期刊文献+

Grid-based internet worm behavior simulator

Grid-based internet worm behavior simulator
下载PDF
导出
摘要 The traditional network simulator has function and performance limitation when simulating Internet worms,so we designed the grid-based Internet worm behavior simulator (IWBS Grid).IWBS Grid makes use of the real Internet topology,link and routing information,and simulates the worm behavior at the packet event-driven level;and proposes a high-performance Internet worms behavior simulation platform by right of the grid computing capability,resource and task management,and so on.The experimental results show that IWBS grid surpasses the traditional simulator in simulating capability,and the technology to track the worm propagation in packet level can propose the valuable information for the further study on worms. The traditional network simulator has function and performance limitation when simulating Internet worms, so we designed the grid-based Internet worm behavior simulator (IWBS Grid). IWBS Grid makes use of the real Internet topology, link and routing information, and simulates the worm behavior at the packet eventdriven level; and proposes a high-performance Internet worms behavior simulation platform by right of the grid computing capability, resource and task management, and so on. The experimental results show that IWBS grid surpasses the traditional simulator in simulating capability, and the technology to track the worm propagation in packet level can propose the valuable information for the further study on worms.
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第3期41-47,共7页 哈尔滨工业大学学报(英文版)
基金 Sponsored by the National High Technology Research and Development Program of China (Grant No. 2007AA010503) the Science and Technology Development Program of Weihai (Grant No. 2007-96) the Science Foundation of HIT at Weihai (Grant No. HITWH 200702)
关键词 GRID WORM behavior simulation distributed and parallel network simulator grid worm behavior simulation distributed and parallel network simulator
  • 相关文献

参考文献5

二级参考文献71

  • 1陈伟东,冯登国.一类存在特权集的门限群签名方案[J].软件学报,2005,16(7):1289-1295. 被引量:18
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3Singh Set al. Automated worm fingerprinting//Proceedings of the Usenix Symposium on Operating System Design and Implementation, Usenix Assoc., 2004:45-60
  • 4Yegneswaran V, Barford P, Jha S. Global intrusion detection in the domino overlay system//Proceedings of the Network and Distributed System Security (NDSS 04). Internet Soc. , 2004:79-95
  • 5Cai Min, Hwang Kai, Kwok Yu-Kwong, Song Shanshan, Chen Yu. Collaborative Internet worm containment. IEEE Security and Privacy, 2005, 3(3):25-33
  • 6Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Barham P. Vigilante: End-to-end containment of Internet worms//Proceedings of the ACM Symposium on Operating System Principles (SOSP). 2005
  • 7Newsome J, Karp B, Song D. Polygraph: Automatically generating signatures for polymorphic worms//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, California, USA, 2005:226-241
  • 8Wu T, Malkin M, Boneh D. Building intrusion tolerant applications//Proceedings of the USENIX Security Symposium. Washington, DC, USA, 1999:74-87
  • 9Jing Ji-Wu, Liu Peng, Feng Deng-Guo, Xiang Ji, Gao Neng, Lin Jing Qiang. ARECA: A highly attack resilient certification authority//Proceedings of the ACM Workshop on Sur vivable and Self-Regenerative Systems. Washington, DC, USA, 2003:53-63
  • 10Locasto Michael E, Parekh Janak J, Keromytis Angelos D, Stolfo Salvatore J. Towards collaborative security and P2P intrusion detection//Proceedings of the IEEE Workshop on Information Assurance and Security. 2005: 30-36

共引文献255

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部