期刊文献+

基于双层扫描策略的IPv6蠕虫研究 被引量:1

Resarch of IPv6 worm based on double layer scan strategy
下载PDF
导出
摘要 由于IPv6网络地址空间巨大,传统的基于随机扫描、顺序扫描等网络层扫描策略的IPv4蠕虫难以在IPv6网络中传播。构建了一种新型IPv6网络蠕虫——V6-Worm,该蠕虫运用双层扫描策略,在子网内和子网间分别采用基于组播和基于域间路由协议路由前缀的扫描策略,并在此基础上建立了一种双层蠕虫传播模型(double layer model,DLM)来仿真V6-Worm的传播趋势。仿真结果表明,V6-Worm可在大规模IPv6网络中传播,与采用随机扫描策略的CodeRed相比,V6-Worm具有更快的传播速度。 Because of the huge address space in IPv6 network,traditional worm based on random scan,sequential scan in IPv4 network can hardly spread in IPv6 network.This paper developed a new type of IPv6 worm—V6-Worm.The worm appliesd double layer scan strategy,it applied subnet scaning starategy based on multicast in local sunbet and applied scaning strategy based on the information of BGP routing prefix in inter-subnet.Based on the double layer scanning strategy,established a double layer model(DLM)for simluating the propagation of V6-Worm.The reults of simulation show that V6-Worm can propagate in IPv6 network,and compare to random-scaning worm codered,V6-Worm can propagate more rapidly.
出处 《计算机应用研究》 CSCD 北大核心 2012年第4期1518-1521,共4页 Application Research of Computers
基金 国家重点基础研究发展计划资助项目(2007CB307102) 国家高技术研究发展计划资助项目(2007AA01Z2A1)
关键词 IPV6 蠕虫 双层扫描策略 蠕虫传播模型 双层模型 IPv6 worm double layer scan strategy worm propagation model double layer model
  • 相关文献

参考文献10

  • 1CERT. CERT/CC advisories [ EB/OL]. (2002-05-15 ) [ 2011- 08- 28 ]. http://www, cert. org/advisories/.
  • 2ZOU C C, TOWSLEY D, GONG Wei-bo, et al. Routing worm: a fast, selective attack worm based on IP address information [ C ]// Proc of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington DC : IEEE Computer Society, 2005 : 199- 206.
  • 3HINDEN R,DEERING S.RFC 4291,IP version 6 addressing archi-tecture[S].[S.l.]:Network Working Group,2006.
  • 4刘烃,郑庆华,管晓宏,陈欣琦,蔡忠闽.IPv6网络中蠕虫传播模型及分析[J].计算机学报,2006,29(8):1337-1345. 被引量:9
  • 5卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. 被引量:17
  • 6徐延贵,钱焕延,张凯.IPv6网络中DNS蠕虫的研究[J].计算机科学,2009,36(12):32-36. 被引量:2
  • 7VIDA R,COSTA L.RFC 3810,Multicast listener discovery version2(MLDv2)for IPv6[S].[S.l.]:Network Working Group,2004.
  • 8Company ID list of IEEE[EB/OL].(2011-08-31).http://stand-ards.ieee.org/regauth/oui/oui.txt.
  • 9徐延贵,钱焕延,李华峰.IPv6网络中的路由蠕虫传播模型[J].计算机应用研究,2009,26(10):3918-3921. 被引量:4
  • 10ZOU Chang-chun.The monitoring and early detection of Internet worms[J].IEEE/ACM Trans on Networking,2005,13(5):961-974.

二级参考文献85

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2张运凯,王长广,王方伟,马建峰.“震荡波”蠕虫分析与防范[J].计算机工程,2005,31(18):65-67. 被引量:8
  • 3STANIFORD S, PAXSON V, WEAVER N. How to own the Internet in your spare time[ C]//Proc of the llth USENIX Security Symposium. Berkeley, CA: USENIX Association, 2002: 149-167.
  • 4CERT, CERT/CC advisories [ EB/OL ]. ( 2004- 01- 27 ) [ 2009- 02- 12 ]. http: //www. cert. org/advisories/.
  • 5ZOU Chang-chun, GONG Wei-bo, TOWSLEY D. CodeRed worm propagation modeling and analysis [ C ]//Proc of the 9th ACM Symposium on Computer and Communication Security. New York: ACM Press ,2002 : 138-147.
  • 6ZOU Chang-chun, GONG Wei-bo, TOWSLEY D. On the performance of Internet worm scanning strategies [ R ]. [ S. l. ] : Electrical and Computer Engineering Department, University of Massachusetts, 2003.
  • 7ZOU Chang-chun, GONG Wei-bo, TOWSLEY D. The monitoring and early detection of Internet worms [ J]. IEEE/ACM Trans on Networking, 2005, 13(5) : 961-974.
  • 8STREFTARIS G, GIBSON G J. Statistical inference for stochastic epidemic models[ C l// Proc of the 17th Int'l WOrkshop on Statistical Modelling. 2002 : 609-616.
  • 9FRAUENTHAL J C. Mathematical modeling in epidemiology [ M ]. New York: Springer-Verlag, 1980.
  • 10HINDEN R, DEERING S. RFC 4291, IP version 6 addressing architecture[ S]. 2006.

共引文献26

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部