期刊文献+

P2P网络中激发型蠕虫传播动态建模 被引量:6

Dynamic Modeling of Reactive Worm Propagation in P2P Networks
下载PDF
导出
摘要 鉴于激发型蠕虫的巨大危害性,本文在考虑网络动态变化的情况下对激发型蠕虫的传播进行了深入地研究,提出了激发型蠕虫动态传播数学模型和免疫模型,并基于动态传播数学模型推导出了激发型蠕虫不会泛滥的充分条件.大规模仿真实验验证了传播模型的有效性和蠕虫不会泛滥充分条件的正确性.基于传播模型的分析表明,下载率是影响蠕虫传播的关键因素,蠕虫基本繁殖率是衡量蠕虫传播能力的关键指标.基于实测P2P网络数据和传播模型,预测和估计了激发型蠕虫的传播能力、传播速度和危害性,指出尽早重视P2P激发型蠕虫特别是尽早找到检测和控制方法的重要性和迫切性. In this paper, propagation pattern of reactive worms is studied. The propagation model and the immtmization model of reactive worms are proposed, in which dynamic factors of P2P networks are taken into account. Further, the sufficient condition of worms not attaining an endemic state is deduced from the model of propagation of reactive worms in applying Epidemiology. Large scale simulation experiments validate the models and the sufficient condition. All the simulations also show that among all P2P-related parameters, the downloading rate is the crucial factor to the propagation of reactive worms, the basic reproduction number of worms is the index of propagation capability of worms, and the sufficient condition is helpful to early warn the presence of an epi- demic. In addition, by using data from the Gnutella network, the propagation capability, propagation speed and the risk of reactive worms are predicted and evaluated based on the propagation model. Prediction and evaluation show that it is time that reactive worms should be taken into account.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第2期300-307,共8页 Acta Electronica Sinica
基金 国家自然科学基金项目(No.60873075) 可视化计算与虚拟现实四川省重点实验室课题(No.J2010N05) 四川省科技厅应用基础项目(No.2010JY0125) 四川省教育厅重点课题(No.10ZA007) 西南交通大学信息编码与传输四川省重点实验室开放研究基金课题(No.2010-05)
关键词 P2P网络 激发型蠕虫 动态性 传播建模 基本繁殖率 仿真 P2P networks reactive worms dynamics propagation modeling basic reproduction number simulation
  • 相关文献

参考文献25

  • 1Zhou L,Zhang L,McSherry F,et al.A first look at peer-topeer worms:Threats and defenses[A].Proc of the 4th Int Workshop on Peer-to-Peer Systems[C].New York:Springer,2005.24-35.
  • 2Pszonicki L,Lechotycki A,Krupinski M.Computati-onal elimination of interferent effects in flame atomic-absorption spectrometry[J].Talanta,1988,35(6):465-472.
  • 3Chen G,Gray R S.Simulating non-scanning worms on peer-topeer networks[A].Proo of the 1st Int Conf on Scalable Information Systems[C].Hong Kong:ACM,2006.
  • 4Murray W H.The application of epidemiology to computer viruses[J].Computers and Security,1988,7:130-150.
  • 5Kephart J O,White S R.Directed-graph epidemiological models of computer viruses[A].Proc of IEEE Symp.Security and Privacy[C].Oakland:IEEE,1991.343-359.
  • 6Zou C C,Gong W,Towsley D.Code red worm propagation modeling and analysis[A].Proc of ACM Conf on Computer and Communication Security (CCS' 02)[C].Washington:ACM,2002.
  • 7Liljenstam M,Yuan Y,Premore B,et al.Nicol.Email worm modeling and defense[A].Proc of IEEE Int.Symp[C].MASCOTS,Fort Worth,TX,Oct.2002.
  • 8Wei Y.Analyze the Worm-Based Attack.in Large Scale P2P Networks[A].Proc of the 8th IEEE International Symposium on High Assurance Systems Engineering (HASE' 04)[C].Tampa:IEEE,2004.308-309.
  • 9Wei Y.Analyzing the performance of internet worm attack approaches[A].Proc of the 13th Intemational Conference on Computer Communications and Networks[C].Chicaco:IEEE,2004.1095-2055.
  • 10Dumitriu D,Knightly E,Kuzmanovic A,et al.Denial-of-service resilience in peer-to-peer file-sharing systems[A].Proc of ACM Sigmetrics[C].Banff,Canada:ACM,2005.

