Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For...Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.展开更多
The Guanshan Biota from the Cambrian Stage 4 Wulongqing Formation is a typical Burgess-shale type Lagerst?tte that had witnessed the Cambrian explosion. Here we report two new localities of the Guanshan Biota, which ...The Guanshan Biota from the Cambrian Stage 4 Wulongqing Formation is a typical Burgess-shale type Lagerst?tte that had witnessed the Cambrian explosion. Here we report two new localities of the Guanshan Biota, which is located at Baimei village, south of Kunming and Xinglong village, Wuding County, Yunnan Province respectively. Both localities produce soft-body fossils and several new taxa, e.g. a new species of palaeoscolecidans (Palaeoscolex xinglongensis sp. nov.) reported herein. The comparative study of the new species with similar form not only indicates that there is a diversification of palaeoscolecid species in Guanshan Biota, but also strengthens the ties between the older Chengjiang Biota and the younger Kaili Biota (and also the coeval Burgess Shale community). Three paleoecological features, including high diversity, little disparity and richness of palaeoscolecid worms, are summarized as a case study to represent the differences between Guanshan and Chengjiang Biota.展开更多
In this paper, we study worm dynamics in computer networks composed of many autonomous systems. A novel multigroup SIQR (susceptible-infected-quarantined-removed) model is proposed for computer worms by explicitly c...In this paper, we study worm dynamics in computer networks composed of many autonomous systems. A novel multigroup SIQR (susceptible-infected-quarantined-removed) model is proposed for computer worms by explicitly considering anti-virus measures and the network infrastructure. Then, the basic reproduction number of worm R0 is derived and the global dynamics of the model are established. It is shown that if R0 is less than or equal to 1, the disease-free equilibrium is globally asymptotically stable and the worm dies out eventually, whereas, if R0 is greater than 1, one unique endemic equilibrium exists and it is globally asymptotically stable, thus the worm persists in the network. Finally, numerical simulations are given to illustrate the theoretical results.展开更多
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in...Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.展开更多
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o...Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network.展开更多
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ...Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.展开更多
Viruses and worms have become so common that most computer users now accept them as a fact of life.This paper introduces the definitions and difference of the computer viruses and worms.Some main research problems abo...Viruses and worms have become so common that most computer users now accept them as a fact of life.This paper introduces the definitions and difference of the computer viruses and worms.Some main research problems about the computer viruses and worms in recent years are also summarized and discussed in detail.Finally the developing trend of the computer virus and worms is proposed.展开更多
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ...With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.展开更多
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i...Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.展开更多
The aim of the present study was to evaluate the efficacy of two commercial pour-on ivermectin formulations against intestinal parasites (IP), fleas and lice in naturally infested stray dogs. Eighteen crossbreed dogs ...The aim of the present study was to evaluate the efficacy of two commercial pour-on ivermectin formulations against intestinal parasites (IP), fleas and lice in naturally infested stray dogs. Eighteen crossbreed dogs with eggs of IP as well as adult fleas and lice were included in the trial. On day 0, the dogs were randomly divided into 3 groups of 6 animals each: a group receiving a single pour-on treatment with 0.5% ivermectin (500 mcg/kg), a group treated similarly with 0.2% iver-mectin (200 mg/kg), and a control group. Fecal and skin analyses were carried out on days 0, 7, 14, 21 and 28 to determine the reduction of eggs and the number of fleas and lice. Weight gain was also measured on day 28. On day 30, the dogs were humanely sacrificed in order to count adult IP. Efficacy was measured as the percentage of the reduction of eggs per gram fecal mass (EPGF), of adult IP, fleas and lice relative to the control group. For the eggs of IP, ivermectin at 0.5% showed an efficacy of 100% against ascarids and 79% against Ancylostoma caninum. ivermectin at 0.2% removed 90.2% of the ascarids and 50.4% of A. caninum. For adult IP, the efficacy of 0.5% iver-mectin against Toxocara canis and A. caninum was 100%, and for 0.2% ivermectin it was 62.4% and 76.4% for T. canis and A. caninum, respectively. Both compounds were 100% effective against lice and 96% and 71.1% efficacious against fleas, respectively. However, neither treatment was effective against Dypilidium caninum. Weight gain in treated dogs was statistically different from that of the controls (p < 0.05). We concluded that 0.5% pour-on ivermectin showed better efficacy than 0.2% pour-on ivermectin in the reduction of eggs and adult intestinal parasites and fleas;it was similarly efficacious against lice.展开更多
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give...Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.展开更多
基金supported by the Natural Science Foundation under Grant No.61962009Major Scientific and Technological Special Project of Guizhou Province under Grant No.20183001Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant No.2018BDKFJJ003,2018BDKFJJ005 and 2019BDKFJJ009.
