期刊文献+

IPV6网络中搜索引擎蠕虫的传播研究 被引量:1

Analysis of web search engine worms in IPv6 networks
下载PDF
导出
摘要 针对传统蠕虫传播模型无法准确预测基于搜索引擎的蠕虫的传播问题,在IPv6网络环境下构建了一种基于搜索引擎的蠕虫——V6-MAMWorm,并在分层扫描策略的基础上提出了一种混合智能算法。在本地应用子网内扫描策略,在子网间应用搜索引擎扫描策略,从而建立了一种新型的蠕虫传播模型(multi-tier architecture model,MAM)。仿真结果表明,V6-MAM-Worm在IPv6网络中具有更快的传播速度,其将对IPv6网络的安全性带来巨大的威胁。 Aimed at the problems of spread of the worms based on search engines,a new type of worm,V6-MAMWorm based on search engines is defined in the IPv6 network environment.A hybrid intelligence algorithm based on different layers scanning strategy is de-signed.It means that the worm apply subnet scanning strategy in local subnet and apply scanning strategy based on search engines in inter-subnet.Based on the multi-tier architecture scanning strategy,a multi-tier architecture model(MAM) is presented.The results of simulation experiment which is compared to other well-known worms indicated that V6-MAMWorm is a worm that can propagate fastly in the large-scale in IPv6 network,at the same time a enormous threat posed by the new worm in IPv6 network is predicted.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第10期2178-2183,共6页 Computer Engineering and Design
基金 国防科工委应用基础基金项目(JI300D004)
关键词 IPV6 蠕虫 搜索引擎 蠕虫扫描策略 蠕虫传播模型 IPv6 internet worm search engines worm scanning strategy worm propagation model
  • 相关文献

参考文献12

  • 1Moore D, Shannon C, Brown J. Code-red: A case study on the spread and victims of an Internet worm[C].Proceedings of the 2rid ACM SIGCOMM Workshop on Internet Measurement, IFLA International Office for UBC,2003:273-284.
  • 2Streftafis G, Gibson GJ.Statistical inference for stochastic epidemic models [C]. Proceedings of the 17th Int'l Workshop on Statistical Modelling,2002:609-616.
  • 3Kienzle D,Elder M.Recent worms:A survey and trends[C].Proceedings of the ACM Workshop on Rapid Malcode.Washington: ACM Press,2003:1176-1185.
  • 4Chen Z,Gao L,Kwiat K.Modeling the spread of active worms [C].New York:Proceedings of the IEEE INFOCOM 2003,Internet Engineering Task Force,2003:108-116.
  • 5王方伟,张运凯,王长广,马建峰.网络蠕虫的扫描策略分析[J].计算机科学,2007,34(8):105-108. 被引量:7
  • 6Hinden R,Deering S.IP Version 6 Addressing Architecture[C]. Proceedings of ACM Networking, Washington, Intemet Engineering Task Force,2006.
  • 7肖颖,云晓春,辛毅.基于搜索引擎蠕虫的分析与检测[J].计算机工程与应用,2006,42(7):112-115. 被引量:6
  • 8Zou C C, Towsley D, Gong W. On the performance of Internet worm scanning strategies[J].Performance Evaluation,2006(63): 700-723.
  • 9Debasis Mohanty.Demystifying Google hacks[J].Public Access Computer Systems Revie,2006,17(6): 178-188.
  • 10Van-Hauser THC. Attacking the IPv6 protocal suite [EB/OL]. http://pacsec.jp/psj05/psj05-vanhauser-en.pdf,2005-12-07.

二级参考文献21

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2邢长友,杨莉,陈鸣.网络蠕虫传播建模分析[J].电子科技大学学报,2007,36(3):590-593. 被引量:14
  • 3Debasis Mohanty.Demystifying Google Hacks.http://www.hackspirits.com/
  • 4郑辉.Santy蠕虫分析报告.2004-12-23
  • 5Cliff C Zou,Lixin Gao,Weibo Gong et al.Monitoring and Early Warning for Internet Worms[C].In:10th ACM Conference on Computer and Communication Security (CCS'03),2003-10
  • 6Ke Wang,Salvatore J Stolfo.Anomalous Payload-based Network Intrusion Detection.RAID,2004-09
  • 7C Kruegel,T Toth,E Kirda.Service Specific Anomaly Detection for Network Intrusion Detection[C].In:Proceedings of the Symposium on Applied Computing(SAC),ACM Press
  • 8T Toth,C Kruegel.Accurate Buffer Overflow Detection via Abstract Payload Execution[C].In:5th Symposium on Recent Advances in Intrusion Detection(RAID),Lecture Notes in Computer Science,Springer Verlag,Switzerland,2002-10
  • 9Search Engine Marketing Firm iProspect Survey Confirms Importance of Visibility on the First Three Pages of Search Results.http://www.iprospect.com/media/press2004 04 20.htm
  • 10R Fielding,J Gettys.Hypertext Transfer Protocol HTTP/1.1[S].RFC 2612,1999-06

共引文献12

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部