期刊文献+

P2P干预式蠕虫传播仿真分析

Simulation and analysis on propagation of man-activated worms in P2P network
下载PDF
导出
摘要 对P2P干预式主动型蠕虫的传播机制进行了研究,指出其传播主要包括四个阶段:信息收集,攻击渗透、自我推进与干预激活。研究发现,P2P干预式蠕虫实际是一种拓扑蠕虫,能利用邻居节点信息准确地确定攻击目标,而且攻击非常隐蔽。采用仿真的方法研究了P2P相关参数对P2P干预式蠕虫传播的影响。仿真实验表明,潜伏主机激活率对干预式蠕虫传播的影响最大,而攻击率对干预式蠕虫传播的影响较小。 This paper studied the propagation mechanism of the man-activating worm,which was a kind of active worms in the P2P network.The propagation procedure of this kind of worm consists of four stages: information collection,penetration,self propulsion and activating.It was found that the worm was a kind of topology-awareness worms.It could properly identify the patent target by exploiting the neighbor information,which was stored in its cache.This may made it very difficult to detect it.For the purpose of examining the effect of P2P-related parameters on propagation of the worm,developed simulation program.Simulations experiments show that amongst all the P2P-related parameters,the probability of worm being activated rather than the attacking rate has the most effect on worm propagation.
出处 《计算机应用研究》 CSCD 北大核心 2012年第1期297-300,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60873075) 可视化计算与虚拟现实四川省重点实验室课题(J2010N05) 四川省科技厅应用基础项目(2010JY0125) 四川省教育厅重点课题(10ZA007 11ZB069) 西南交通大学信息编码与传输四川省重点实验室开放研究基金课题(2010-05)
关键词 主动型蠕虫 干预式蠕虫 P2P网络 仿真 active worms man-activating worms P2P networks simulation
  • 相关文献

参考文献12

  • 1CNCERT/CC [EB/OL]. [ 2010-01-19 ]. http ://www. cert. org. cn/ UserFiles/File/ CNCERTCC2007 AnnualReport_Chinese. pdf.
  • 2Symantec Inc. Symantec Intemet security threat report [EB/OL ]. [ 2007- 3- 26 ]. http ://www. symantec.com/threatreport.
  • 3STANIFORD S, PAXSON V, WEAVER N. How to own the Internet in your spare time[ C]//Proc of the 11th USENIX Security Symposium. New York : ACM, 2002 : 149-167.
  • 4汤碧玉,杨光松.面向对象技术在NS网络仿真环境中的应用[J].信息技术,2004,28(9):45-48. 被引量:4
  • 5CHEN G, GRAY R S. Simulating non-scanning worms on peer-to- peer networks[ C ]//Proc of the 1st International Conference on Scalable Information Systems. New York : ACM ,2006.
  • 6吴堃,戴菡,叶保留,陆桑璐.基于NS2的P2P网络模拟平台研究[J].系统仿真学报,2006,18(8):2152-2157. 被引量:17
  • 7王跃武,荆继武,向继,刘琦.Contagion蠕虫传播仿真分析[J].计算机研究与发展,2008,45(2):207-216. 被引量:7
  • 8王跃武,荆继武,向继,刘琦.拓扑相关蠕虫仿真分析[J].软件学报,2008,19(6):1508-1518. 被引量:9
  • 9WEAVER N, PAXSON V, STANIFORD S, et al. A taxonomy of computer worms [ C ]//Proc of the 2003 ACM Workshop on Rapid Malcode. New York : ACM,2003.
  • 10W32. serflog A@ mm [EB/OL]. [2010- 03- 05]. http ://sccurityre-sponse. symantcc. com/avccntcr/vcnc/datafw32. serflog.a@ mm. html.

二级参考文献36

  • 1卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. 被引量:17
  • 2周翰逊,赵宏.主动良性蠕虫和混合良性蠕虫的建模与分析[J].计算机研究与发展,2007,44(6):958-964. 被引量:16
  • 3[2]http://www.isi.edu/nsnam/NS[DB].
  • 4[3]http://nile.wpi.edu/NS[DB].
  • 5A M Law,W D Kelton.Simulation Modeling and Analysis,third edition[M].USA.McGraw-Hill Companies,Inc.2000.
  • 6Chord Sim.URL[EB/OL].2004.http://www.pdos.lcs.mit.edu/chord/.
  • 7S Ratnasamy,P Francis,M Handley,R Karp,S Shenker.A Scalable Content-Addressable Network[C]// In Proc.of the ACM SIGCOMM 2001 Technical Conference.San Diego,CA,USA.2001.
  • 8M Portmann,A Seneviratne.Cost-Effective Broadcast for Fully Decentralized Peer-To-Peer Networks[J].Computer Communications Journal,Special Issue on Ubiquitous Computing.2002.
  • 9Serapis.The Serapis homepage,cvs.Sourceforge.net.URL[EB/OL]:2002.http://cvs.sourceforge.net/ cgibin/viewcvs.c gi/freenet/Serapis/
  • 10NeuroGrid.[EB/OL].2004.http://www.neurogrid.net.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部