期刊文献+

大规模对等网络蠕虫仿真技术研究 被引量:1

Research on large-scale P2P worm simulation
下载PDF
导出
摘要 针对对等网络蠕虫具有高度动态性和规模巨大的特点,提出了适合于P2P蠕虫仿真需要的基于节点虚拟的仿真建模方法和基于双引擎的仿真体系结构。基于节点虚拟的方法是对每个P2P蠕虫的功能和数据进行抽象和分割,通过节约计算资源和存储资源实现大规模P2P蠕虫仿真;基于双引擎的P2P蠕虫仿真结构将仿真任务的管理和网络管理分割,实现P2P蠕虫仿真的真实性和仿真规模的可扩展性。以此为基础,设计了大规模对等网络蠕虫仿真系统,开发了相应的通用仿真平台。在此基础之上,以BitTorrent蠕虫为例,对仿真平台进行了验证和实验分析。结果表明,所提出的方法及开发的系统,可适用于大规模P2P蠕虫的仿真分析。 P2P worm has its own features and existing simulation approaches can not be used to it directly.In order to simulate large-scale P2P worm,a virtual-node based simulation approach and a double-engine based simulation architec-ture were proposed.In the virtual-node based P2P simulation solution,the data and the operation of worm nodes were separated to save computational power and storage.Therefore,large-scale P2P worms were simulated with available lim-ited physical resources in single or multiple simulating computers.In double-engine P2P simulation architecture,two en-gines,local engine and network engine,were used in simulation system.The local engine was responsible for local mes-sage processing and the network engine focused on message passing in communication network.Combined with these two engines,packet level P2P worm simulation was provided by the simulation system to enhance the fidelity and scal-ability.Experimental results showed that the novel simulation solution was practical to simulate large-scale P2P worms with high fidelity.
出处 《通信学报》 EI CSCD 北大核心 2011年第8期128-135,共8页 Journal on Communications
关键词 对等网络 对等网络蠕虫 分布式仿真 P2P networks P2P worms distributed simulation
  • 相关文献

参考文献9

二级参考文献50

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 3[1]SHANKAR U,PAXSON V.Active mapping:resisting NIDS evasion without altering traffic[A].Proceedings of IEEE Symposium on Security and Privacy[C].2003.
  • 4[2]CLIFF C Z,WEIBO G,DON T.Code red worm propagation modeling and analysis[A].Proceedings of the 9th ACM Conference on Computer and Communications Security(CCS)[C].2002.138-147.
  • 5[3]YU W,BOYER C,CHELLAPPAN S,et al.Peer-to-peer system-based active worm attacks:modeling and analysis[A].Proceedings of IEEE International Conference on Communications[C].2005,295-299.
  • 6[4]QING S H,WEN W P.A survey and trends on Intemet worms[J].Computers & Security,2005,24:334-346.
  • 7[5]ZHOU L,ZHANG L,MCSHERRY F,et al.A first look at peer-to-peer worms:threats and defenses[A].Proceedings of 4th International Workshop on Peer-to-Peer Systems(IPTPS)[C].2005.
  • 8[6]MICHAEL Y L,JAMES S M.Global stability for the SEIR model in epidemiology[J].Mathematical Biosciences,1995,125:155-164.
  • 9[7]MICHAEL Y L,LIANCHENG W.Global stability in some SEIR epidemic models[J].Mathematical Approaches for Emerging and Reemerging Infectious Diseases Part Ⅱ:Models,Methods and Theory,IMA Volumes in Mathematics and its Applications,Springer-Verlag,2002,126:295-311.
  • 10[8]BARABASI A L,BONABEAU E.Scale-free networks[J].Scientific American,2003:50-59.

共引文献37

同被引文献27

  • 1杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3王平,方滨兴,云晓春.基于自动特征提取的大规模网络蠕虫检测[J].通信学报,2006,27(6):87-93. 被引量:9
  • 4COMAR P M,LIU L,SAHA S,et al.Combining supervised and unsupervised learning for zero-day malware detection[A].Proceedings of 32nd Annual IEEE International Conference on Computer Communications (INFOCOM 2013)[C].Turin,Italy,2013.2022-2030.
  • 5KAUR R.,SINGH M.Efficient hybrid technique for detecting zero-day polymorphic worms[A].2014 IEEE International Advance Computing Conference (IACC)[C].Gurgaon,India,2014.95-100.
  • 6KAUR R,SINGH M.A survey on zero-day polymorphic worm detection techniques[J].IEEE Communications Surveys & Tutorials,2014:1-30.
  • 7PORTOKALIDIS G,BOSH.Sweetbait:zero-hour worm detection and containment using low-and high-interaction honeypots[J].Computer Networks,2007,51(5):1256-1274.
  • 8CAI M,HWANG K,PAN J,et al.Wormshield:fast worm signature generation with distributed fingerprint aggregation[J].IEEE Transactions on Dependable and Secure Computing,2007,4(2):88-104.
  • 9RANJAN S,SHAH S,NUCCI A,et al.Dowitcher:effective worm detection and containment in the internet core[A].IEEE INFOCOM 2007[C].Alaska,USA,2007.2541-2545.
  • 10MOHAMMED MMZE,CHAN H A,VENTURA N,et al.An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model[A].2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)[C].Zhengzhou,China,2013.450-455.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部