期刊文献+

离散时间下混合型良性蠕虫的建模仿真分析 被引量:1

Modeling and analysis of discrete-time hybrid-benign worms
下载PDF
导出
摘要 为了更好地刻画良性蠕虫的传播过程,采用了离散时间模型。在离散时间下,考虑恶性蠕虫和良性蠕虫传播对网络的影响,对混合型良性蠕虫的传播过程进行分析和数学建模,通过仿真验证传播模型,并引入泰勒公式对关键参数进行分析比较。理论分析和仿真实验表明,在混合型良性蠕虫释放时间和网络性能一定的条件下,存在一个临界值使得切换时间最佳,而网络敏感度足够小时,不同的切换时间对感染类主机数量的变化几乎没有影响。 In order to better characterize the propagation of benign worm,this paper adopted a discrete-time model.Under discrete time,the paper analyzed the propagation of hybrid-benign worms and presented a mathematical modeling,which took account of the network influence due to the spread of malicious worms and benign worms.Finally,the simulation validated the propagation model,and the key parameters were compared and analyzed with Taylor Equation.The theoretical analysis and experimental results indicate that there exists a critical value of switch time under a defined release time of hybrid-benign worms and the certain performance of network.And when the sensitivity of the network is small enough,different switch time would have no influence on the movement of the number of the infected hosts.
出处 《计算机应用》 CSCD 北大核心 2011年第11期2957-2960,2993,共5页 journal of Computer Applications
基金 福建省高校科研专项(JK2009002)
关键词 良性蠕虫 离散时间模型 混合型蠕虫建模 网络安全 benign worm discrete time model hybrid worm modeling network security
  • 相关文献

参考文献9

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2CASTANEDA F, SEZERY E C, XUN J. WORM VS. Worm: Pre- liminary study of an active counter-attack mechanism[ C]///Proceed- ings of the 2004 ACM Workshop on Rapid Malcode. New York: ACM, 2004:83 - 93.
  • 3杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 4周翰逊,赵宏.主动良性蠕虫和混合良性蠕虫的建模与分析[J].计算机研究与发展,2007,44(6):958-964. 被引量:16
  • 5周翰逊,赵宏,闻英友.分而治之的混合型良性蠕虫的建模与分析[J].计算机研究与发展,2009,46(7):1110-1116. 被引量:12
  • 6NAEDELE M. Standards for XML and Web services security [ J]. IEEE Compater, 2003, 36(4):96-98.
  • 7CHEN ZESHENG, GAO LIXIN, KEVIN K. Modeling the spread of active worms [ C]//Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. Washington, DC: IEEE Computer Society, 2003:1890 -1900.
  • 8WEAVER N. Warhol worms: The potential for very fast Internet plagues [ EB/OL]. [ 2011 - 03 - 0/8]. http://www, es. berkeley. edu/nweaver/warhol.html.
  • 9DAVID M, COLLEEN S. The spread of the code-red worm [ R/ OL]. [ 2008 - 10 - 18]. ttp://www, caida, org,/researeh/ security/ code-red/coderedv2_analysis, xml.

二级参考文献44

共引文献206

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部