期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
中国科学技术大学研制出“蠕虫病毒”预警系统
1
《中国民营科技与经济》 2003年第1期118-118,共1页
关键词 中国科学技术大学 “蠕虫病毒” 预警系统 网络安全
下载PDF
什么是“蠕虫”病毒
2
《测绘技术装备》 北大核心 2003年第1期8-8,共1页
'蠕虫'病毒是计算机病毒的一种。它的传染机理是利用网络进行复制和传播,传染途径是通过网络和电子邮件。比如近几年危害很大的'尼姆达'病毒就是'蠕虫'病毒的一种。这一病毒利用了微软视窗操作系统的漏洞,计算... '蠕虫'病毒是计算机病毒的一种。它的传染机理是利用网络进行复制和传播,传染途径是通过网络和电子邮件。比如近几年危害很大的'尼姆达'病毒就是'蠕虫'病毒的一种。这一病毒利用了微软视窗操作系统的漏洞,计算机感染这一病毒后,会不断自动拨号上网,并利用文件中的地址信息或者网络共享进行传播,最终破坏用户的大部分重要数据。 展开更多
关键词 “蠕虫病毒 计算机病毒 传染机理 网络 电子邮件 传染途径 杀毒软件 防治方法
下载PDF
AMD64处理器,“蠕虫”病毒的终极杀手
3
作者 anny 《电脑》 2004年第12期44-44,共1页
关键词 “蠕虫病毒 病毒 木马程序 网络病毒 黑客攻击 AMD64处理器 互联网 在线购物 专家分析 增加
下载PDF
认识病毒知识 确保计算机系统安全
4
作者 刘赣华 曹文梁 《电脑知识与技术》 2006年第8期51-52,共2页
随着电脑的普及和网络的迅猛发展,计算机病毒呈现出愈演愈烈的趋势。目前,病毒已成为困扰计算机系统安全和计算机应用的重要问题。因此了解计算机病毒知识,提高防病毒的意识和能力,对于当前计算机使用人员来说是非常需要的。
关键词 计算机病毒 引导型病毒 文件型病毒 病毒 脚本病毒 “蠕虫病毒 “木马”病毒
下载PDF
“病毒”菜鸟也能制造
5
作者 温鹏 《现代计算机(中旬刊)》 2006年第1期140-140,共1页
夜晚,依然还像往常一样宁静,身为黑客菜鸟的笔者,总想借此机会,寻思着搞出点事端。忙里偷闲之际,正研制着新手从未想过的病毒制造技术,经过一翻如火如荼的实践操作,病毒文件终于生成完毕。然后我便屏住呼吸,紧张地将其运行,发现电脑文... 夜晚,依然还像往常一样宁静,身为黑客菜鸟的笔者,总想借此机会,寻思着搞出点事端。忙里偷闲之际,正研制着新手从未想过的病毒制造技术,经过一翻如火如荼的实践操作,病毒文件终于生成完毕。然后我便屏住呼吸,紧张地将其运行,发现电脑文件有如"蠕虫"病毒一样快速繁殖……这病毒究竟是如何制造的,咱们继续往下看。 展开更多
关键词 病毒文件 制造技术 “蠕虫病毒 电脑文件 黑客
下载PDF
寻找病毒免疫力
6
作者 朱舸 《互联网周刊》 2003年第4期8-9,共2页
敌对情绪和仇视心理。
关键词 病毒免疫力 计算机病毒 “蠕虫病毒 网络安全 计算机网络
下载PDF
PCD病毒小知识
7
《计算机应用文摘》 2003年第5期47-47,共1页
关键词 计算机病毒 “密码”病毒 “蠕虫病毒 文件扩展名
下载PDF
计算机超级病毒疑似攻击伊朗核电站
8
《今日科苑》 2010年第19期9-9,共1页
据英国《每日邮报》9月25日(北京时间)报道,日前,世界上首个网络“超级武器”,一种名为Stuxnet的计算机病毒已经感染了全球超过45000个网络,伊朗遭到的攻击最为严重,60%的个人电脑感染了这种病毒。计算机安防专家认为,该病毒... 据英国《每日邮报》9月25日(北京时间)报道,日前,世界上首个网络“超级武器”,一种名为Stuxnet的计算机病毒已经感染了全球超过45000个网络,伊朗遭到的攻击最为严重,60%的个人电脑感染了这种病毒。计算机安防专家认为,该病毒是有史以来最高端的“蠕虫”病毒,其目的可能是要攻击伊朗的布什尔核电站。 展开更多
关键词 计算机病毒 超级病毒 核电站 伊朗 攻击 “蠕虫病毒 北京时间 超级武器
下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
9
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
下载PDF
Modeling of Malicious Code Propagations in Internet of Things 被引量:2
10
作者 林昭文 苏飞 马严 《China Communications》 SCIE CSCD 2011年第1期79-86,共8页
Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will ex... Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will expand to the Internet of Things. IPv6 is the cornerstone of the Internet of Things. In this paper, we investigate a fast active worm, referred to as topological worm, which can propagate twice to more than three times faster tl^an a traditional scan-based worm. Topological worm spreads over AS-level network topology, making traditional epidemic models invalid for modeling the propagation of it. For this reason, we study topological worm propagation relying on simulations. First, we propose a new complex weighted network mod- el, which represents the real IPv6 AS-level network topology. And then, a new worm propagation model based on the weighted network model is constructed, which descries the topological worm propagation over AS-level network topology. The simulation results verify the topological worm model and demonstrate the effect of parameters on the propagation. 展开更多
