期刊文献+

基于社区的移动互联网混合蠕虫双向反馈遏制系统 被引量:2

Community-Based Bidirectional Feedback System for Hybrid Worm Containment in Mobile Internet
下载PDF
导出
摘要 针对现有的蠕虫遏制方案无法应对移动互联网长短距混合蠕虫攻击这一问题,提出一种基于社区的移动互联网混合蠕虫双向反馈遏制系统.该系统分为社会信息网络(social information networks,SIN)遏制单元和地理信息网络(geographic information networks,GIN)反馈单元2个子系统,SIN遏制单元采用一种在线式社区隔离策略,通过识别社区间的门禁节点并设计相应的蠕虫标签投送算法,将蠕虫遏制在社区内部;GIN反馈单元收集用户的短程通信记录、GPS位置数据以及来自SIN遏制单元提交的历史安全信息,实现对节点的信任性评估,通过将结果反馈到SIN遏制单元,限制社区内部节点的下一步通信决定,从而降低蠕虫在社区内部的传播速度,实现了SIN遏制单元和GIN反馈单元的双向循环.最后通过仿真实验验证了所提方法的可行性和有效性. Aimi Internet worm Internet mixed consists of SIN ng at the problem that the existing worm containment methods can't reply the mobile attack which mixes long-range and short range attack, this paper proposes a mobile worm bidirectional feedback and containment system based on community. The system networks) feedb (social information networks) containment unit and GIN (geographic information ack unit. The SIN containment unit is a type of online community quarantine strategy, which contains worms within the community by identifying the access nodes between communities and designing the corresponding worm label delivery algorithm. The GIN feedback unit collects the users' short range communication records, GPS location data and the historical security information committed by SIN to realize the trust-assessment. Through feeding back the results to SIN containment unit, the GIN limits the next communication decisions of community internal nodes, accordingly reduces the spreading speed of worms inside the community and realizes the bi-directional loop between the SIN containment unit and GIN feedback unit. Simulation experiments have proved that the method proposed by this paper has feasibility and effectiveness.
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第2期311-324,共14页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61073041 61073043 61202274 61370083) 教育部高等学校博士学科点专项科研基金项目(20112304110011 20122304110012)
关键词 移动互联网 混合蠕虫遏制 蠕虫建模 社区隔离策略 信任性评估 mobile Internet hybrid worm containment worm modeling community quarantinestrategy trust assessment
  • 相关文献

参考文献21

  • 1Su J,Chan K K W,Miklas A G. A preliminary investigation of worm infections in a bluetooth environment[A].New York:ACM,2006.9-16.
  • 2Yan G,Eidenbenz S. Modeling propagation dynamics of bluetooth worms[J].IEEE Trans on Mobile Computing,2009,(3):353-368.
  • 3Zyba G,Voelker G M,Liljenstam M. Defending mobile phones from proximity malware[A].Piscataway,NJ:IEEE,2009.1503-1511.
  • 4Yang Y,Zhu S,Cao G. Improving sensor network immunity under worm attacks:A software diversity approach[A].New York:ACM,2008.149-158.
  • 5Mickens J W,Noble B D. Modeling epidemic spreading in mobile environments[A].New York:ACM,2005.77-86.
  • 6Miklas A G,Gollu K K,Chan K K W. Exploiting social interactions in mobile systems[A].{H}Berlin:Springer-Verlag,2007.409-428.
  • 7Li F,Yang Y,Wu J. CPMC:An efficient proximity malware coping scheme in smartphone-based mobile networks[A].Piscataway,NJ:IEEE,2010.1-9.
  • 8卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. 被引量:17
  • 9Fleizach C,Liljenstam M,Johansson P. Can you infect me now?:Malware propagation in mobile phone networks[A].New York:ACM,2007.61-68.
  • 10Meng X,Zerfos P,Samanta V. Analysis of the reliability of a nationwide short message service[A].Piscataway,NJ:IEEE,2007.1811-1819.

二级参考文献104

  • 1Hindocha N, Chien E. Malicious threats and vulnerabilities in instant messaging. 2005. http://www.symantec.com/avcenter/reference/malicious.threats.instant.messaging.pdf
  • 2IMlogic Threat Center. 2005 real-time communication security: The year in review. 2005. http://www.imlogic.com/pdf/2005ThreatCenter_report.pdf
  • 3CN/CERT. CN/CERT China Network Security Research Annual Report. 2005. http://www.hais.org.cn/doc/2005CNCERTCC AnnualReport_Chinese.pdf
  • 4Nazario J, Anderson J, Wash R, Connelly C. The future of Internet worms. Blackhat Briefings, 2001. http://www.crimelabs.net/does/worm.html
  • 5Zheng H. Intemet worm research [Ph.D. Thesis]. Tianjin: Nankai University, 2003 (in Chinese with English abstract).
  • 6Messenger APIs. http://msdn.microsoft.corn/downloads/list/messengerapi.asp
  • 7ICQ APIs. http://www.icq.com/api/
  • 8W32.Choke.Worm. http://securityresponse.symantec.com/avcenter/venc/data/w32.choke.worm.html
  • 9W32.Goner.A@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.goner.a@mm.html
  • 10W32.Aim Ven@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32.aimven.worm.html

共引文献87

同被引文献32

  • 1Wang Y,Wen S,Xiang Y,et al.Modeling the propagation of worms in networks:a survey.IEEE Communications Surveys and Tutorials,2014,16(2):942-960.
  • 2Gao H,Hu J,Huang T,et al.Security issues in online social networks.IEEE Internet Computing,2011,15(4):56-63.
  • 3Makridakis A,Athanasopoulos E,Antonatos S,et al.Understanding the behavior of malicious applications in social networks.IEEE Network,2010,24(5):14-19.
  • 4Chen J,Kiremire A R,Brust M R,et al.Modeling online social network users’profile attribute disclosure behavior from a game theoretic perspective.Computer Communications,2014(49):18-32.
  • 5Bose A,Shin K G.Agent-based modeling of malware dynamics in heterogeneous environments.Security and Communication Networks,2013,6(12):1576-1589.
  • 6Faghani M R,Nguyen U T.A study of xss worm propagation and detection mechanisms in online social networks.IEEE Transactions on Information Forensics and Security,2013,8(11):1815-1826.
  • 7Sanzgiri A,Hughes A,Upadhyaya S.Analysis of malware propagation in Twitter.Proceedings of the IEEE Symposium on Reliable Distributed Systems,Braga,Portugal,2013:195-204.
  • 8Feng L,Liao X,Han Q,et al.Dynamical analysis and control strategies on malware propagation model.Applied Mathematical Modeling,2013,37(16-17):8225-8236.
  • 9Khosroshahy M,Mehmet Ali M K,Qiu D.The SIC botnet lifecycle model:a step beyond traditional epidemiological models.Computer Networks,2013,57(2):404-421.
  • 10Adu-Gyamfi D,Wang Y,Zhang F,et al.A model for spreading behavior of passive worms in mobile social networks.Journal of Computational Information Systems,2014,10(7):2667-2675.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部