期刊文献+

恶意代码传播效果的控制技术研究 被引量:3

Research on Malware Code Propagation Effect Control Technology
下载PDF
导出
摘要 传统恶意代码在网络中通常尽最大能力进行传播,这种不受控制传播使得许多不具有攻击价值的主机被感染,从而影响了网络性能,另一方面,也增大了恶意代码被截获的概率。针对该问题,文中提出了一种恶意代码传播效果的控制方法。该方法从限定恶意代码的生存期、调节传播途径、限制传播范围三方面对恶意代码的传播效果进行综合调控。仿真实验详细分析比较了上述三因素对恶意代码的传播速度、感染主机数量、完成整个传播耗时等传播性能的影响。结果表明,与已有的方法相比,该方法明显提高了恶意代码的传播综合性能。 Traditional malware codes always try their best to propagate in the network.The uncontrolled propagation makes many worthless computers attacked,which affects the network performance.On the other hand,it also increases the probability of exposure.In this paper,a control method of malware code is proposed.The method systematically control the malware code propagation effect from setting survival time,regulating propagation approachs and restricting propagation range.As a case study,a comparative simulation is given,which shows the influence of above factors on malware code's propagation performance,such as,propagation velocity,quantity of affected computers and infectious period.The results prove that the method is more effective.Compared with the traditional ones,it improves the general propagation performance.
出处 《计算机技术与发展》 2010年第8期128-132,共5页 Computer Technology and Development
基金 国家自然科学基金(60973139 60773041) 江苏省自然科学基金(BK2008451) 博士后基金(20090451241)
关键词 网络安全 恶意代码 受控传播 多途径传播 生存期控制 network security malware code controllable propagation mutliple approach propagation survival time control
  • 相关文献

参考文献13

  • 1Ma J,Voelker G,Savage S.Self-Stopping Worms[C] //Proc.of the 2005 ACM Workshop on Rapid Malcode.New York:ACM Press,2005:12-21.
  • 2罗军宏,张有为,谢余强,舒辉.受控蠕虫框架结构研究[J].计算机应用研究,2006,23(8):74-75. 被引量:2
  • 3张殿旭,张怡.基于可控蠕虫的W-A-W传播模型研究[J].计算机工程与科学,2008,30(5):15-19. 被引量:2
  • 4崔惠鹏.良性网络蠕虫研究与进展[J].计算机与数字工程,2007,35(10):77-79. 被引量:1
  • 5Zou C C,Gong W,Towsley D.Code red worm propagation modeling and analysis[C] //Proc.of the 9th ACM Conf.on Computer and Communications Security (CCS 2002).New York:ACM Press,2002:138-147.
  • 6Kim J,Radhakrishnan S,Dhall S K.Measurement and analysis of worm propagation on internet network topology[C] //Proc.of the IEEE Int'l Conf.on Computer Communications and Networks (ICCCN 2004).[s.l.] :[s.n.] ,2004:495-500.
  • 7Zou C C,Gong W,Towsley D.Worm propagation modeling and analysis under dynamic quarantine defense[C] //Proc.of the ACM CCS Workshop on Rapid Malcode (WORM 2003).New York:ACM Press,2003:51-60.
  • 8诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 9Zou C C,Towsley D,Gong Weibo.Email Worm Modeling and Defense[C] //Proceedings of 13th International Conference on Computer Communications and Networks.[s.l.] :[s.n.] ,2004:409-414.
  • 10HU Huaping WEI Jianli.Instant Messaging Worms Propagation Simulation and Countermeasures[J].Wuhan University Journal of Natural Sciences,2007,12(1):95-100. 被引量:2

二级参考文献62

共引文献169

同被引文献27

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部