期刊文献+

邮件蠕虫传播与防御行为模型与分析

Model and Analysis Based on Propagation and Defensive Behavior of Email Worm
下载PDF
导出
摘要 邮件蠕虫的传播问题是当前网络安全研究的一个重要方面,也是探索邮件蠕虫防御策略的必要环节。引进随机博弈网对邮件蠕虫的传播行为进行支持量化计算的可扩展图形化方法建模,并基于该模型提出了求解模型均衡策略的算法。依据该算法进一步提出了蠕虫扩散性行为分析指标的量化计算方法,并进行了对比分析,讨论了在不同传播策略下感染率和平均感染时间的变化。最后探讨了各种防御策略对邮件蠕虫传播产生的影响。 Email worm propagation is a significant aspect of network security research nowadays, and also is essential to explore defensive strategies of email worm. A graphical modeling description method (Stochastic Game Nets) that supported quantitative mathematical calculation was introduced, and according to the practical model, an algorithm was proposed for solving the equilibrium strategy. Then the quantitative calculation method of worm propagation behavior analysis indicators were.further proposed based on the algorithm, taking a comparative analysis, and also the variety of the infection rate and the average infection time were discussed with different strategies. Finally, a variety of defensive strategies on the impact of email worm propagation was discussed.
出处 《系统仿真学报》 CAS CSCD 北大核心 2012年第12期2424-2430,共7页 Journal of System Simulation
基金 国家自然科学基金项目(61173008 60803123 60932003 60873193 60933005) 863计划(2012AA011003)
关键词 随机博弈网 邮件蠕虫传播与防御 安全分析 纳什均衡 stochastic game nets email worm propagation and defense security analysis Nash equilibrium
  • 相关文献

参考文献15

  • 1C C Zou, D Towsley, W Gong. Modeling and Simulation Study of the Propagation and Defense of Interact Email Worm [J]. IEEE Transactions on Dependable and Secure Computing (S1545-5971), 2007, 4(2): 105-118.
  • 2W Yu, X Wang, P Calyam, et al. Modeling and Detection of Camouflaging Worm [J]. IEEE Transactions on Dependable and Secure Computing (S1545-5971), 2011, 3(8): 377-390.
  • 3国家互联网应急中心,“CERT/CCAdvisories,”2005.[EB/OL].(2005-2)[2011-7].http://www.cert.org/advisories/.
  • 4M Newman, S Forest, J Balthrop. Email networks and the spread of computer viruses [J]. Phys. Rev. E ($1539-3755), 2002, 66(3): 35-101.
  • 5Romualdo Pastor-Satorras, Alessandro Vespignani. Epidemic spreading in scale-free networks [J]. Phys. Rev. Lett (S0013-9007), 2001, 86(14): 3200-3203.
  • 6Herbert W Hethcote. The mathematics of infectious diseases [J]. SIAM Review (S0036-1445), 2000, 42(4): 599-653.
  • 7Jianxiong Wan, Chuang Lin, Xin Chela, Kun Meng, Yuanzhuo Wang. Performance Analysis of Channel Contention in Wireless Ad Hoe Networks: A Stochastic Game Nets Approach [C]// IEEE Global Communications Conference, 2010. USA: IEEE, 2010.
  • 8C Lin, Y Z Wang, Y Wang. A Stochastic Game Nets Based Approach for Network Security Analysis [C]// Proc. of the 29th International Conference on Application and Theory of Petri Nets and other Models of Con-currancy, Concurrency Methods: Issues and Applications 2008 Workshop (Invited paper). USA: Springer, 2008: 21-33.
  • 9Y Z Wang, C Lin, Y Wang, K Meng. Security Analysis of Enterprise Network Based on Stochastic Game Nets Model [C]// ICC 109 Communica-tion and Information Systems Security Symposium. USA: IEEE, 2009: 1-5.
  • 10Y Z Wang, C Lin, K Meng. Security Analysis of Online Banking Sys-tem Using Hierarchical Stochastic Game Nets Model [C]// GLOBALCOM '09. USA: IEEE, 2009:1181-1186.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部