期刊文献+

即时通信蠕虫传播建模 被引量:5

Modeling of Instant Message Worms Propagation
下载PDF
导出
摘要 基于对即时通信蠕虫和即时通信网络特点的分析,使用离散时间方法,提出一个即时通信蠕虫离散数学传播模型。开发即时通信蠕虫传播仿真软件用于验证模型的正确性。基于仿真软件进行的大量仿真实验表明,该蠕虫传播模型是正确的,可以用于分析蠕虫的传播行为并预测传播趋势。 By analyzing the properties of instant message worms and instant networks, a discrete-time math model of Instant Message(IM) propagation worms is proposed. To validate this model, a propagation simulation software is developed. Large-scale simulations validate that this model can be used for analyzing behaviors of worms and foreseeing tendency of worm spread.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第5期143-145,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60473090) 国家自然科学基金与英国皇家科学会合作基金资助项目(60711130232) 四川师范大学基金资助重点项目(07ZD018) 四川师范大学基金资助项目(08KYL03)
关键词 蠕虫 即时通信 建模 worms Instant Message(IM) modeling
  • 相关文献

参考文献7

  • 1IMlogic Threat Center. 2005 Real-time Communication Security: The Year in Review[Z]. (2005-10-11). http://www.imlogic.com/pdf/ 2005ThreatCenter report.pdf.
  • 2CN/CERT. CN/CERT China Network Security Research Annual Report[Z]. (2005-09-13). http://www.hais.org.cn/doc/2005CNCER TCCAnnualReport_Chinese.pdf.
  • 3Smith R. Instant Messaging as a Scale-free Network[Z]. (2006-05- 03). http://arxiv.org/abs/cond-mat/0206378.
  • 4卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. 被引量:17
  • 5徐向阳,韦昌法.基于即时通信的安全保护策略[J].计算机工程,2007,33(21):125-127. 被引量:6
  • 6Mannan M, van Oorschot P C. On Instant Messaging Worms: Analysis and Countermeasures[C]//Proceedings of the ACM CCS Workshop on Rapid Malcode. Fairfax, VA, USA: ACM Press, 2005.
  • 7Staniford S, Paxson V, Weaver N. How to Own the Intemet in Your Spare Time[C]//Proceedings of the l lth USENIX Security Symposium. San Francisco, CA, USA: [s. n.], 2002: 149-167.

二级参考文献44

  • 1Hindocha N, Chien E. Malicious threats and vulnerabilities in instant messaging. 2005. http://www.symantec.com/avcenter/reference/malicious.threats.instant.messaging.pdf
  • 2IMlogic Threat Center. 2005 real-time communication security: The year in review. 2005. http://www.imlogic.com/pdf/2005ThreatCenter_report.pdf
  • 3CN/CERT. CN/CERT China Network Security Research Annual Report. 2005. http://www.hais.org.cn/doc/2005CNCERTCC AnnualReport_Chinese.pdf
  • 4Nazario J, Anderson J, Wash R, Connelly C. The future of Internet worms. Blackhat Briefings, 2001. http://www.crimelabs.net/does/worm.html
  • 5Zheng H. Intemet worm research [Ph.D. Thesis]. Tianjin: Nankai University, 2003 (in Chinese with English abstract).
  • 6Messenger APIs. http://msdn.microsoft.corn/downloads/list/messengerapi.asp
  • 7ICQ APIs. http://www.icq.com/api/
  • 8W32.Choke.Worm. http://securityresponse.symantec.com/avcenter/venc/data/w32.choke.worm.html
  • 9W32.Goner.A@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.goner.a@mm.html
  • 10W32.Aim Ven@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.aimven.worm.html

共引文献19

同被引文献53

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部