文摘Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
基金financially supported by the 973 Project of the Ministry of Science and Technology of China(Grant 2013CB837100)the National Natural Science Foundation of China(Grant 41222014,41172023,41621003,41102012)+4 种基金the National Program for Support of Top-notch Young Professionalsfinancial support from the Ministry of Education of China for Changjiang Scholarthe Program of Introducing Talents of Discipline to Universities(P201102007,W20136100061)Shaanxi Bureau of Science and Technology(FJ11366)Young Talents of Northwest University
文摘The Guanshan Biota from the Cambrian Stage 4 Wulongqing Formation is a typical Burgess-shale type Lagerst?tte that had witnessed the Cambrian explosion. Here we report two new localities of the Guanshan Biota, which is located at Baimei village, south of Kunming and Xinglong village, Wuding County, Yunnan Province respectively. Both localities produce soft-body fossils and several new taxa, e.g. a new species of palaeoscolecidans (Palaeoscolex xinglongensis sp. nov.) reported herein. The comparative study of the new species with similar form not only indicates that there is a diversification of palaeoscolecid species in Guanshan Biota, but also strengthens the ties between the older Chengjiang Biota and the younger Kaili Biota (and also the coeval Burgess Shale community). Three paleoecological features, including high diversity, little disparity and richness of palaeoscolecid worms, are summarized as a case study to represent the differences between Guanshan and Chengjiang Biota.
基金Project supported by the Natural Science Foundation of Jiangsu Province, China (Grant No. BK2010526)the Six Projects Sponsoring Talent Summits of Jiangsu Province, China (Grant No. SJ209006)+2 种基金the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20103223110003)the Ministry of Education Research in the Humanities and Social Sciences Planning Fund of China (Grant No. 12YJAZH120)the Graduate Student Innovation Research Project of Jiangsu Province, China (Grant Nos. CXLX11 0417 and CXLX11 0404)
文摘In this paper, we study worm dynamics in computer networks composed of many autonomous systems. A novel multigroup SIQR (susceptible-infected-quarantined-removed) model is proposed for computer worms by explicitly considering anti-virus measures and the network infrastructure. Then, the basic reproduction number of worm R0 is derived and the global dynamics of the model are established. It is shown that if R0 is less than or equal to 1, the disease-free equilibrium is globally asymptotically stable and the worm dies out eventually, whereas, if R0 is greater than 1, one unique endemic equilibrium exists and it is globally asymptotically stable, thus the worm persists in the network. Finally, numerical simulations are given to illustrate the theoretical results.
基金Supported by the National Natural Science Foundation of China (60573136)
文摘Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.
基金supported by the National Natural Science Foundation of China under Grant No. 60873075
文摘Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network.
基金National Natural Science Foundation of China (No.60633020 and No. 90204012)Natural Science Foundation of Hebei Province (No. F2006000177)
文摘Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
基金Supported by the National Natural Science Foundation of China under Grant No.60373087,60473023,90104005
文摘Viruses and worms have become so common that most computer users now accept them as a fact of life.This paper introduces the definitions and difference of the computer viruses and worms.Some main research problems about the computer viruses and worms in recent years are also summarized and discussed in detail.Finally the developing trend of the computer virus and worms is proposed.
基金supported by the National Natural Science Foundation of China under Grant No. 60873075
文摘With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.
基金supported by Fundamental Research Funds of the Central Universities under Grant no. N120317001 and N100704001Program for New Century Excellent Talents in University (NCET13-0113)+1 种基金Natural Science Foundation of Liaoning Province of China under Grant no. 201202059Program for Liaoning Excellent Talents in University under LR2013011
文摘Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.
文摘The aim of the present study was to evaluate the efficacy of two commercial pour-on ivermectin formulations against intestinal parasites (IP), fleas and lice in naturally infested stray dogs. Eighteen crossbreed dogs with eggs of IP as well as adult fleas and lice were included in the trial. On day 0, the dogs were randomly divided into 3 groups of 6 animals each: a group receiving a single pour-on treatment with 0.5% ivermectin (500 mcg/kg), a group treated similarly with 0.2% iver-mectin (200 mg/kg), and a control group. Fecal and skin analyses were carried out on days 0, 7, 14, 21 and 28 to determine the reduction of eggs and the number of fleas and lice. Weight gain was also measured on day 28. On day 30, the dogs were humanely sacrificed in order to count adult IP. Efficacy was measured as the percentage of the reduction of eggs per gram fecal mass (EPGF), of adult IP, fleas and lice relative to the control group. For the eggs of IP, ivermectin at 0.5% showed an efficacy of 100% against ascarids and 79% against Ancylostoma caninum. ivermectin at 0.2% removed 90.2% of the ascarids and 50.4% of A. caninum. For adult IP, the efficacy of 0.5% iver-mectin against Toxocara canis and A. caninum was 100%, and for 0.2% ivermectin it was 62.4% and 76.4% for T. canis and A. caninum, respectively. Both compounds were 100% effective against lice and 96% and 71.1% efficacious against fleas, respectively. However, neither treatment was effective against Dypilidium caninum. Weight gain in treated dogs was statistically different from that of the controls (p < 0.05). We concluded that 0.5% pour-on ivermectin showed better efficacy than 0.2% pour-on ivermectin in the reduction of eggs and adult intestinal parasites and fleas;it was similarly efficacious against lice.
基金supported by the Research Fund for the National Committee of China under Grant No. 05XN09
文摘Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.