二级参考文献66

  • 1卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. 被引量:17
  • 2周翰逊,赵宏.主动良性蠕虫和混合良性蠕虫的建模与分析[J].计算机研究与发展,2007,44(6):958-964. 被引量:16
  • 3P Barford and M Blodgett. Toward Botnet Mesocosms[A]. In Proc. USENIX HotBots'07[C] .6 - 6.
  • 4J B Grizzard, V Sharma, C Nunnery, B B Kang and D Dagon. Peer-to-Peer Botnets: Overview and Case Study[A]. In Proc. USENIX HotBots' 07[ C]. 1-1.
  • 5P Wang, S Sparks and C Zou. An Advanced Hybrid Peer-to- Peer Botnet [ A]. In Proc. USENIX HotBots' 07 E C ]. 2 - 2.
  • 6R Vogt, J Aycock and M Jacobson. Army of Botnets[A]. In Proc. NDSS' 07 [ C]. 2007.111 - 123.
  • 7Y Pryadkin, R Lindell, J Bannister and R Govindan. An Empirical Evaluation of IP Address Space Occupancy [ R]. ISITR-2004 - 598,2004.
  • 8Z Chen and C Ji. Optimal worm-scanning method using vulnerable-host distributions[ J]. International Journal of Security and Networks, 2007,2(1/2) : 71 - 80.
  • 9Y Xie, F Yu, K Achan, E Gillum, M Goldszmidt and T Wobber. How Dynamic are IP Addresses? [ J]. Comput. Commun. Rev. ,2007,37(4) :301 - 312.
  • 10J B Horrigan and A Smith. Home Broadband Adoption 2007 [OL ]. http://www, pewintemet, org/pdfs/PIP_ Broadband 2007. pdf, 2007.

共引文献50

同被引文献39

  • 1陈斌.计算机网络安全与防御[J].中国西部科技,2006,5(4):21-22. 被引量:49
  • 2王晓锋,方滨兴,云晓春,张宏莉.并行网络蠕虫模拟中任务优化划分的研究[J].计算机学报,2006,29(8):1367-1374. 被引量:10
  • 3Nicol D M. Efficient simulation of internet worms [J]. ACM Transactions on Modeling and Computer Simulation, 2008, 18 (2):1-5: 32.
  • 4WANG J, YU X, YAN J. Research on network simulation ab- stract technology based on simplicity theory [C]. Shanghai: In- ternational Conference on Wireless Networks and Information Systems, 2009: 186-192.
  • 5ZOU C, Towsley D, GONG W. On the performance of Internet worm scanning strategies [J]. Performance Evaluation, 2006, 63 (7) : 700-723.
  • 6Moore D, Paxson V, Savage S, et al. Inside the slammer worm [J]. IEEE Magazine of Security and Privacy, 2003, 1 (4) : 33- 39.
  • 7Moore D, Shannon C, Brown J. Code-red: A case study on the spread and victims of an Internet worm [C]. Marseille, France; ACM SIGCOMM/USENIX Internet Measurement Workshop, 2002, 273-284.
  • 8Magoni D. Network topology analysis and Internet modelling with Nem [J]. International Journal of Computers and Appli- cations, 2005, 27 (4): 252-259.
  • 9Binsalleeh H, Ormerod T, Boukhtouta A, et al. On the analysis of the Zeus botnet erimeware toolkit [C]// 2010 8th Annual International Conference on Privacy Seeurity and Trust. Ottawa, ON, 2010 31-38.
  • 10Gtizzard B, Shatrna V, Nunnery C, et al. Peer to-peer botnets. Overview and case study i-C]// Proceedings of USENIX HotBots'07. Berkeley: USENIX Association, 2007: 78-83.

引证文献6

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部