期刊文献+

Modeling and analysis of Internet worm propagation 被引量:3

Modeling and analysis of Internet worm propagation
原文传递
导出
摘要 Although the frequency of Internet worm's outbreak is decreased during the past ten years, the impact of worm on people's privacy security and enterprise's efficiency is still a severe problem, especially the emergence of botnet. It is urgent to do more research about worm's propagation model and security defense. The well-known worm models, such as simple epidemic model (SEM) and two-factor model (TFM), take all the computers on the internet as the same, which is not accurate because of the existence of network address translation (NAT). In this paper, we first analyze the worm's functional structure, and then we propose a three layer worm model named three layres worm model (TLWM), which is an extension of SEM and TFM under NAT environment. We model the TLWM by using deterministic method as it is used in the TFM. The simulation results show that the number of NAT used on the Internet has effects on worm propagation, and the more the NAT used, the slower the worm spreads. So, the extensive use of NAT on the Internet can restrain the worm spread to some extent. Although the frequency of Internet worm's outbreak is decreased during the past ten years, the impact of worm on people's privacy security and enterprise's efficiency is still a severe problem, especially the emergence of botnet. It is urgent to do more research about worm's propagation model and security defense. The well-known worm models, such as simple epidemic model (SEM) and two-factor model (TFM), take all the computers on the internet as the same, which is not accurate because of the existence of network address translation (NAT). In this paper, we first analyze the worm's functional structure, and then we propose a three layer worm model named three layres worm model (TLWM), which is an extension of SEM and TFM under NAT environment. We model the TLWM by using deterministic method as it is used in the TFM. The simulation results show that the number of NAT used on the Internet has effects on worm propagation, and the more the NAT used, the slower the worm spreads. So, the extensive use of NAT on the Internet can restrain the worm spread to some extent.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第4期63-68,共6页 中国邮电高校学报(英文版)
基金 supported by the Ministry of Education Science and Technology Basic Resource Data Platform (507001) the Ministry of Education Research Project for Returned Talents after Studying Abroad,and the Chinese Universities Scientific Fund (2009RC0502) the International Scientific and Technological Cooperation Program (S2010GR0902)
关键词 worm propagation MODEL TLWM NAT worm propagation, model, TLWM, NAT
  • 相关文献

参考文献1

二级参考文献9

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2SONG D,MALAN R,STONE R.A snapshot of global internet worm activity[R].Arbor Networks,2001.
  • 3CHEN Z,GAO L,KWIAT K.Modeling the spread of active worms[C]//ln:Proceedings of the IEEE INFOCOM 2003.San Francisco:IEEE Computer Society,2003.
  • 4MOORE D,SHANNON C.The Spread of code-red worm (CRv2)[EB/OL].http://www.caida.org/analysis/security/codered/coderedv2_analysis.xml,2005-01-12.
  • 5ZOU C,GONG W,TOWSLEY D.Code red worm propagation modeling and analysis[C]//In:Proceedings of the 9th ACM Symp on Computer and Communication Security.Washington:ACM Press,2002.
  • 6KIENZLE D,ELDER M.Recent worms:A survey and trends[C]//In:Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM 2003).Washington:ACM Press,2003.
  • 7ZOU C,GONG W,TOWSLEY D.On the performance of Internet worm scanning strategies[R].Electrical and Computer Engineering Department,University of Massachusetts,2003.
  • 8WANG Y,WANG C.Modeling the effects of timing parameters on virus propagation[C]//In:Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM 2003).Washington:ACM Press,2003.
  • 9STEVE W.Open problems in computer virus research[EB/OL].http://www.research.ibm.com/antivirus/SciPapers/White/Problems/Problems.html,2005-01-12.

共引文献13

同被引文献32

  • 1张宁蒙.基于Python的网络爬虫技术探析[J].移动信息,2020(2):84-85. 被引量:1
  • 2杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 3ZOU C C, TOWSLEY D, GONG W, et al. Advanced Routing Wormand Its Security Challenges [J]. Simulation, 2006, 82(1): 75-85.
  • 4PORRAS P A, SAIDI H, YEGNESWARAN V. A Multi-perspective Analysis of the Storm Worm[R]. SRI Technical Report, 2007.
  • 5NAZARIO J. The Conficker Cabal Announced[EB/OL]. Arbor Networks, 2009. http://asert, arbometworks, com/2009/ 02/the-c onfic ker - c abal-announc ed/.
  • 6NAZARIO J, ANDERSON J, WASH R, et al. The Future of Intemet Worms. Blackhat Briefings, 2001. http://www. crimelabs.net/docs/worm.html.
  • 7LI P, SALDUR M, SU X. A Survey of Intemet Worm Detection and Containment[J]. IEEE Communications Surveys & Tutorials, 2008, 10(1): 20-35.
  • 8WEAVER V P N, STANIFORD S, CUNNINGHAM R. A Taxonomy of Computer Worms[C]//Proceedings of the 2003 ACM Workshop on Rapid Malcode: Oct 27, 2003, Washington, DC, USA. New York, NY, USA: ACM, 2003: 11-18.
  • 9BAILEy N T. The Mathematical Theory of Infectious Diseases and Its Applications[M]. New York: Hafner Press, 1975.
  • 10DALEY D J, GANI J. Epidemic Modelling: an Introduction [M]. Cambridge: Cambridge University Press, 1999.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部