期刊文献+

基于SEM的网络蠕虫传播模型研究 被引量:5

Research on SEM-based Internet Worm Propagation Models
下载PDF
导出
摘要 长期以来,网络蠕虫一直是Internet安全的一个重要威胁。蠕虫传播模型是研究蠕虫传播特性最常用的一种方法,由于蠕虫在网络中的传播与流行疾病在人群中的传播有许多相似之处,因此当前大多数蠕虫传播模型都是基于简单传染病模型(Simple Epidemic Model,简称SEM)理论建立的。从简单传染病模型入手,依次分析了基于简单传染病模型的Kermack-Mackendrick模型、双因素模型和带宽限制蠕虫传播模型,指出了这些模型的提出背景及其特征因素,并总结了模型之间的相互关系,为后续蠕虫传播模型的建立提供了借鉴指导。 Internet worms have been,and continue to be,one of the most important threats to the Internet community.Accurately modeling the worm propagation is a most commonly used method to investigate its inherent characteristics.Most of the existing worm propagation models are based on the Simple Epidemic Model(SEM) due to the similarity of propagation characteristics between the Internet worm on Internet and the epidemic in crowd.In this paper,we first review the Simple Epidemic Model,and then analyze the Kermack-Mackendrick model,the two-factor model and the bandwidth-limited worm propagation model respectively,which are all proposed based on the SEM,and highlight the background and the distinguished properties of each models.Finally,the relationship between these models are conclude,which provides a guideline for construction of upcoming worm propagation models.
出处 《计算机仿真》 CSCD 北大核心 2010年第8期103-106,126,共5页 Computer Simulation
基金 国家自然科学基金(60573015) 中国博士后科学基金一等资助(20080440072)
关键词 网络蠕虫 简单传染病模型 传播模型 网络安全 Worm SEM Propagation model Network security
  • 相关文献

参考文献7

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2D M Nicol.Efficient Simulation of Internet Worms[J].ACM Transactions on Modeling and Computer Simulation(TOMACS),2008,18(2).
  • 3J C Frauenthal.Mathematical Modeling in Epidemiology[J].New York:Springer-Verlag,1980.
  • 4C C Zou,W Gong and D Towsley.Code Red Worm Propagation Modeling and Analysis[C].In Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS 2002),Washington,DC,2002.
  • 5D Moore,V Paxson,S Savage,C Shannon,S Staniford and N Weaver.Inside the Slammer Worm[J].IEEE Security and Privacy,2003,1(4):33-39.
  • 6C Shannon and D Moore.The Spread of the Witty Worm[J].IEEE Security and Privacy,2004,2(4):46-50.
  • 7G Kesidis,I Hamadeh,Y Jin,S Jiwasurat and M Vojnovic.A Model of the Spread of Randomly Scanning Internet Worms that Saturate Access Links[J].ACM Transactions on Modeling and Computer Simulation (TOMACS),2008,18(2).

二级参考文献1

共引文献186

同被引文献34

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2张运凯,王方伟,马建峰,张玉清.基于隔离策略的蠕虫传播模型及分析[J].计算机科学,2005,32(3):62-65. 被引量:4
  • 3Staniford S,Paxson V Weaver N.How to own the fnternet in Your Spare Time[C].Proceed--ing of the l lth Usenix Security Symp. San Francisco,2002:149-167.
  • 4Bonabeau K, Dorigo M, Theraulaz G. Swarm intelligence: From natural Lo artificial systems[M].New York: Oxford University Press, 1999: 40-58.
  • 5Weaver N Potential Strategies for High Speed Active Worms: A worst case analysis 2002.
  • 6Stuart Staniford, Vern Paxson, Nicholas Weaver. How to own the internet in your spare time [ C ]. Proceedings of the 11 th USENIX Security Symposium, 2002 : 149 - 167.
  • 7C Shannon and D Moore. The Spread of the W ittyWorm [ J ]. IEEE Security and Privacy, 2004,2 (4) :46 - 50.
  • 8ZOU C C, GONG W, DON T. Code red worm propagation modeling and analysis[ C]//Proc of the 9th ACM Symposium on Computer and Communication Security. 2002 : 138-147.
  • 9MOORE D, PAXSON V, SAVAGE S, et al. Inside the slammer worm[ J]. IEEE Security & Privacy, 2003,1 (4) :33-39.
  • 10STANIFOED S, PAXSON V, WEAVER N. How to own the Intemet in your spare time [ C ]//Proc of the 11 th Usenix Security Symposium. 2002 : 149-167.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部