关键词 IOT IPV6 worm propagation worm model weighted complex network
下载PDF
Novel IOV worm model and its corresponding hybrid anti-worm strategy in expressway interchange terminal
11
作者 汪峥 钱焕延 +2 位作者 汪婧雅 高嵩 徐延贵 《Journal of Central South University》 SCIE EI CAS 2013年第5期1259-1268,共10页
In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange termina... In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead. 展开更多
关键词 intemet of vehicles worm propagation model hybrid anti-worm strategy EXPRESSWAY interchange terminal
下载PDF
Modeling active worm propagation on the P2P network
12
作者 吴国政 Feng Chaosheng Zhlguang Qin 《High Technology Letters》 EI CAS 2012年第4期406-411,共6页
This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on... This paper analyzes the characteristics of the Peer-to-Peer (P2P) active worm and its attacking mechanism, and then proposes a mathematical model of propagation of the P2P active worm applying Epidemiology. Based on the analysis on the protocols of realistic P2P systems, a software which can be used to simulate the P2P network environment and the propagation of P2P active worm is imple- mented in this paper. A large number of simulation experiments are performed using the developed simulation software. The results from these simulation experiments validate the proposed model, which means that the model can be used to analyze the spreading behaviors of the P2P active worm and predict its trend. 展开更多
关键词 active worms Peer-to-Peer (P2P) networks MODELING simulations
下载PDF
MULTI-AGENT SYSTEM FOR WORM DETECTION AND CONTAINMENT IN METROPOLITAN AREA NETWORKS
13
作者 Gou Xiantai Jin Weidong Zhao Duo 《Journal of Electronics(China)》 2006年第2期259-265,共7页
Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated th... Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms. 展开更多
关键词 Multi-agent system Worm detection Worm containment Metropolitan area networks
下载PDF
数字
14
《计算机安全》 2010年第10期103-103,共1页
45000个 世界上首个网络“超级武器”,一种名为Stuxnet的计算机病毒已经感染了全球超过45000个网络,伊朗遭到的攻击最为严重,60%的个人电脑感染了这种病毒。计算机安防专家认为,该病毒是有史以来最高端的“蠕虫”病毒,其目的可... 45000个 世界上首个网络“超级武器”,一种名为Stuxnet的计算机病毒已经感染了全球超过45000个网络,伊朗遭到的攻击最为严重,60%的个人电脑感染了这种病毒。计算机安防专家认为,该病毒是有史以来最高端的“蠕虫”病毒,其目的可能是要攻击伊朗的布什尔核电站。 展开更多
关键词 计算机病毒 “蠕虫病毒 超级武器 个人电脑 核电站 网络 感染 攻击
下载PDF
关端口打补丁非上策 网络安全意识须超前
15
《中国传媒科技》 2003年第3期50-50,共1页
虽然春节前“蠕虫”病毒攻击互联网事件发生后不久就得到了有效的控制,但这起事件却给我们提了个醒,这就是网络安全防护技术还需要大力加强,并同时在预防网络潜在攻击上要有超前意识。这次病毒攻击互联网的事件中还呈现出了两个新的特点... 虽然春节前“蠕虫”病毒攻击互联网事件发生后不久就得到了有效的控制,但这起事件却给我们提了个醒,这就是网络安全防护技术还需要大力加强,并同时在预防网络潜在攻击上要有超前意识。这次病毒攻击互联网的事件中还呈现出了两个新的特点,一是并没有使用微软软件及其相关产品的网络公司同样也不能幸免于难。许多担当网络传输卫士的交换机和路由器也被调换了程序,从而使“蠕虫”病毒能够畅通无阻地去堵塞正常的网络传输。二是扩散方式也很独特。 展开更多
关键词 网络安全防护 超前意识 “蠕虫病毒 扩散方式
下载PDF
筑起一道马其诺防线
16
作者 张鸣 《电脑时空》 2001年第9期60-61,共2页
关键词 计算机病毒 “蠕虫病毒” 防范 网络安全
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部