期刊文献+

基于加权网络的僵尸网络传播模型研究 被引量:1

STUDY ON PROPAGATION MODEL OF BOTNET BASED ON WEIGHTED NETWORKS
下载PDF
导出
摘要 主要研究不同网络拓扑下的僵尸网络Botnet传播行为,重点研究基于两种加权网络下的僵尸网络传播特性。基于经典加权网络(BBV网络)的演化规则,在随机权重的基础上,提出随机增量的加权演化模型;通过模型仿真,发现基于随机加权的网络与其它两种网络拓扑下僵尸网络相比,表现出更强的健壮性,这与建模时的理论分析完全一致。仿真结果表明,与无标度网络下的传播模型相比,基于加权网络的传播模型更符合僵尸网络在实际网络中的传播特性。 In this paper, we mainly study the propagation behaviour of botnet based on different network topologies, the emphasis is put on studying the propagation characteristics of hornet based on two kinds of weighted networks. According to the classic weighted network the BBV network, we propose the weighted evolution model of random incremental which is on the basis of random weights. Through the model simulation, we find the network based on random weighting shows higher robustness compared with the botnet based on other two kinds of net- works topologies, and this is in good agreement with the theory analysis when modelling. Simulation result demonstrates, comparing with the propagation model of hornet based on scale-free network, the model based on weighted networks is more in accord with the propagation charac- teristics of a botnet in actual networks.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第7期180-184,共5页 Computer Applications and Software
基金 河南省教育厅自然科学研究计划项目(2011C20019)
关键词 加权网络 僵尸网络 拓扑结构 传播特性 Weighted networks Botnet Topologic structure Propagation characteristics
  • 相关文献

参考文献14

  • 1Egghead. Eggdrop[ OL]. 2004. http://www. eggheads. org/.
  • 2Barford P, Yegneswaran V. An Inside Look at Botnets [ C ]//Proceedings of the Special Workshop on Malware Detection, Advances in Information Security ,2006.
  • 3Arce I, Levy L. An Analysis of the Slapper Worm [ J ]. IEEE Security and Privacy ,2003, 1 ( 1 ) :82 - 87.
  • 4Lurhq Threat Intelligence Group. Bobax Trojan Analysis[ EB/OL]. http ://www. lurhq. com/bobax. html.
  • 5Zou C C, Gong W,Towsley D. Code red Worm propagation modeling and analysis[ C]//Afluri V. Proc. of the 9th ACM Conf. on Computer and Communications Seeurity ( CCS 2002 ). New York : ACM Press, 2002 : 138 - 147.
  • 6Kim J, Radhakrishnan S, DhaU SK. Measurement and analysis of worm propagation on lntemet network topology [ C ]//Proc. of the IEEE Int'Conf. on Computer Communieations and Networks (ICCCN 2004). 2004:495 - 500.
  • 7Zou C C, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense[ C ]//Staniford S. Proc. ofthe ACM CCS Workshop on Rapid Malcode ( WORM 2003 ). New York: ACM Press,2003:51 - 60.
  • 8Dagon D,Zou C C,Lee W.,Modeling botnet propagation using time zones [ C]//Proc. of the 13th Annual Network and Distributed System Security Syrup,( NDSS 2006) ,2006.
  • 9Runheng Li, Liang Gan, Yan Jia. Propagation Model for Botnet Based on Confieker Monitoring [ C ]//Proc. of 2009 Second International Symposium on Information Seience and Engineering(ISISE) ,2009.
  • 10Wang Xinliang, Chen Luying, Liu Fang, et al. Analysis and Modeling of the Botnet Propagation Characteristics[ C ]//Proc. of 6th International Conference on Wireless Communications Networking and Mobile Computing(WiCOM) ,2010.

二级参考文献24

  • 1孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 2BARABASI A L, ALBERT R. Emergence of scaling in random net- works[J]. Science,1999,286(5439) :509-512.
  • 3WATTS D J, STROGATZ S H. Collective dynamics of "small-world" networks [ J ]. Letters to Nature, 1998,393 (6684) :440-442.
  • 4LIU Li-juan. Research on dyoamie networking of scale-free network [ D]. Harbin :Harbin Institute of Technology,2007.
  • 5ZHENG Hong, WU Li-fa, WANG Yuan-yuan. Three worm propagation models to establish scale-free worm network [ J]. Journal of dJlin Uni- versity: Engineering and Techology Edition ,2008, 38 (5).
  • 6GUO Hong-gang, FANG Yang. On current situation an harm of botnet crime [ D ]. Shijiazhuang : Hebei Normal University,2008.
  • 7http ://www. isc. org. cn/20020417/ca290326, htm[ EB/OL].
  • 8STREFTARIS G, GIBSON G J. Statistical inference for stochastic epi- demic models[ C]//Proc of the 17th IWSM. 2002:609-616.
  • 9FRAUENTHAL J C. Mathematical modeling in epidemiology [ M ]. New York : Springer-Verlag, 1980.
  • 10ZOU C C, GONG W, TOWSLEY D. Worm propagation modeling and analysis under dynamic quarantine defense [ C ]//Proc of ACM CCS Workshop on Rapid Malcode. 2003:51-61.

共引文献4

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部