期刊文献+

P2P网络中被动型蠕虫传播与免疫建模 被引量:8

Modeling Propagation and Immunization of Passive Wormsin Peer-to-Peer Networks
下载PDF
导出
摘要 鉴于被动型蠕虫的危害性,对被动型蠕虫进行了深入分析,进而基于平均场法建立了被动型蠕虫的传播模型和免疫模型.基于传播模型和流行病传播学理论推导出进入无蠕虫平衡状态的充分条件,仿真实验证明了该充分条件的正确性.另外,仿真实验还表明,下载率和恢复率是控制蠕虫传播的两个可控的关键参数.在免疫软件被编制出来前,降低下载率和提高恢复率能有效控制被动型蠕虫的传播. In this paper,we identified the features of passive worm.Further the models of propagation and immunization of passive worms are proposed in the mean-field methods.Based on the model of worm propagation and Epidemiology,the sufficient condition for the global stability of the worm free equilibrium is deduced.Simulations validate the condition.Both the sufficient condition and all the experiment results show that amongst all P2P-related factors having effect on passive wormpropagation,attack performance of passive worms is most sensitive to two P2P system parameters:the download rate and the recovery rate.Controlling the two parameters,i.e.decreasing the download rate and increasing the recovery rate,provides an effective means for throttling the spread of passive worms.
出处 《电子学报》 EI CAS CSCD 北大核心 2013年第5期884-889,共6页 Acta Electronica Sinica
基金 国家科技重大专项课题(No.2011ZX03002-002-03) 国家自然科学基金(No.60873075) 可视化计算与虚拟现实四川省重点实验室课题(No.PJ2012002) 广东省产学研重点项目(No.2012B091000054)
关键词 被动型蠕虫 P2P文件共享网 传播 免疫 建模 仿真 passive worms P2P networks propagation immunization modeling Simulations
  • 相关文献

参考文献19

  • 1夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 2Chen G,Gray R S.Simulating non-scanning worms on peer-topeer networks[A].Proc of the 1st Int Conf on Scalable Information Systems[C].Hong Kong:ACM,2006.
  • 3Zhou L,Zhang L,McSherry F,et al.A first look at peer-topeer worms:Threats and defenses[A].Proc of the 4th Int Workshop on Peer-to-Peer Systems[C].New York:Springer,2005.24-35.
  • 4Nassima K,Yannick C,Nazim A.The emerging threat of peerto-peer worms[A].Proc of IEEE / IST Workshop on Monitoring,Attack Detection and Mitigation[C].Tubingen,Germany:IEEE,2006.18-20.
  • 5Frauenthal J C.Mathematical Modeling in Epidemiology[M].New York:Springer,1980.
  • 6Driessche P,Watmough J.Reproduction numbers and subthreshold endemic equilibria for compartmental models of disease transmission[J].Mathematical Biosciences,2002,180:29.
  • 7Amio J,Davis J,Hartley D,et al.A multi-species epidemic model with spatial dynamics[J].Mathematical Medicine and Biology,2005.
  • 8Diekmann O,Heesterbeek J A P.Mathematical Epidemiology of Infectious Diseases:Model Builind,Analysis and Interpretation[M].Wiley,1999.
  • 9Thommes R W,Coates M J.Modeling Virus Propagation in Peer-to-Peer Networks[R].Montreal,Canada:Department of Electrical and Computer Engineering,McGill University,2005.
  • 10Murray W H.The application of epidemiology to computer viruses[J].Computers and Security,1988,7:130-150.

二级参考文献46

  • 1P Barford and M Blodgett. Toward Botnet Mesocosms[A]. In Proc. USENIX HotBots'07[C] .6 - 6.
  • 2J B Grizzard, V Sharma, C Nunnery, B B Kang and D Dagon. Peer-to-Peer Botnets: Overview and Case Study[A]. In Proc. USENIX HotBots' 07[ C]. 1-1.
  • 3P Wang, S Sparks and C Zou. An Advanced Hybrid Peer-to- Peer Botnet [ A]. In Proc. USENIX HotBots' 07 E C ]. 2 - 2.
  • 4R Vogt, J Aycock and M Jacobson. Army of Botnets[A]. In Proc. NDSS' 07 [ C]. 2007.111 - 123.
  • 5Y Pryadkin, R Lindell, J Bannister and R Govindan. An Empirical Evaluation of IP Address Space Occupancy [ R]. ISITR-2004 - 598,2004.
  • 6Z Chen and C Ji. Optimal worm-scanning method using vulnerable-host distributions[ J]. International Journal of Security and Networks, 2007,2(1/2) : 71 - 80.
  • 7Y Xie, F Yu, K Achan, E Gillum, M Goldszmidt and T Wobber. How Dynamic are IP Addresses? [ J]. Comput. Commun. Rev. ,2007,37(4) :301 - 312.
  • 8J B Horrigan and A Smith. Home Broadband Adoption 2007 [OL ]. http://www, pewintemet, org/pdfs/PIP_ Broadband 2007. pdf, 2007.
  • 9D Stutzbach and R Rejaie. Understanding churn in peer-to- peer networks [ A 3. In Proc. ACM IMC' 06 [ C ]. 2006. 189 - 202.
  • 10J M Kleinberg. Navigation in a small world[J ]. Nature, 2000, 406(6798) : 845.

共引文献46

同被引文献62

  • 1http://www, reuters, com/article/2013/04/23/net-us-usa- whitehouse-ap-idUSBRE93M12Y20130423[ EB/OL ]. 2013- 04-30.
  • 2Zhang W, Ye Y Q, Tan H L, et al. Information Diffusion Mod- el Based on Social Networkl A1. Proceedings of MCSA 2012 [ C] .Bremen: Springer Berlin Heidelberg,2012.145 - 150.
  • 3Xu B, Liu L. Information diffusion through online social net- work s[A ]. Proceedings of ICEMMS 2010 [ C ]. New York: IEEE Press,2010.53 - 56.
  • 4Zhao L J, Wang J J, Chen Y C, et al. SIHR rumor spreading model in social networks[ J ]. Physica A: Statistical Mechanics and its Applications,2012,391 (7) :2444- 2453.
  • 5Zhang B B,Guan X H,Khan M J,et al.A time-varying propa- gation model of hot topic on BBS sites and Blog networks [ J]. Information Sciences,2012,187(15) : 15 - 32.
  • 6Xu R Z,Li HL,Xing C M. Research on information dissemi- nation model for social networking services[ J ]. International Journal of Computer Science and Appfication,2013,2( 1 ) : 1 - 6.
  • 7Anderson R, May R. Infectious Diseases of Humans: Dynam- ics and Control[ M ]. Oxford University Press: Oxford, 1991.
  • 8Fn F, Chen X J, Liu L H, et al. Promotion of cooperation in- duced by the interplay between structure and game dynamics [ J]. Physica A,2007,383(2007) :651 - 659.
  • 9刘烃,郑庆华,管晓宏,屈宇,王娜.基于随机实验的蠕虫传播预测研究[J].通信学报,2007,28(12):72-77. 被引量:1
  • 10SPAFFORD E H. The Intemet Worm Program: an Analysis[R]. Technical Report, CSD-TR-823, West Lafayette: Department of Computer Science, Purdue University, 1988. 1-29.

引证文献8

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部