washinton: ACM Press, 2007: 123-130.
  • 9王勇,云晓春,李奕飞.对等网络蠕虫建模与分析[J].计算机工程,2007,33(18):167-169. 被引量:3
  • 10Yoon K O, Woo N K, Dong S K, et al. Design of Actor based Worm Modeling System Using DML [C]// Proc. Of the IPC 2007. Los Alamitos: IEEE CS Press, 2007: 210-213.

二级参考文献23

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2Gao L.X.On inferring autonomous system relationships in the Internet[J].IEEE/ACM Transactions on Networking,December 2001,9(6):733-745.
  • 3University of Oregon Route Views Project[EB/OL].Available on http://www.routeviews.org/.
  • 4Liljenstam M,Yuan Y,Premore B.J,Nicol D.M.A mixed abstraction level simulation model of large-scale internet worm infestations[C].In 10th International Workshop on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS),IEEE Computer Society,2002,pp.109-116
  • 5Zou C.C,Gong W,Towsley D.On the performance of Internet worm scanning strategies[R].Technical Report,TR-03-CSE-07,Electrical and Computer Engineering Department,University of Massachusetts,2003.
  • 6Staniford S,Paxson V,Weaver N.How to own the internet in your spare time[C].USENIX Security Symposium,2002.
  • 7Moore D,Shannon C,Brown J.Code-Red:a case study on the spread and victims of an Internet worm[C].In:ACM/USENIX Internet Measurement Workshop,Marseille,France,November 2002,273-284.
  • 8Moore D,Paxson V,Savage S,etal.Inside the Slammer Worm[C].IEEE Magazine on Security and Privacy,July 2003,1(4):33-39.
  • 9The Network Simulator-NS2[EB/OL].Available on http://www.isi.edu/nsnam/ns/index.html.
  • 10Daley D.J,Gani J.Epidemic modelling[M].An Introduction.Cambridge University Press,Cambridge,UK,1999.

共引文献190

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部