期刊文献+
共找到316篇文章
< 1 2 16 >
每页显示 20 50 100
An Immunization Strategy for Social Network Worms Based on Network Vertex Influence
1
作者 YANG Wei WANG Haibo YAO Yu 《China Communications》 SCIE CSCD 2015年第7期154-166,共13页
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i... Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms. 展开更多
关键词 网络蠕虫 免疫策略 社会网络 顶点 软件漏洞 传播模型 网络管理员 网络安全
下载PDF
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation 被引量:3
2
作者 YANGFengt DUANHaixin LIxing 《Science in China(Series F)》 2005年第1期91-106,共16页
关键词 SIAR model ordinary differential equations network worm propagation BLASTER Nachi.
原文传递
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
3
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 网络安全 蠕虫病毒 计算技术 防治措施
下载PDF
Epidemiological modeling of passive worm propagation on the P2P file-sharing network
4
作者 Feng Chaosheng Qin Zhiguang +1 位作者 Laurissa Tokarchuk Muhammad Adeel 《High Technology Letters》 EI CAS 2011年第3期230-235,共6页
关键词 P2P网络 蠕虫传播 共享网络 传播模型 流行病学 文件 动态特性 数学模型
下载PDF
Modeling active worm propagation on the P2P network
5
作者 吴国政 Feng Chaosheng Zhlguang Qin 《High Technology Letters》 EI CAS 2012年第4期406-411,共6页
关键词 P2P网络 传播模型 蠕虫病毒 仿真软件 模拟实验 P2P系统 蠕虫攻击 对等网络
下载PDF
MULTI-AGENT SYSTEM FOR WORM DETECTION AND CONTAINMENT IN METROPOLITAN AREA NETWORKS
6
作者 Gou Xiantai Jin Weidong Zhao Duo 《Journal of Electronics(China)》 2006年第2期259-265,共7页
Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated th... Active worms can cause widespread damages at so high a speed that effectively precludes human-directed reaction, and patches for the worms are always available after the damages have been caused, which has elevated them self to a first-class security threat to Metropolitan Area Networks (MAN). Multi-agent system for Worm Detection and Containment in MAN (MWDCM) is presented to provide a first-class automatic reaction mechanism that automatically applies containment strategies to block the propagation of the worms and to protect MAN against worm scan that wastes a lot of network bandwidth and crashes the routers. Its user agent is used to detect the known worms. Worm detection agent and worm detection correlation agent use two-stage based decision method to detect unknown worms. They adaptively study the accessing in the whole network and dynamically change the working parameters to detect the unknown worms. MWDCM confines worm infection within a macro-cell or a micro-cell of the metropolitan area networks, the rest of the accesses and hosts continue functioning without disruption. MWDCM integrates Worm Detection System (WDS) and network management system. Reaction measures can be taken by using Simple Network Management Protocol (SNMP) interface to control broadband access server as soon as the WDS detect the active worm. MWDCM is very effective in blocking random scanning worms. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MWDCM blocking the propagation of the worms. 展开更多
关键词 多代理系统 蠕虫检测 计算机病毒 安全性
下载PDF
基于贪婪算法的网络通信未知蠕虫检测仿真
7
作者 杨鹏 贺钧 +1 位作者 李卫军 李娟 《计算机仿真》 2024年第4期373-377,共5页
网络蠕虫具有智能化和综合网络攻击性,无须计算机使用者干预即可运行的攻击程序或代码,且攻击传播速度较快。计算机防御模型多采用杀毒软件处理蠕虫的检测,但是无法提前防御蠕虫的攻击。因此,提出基于贪婪算法的网络通信未知蠕虫检测方... 网络蠕虫具有智能化和综合网络攻击性,无须计算机使用者干预即可运行的攻击程序或代码,且攻击传播速度较快。计算机防御模型多采用杀毒软件处理蠕虫的检测,但是无法提前防御蠕虫的攻击。因此,提出基于贪婪算法的网络通信未知蠕虫检测方法。通过云安全环境建立蠕虫传播模型,提取未知蠕虫数据特征,采用贪婪算法构建自编码器,降维蠕虫数据特征。利用改进蚁群算法和SVM建立网络攻击检测模型,将降维后蠕虫数据特征输入模型中,完成未知蠕虫的检测。实验结果表明,研究方法的蠕虫检测率更高,且丢包率低于0.5%,主机感染率降低,说明所提方法的应用性能更优。 展开更多
关键词 蠕虫攻击 网络入侵检测 贪婪算法 自编码器 支持向量机
下载PDF
基于ReliefF算法的通信网络蠕虫病毒高效检测方法
8
作者 庞姚 《信息与电脑》 2024年第1期46-48,共3页
由于传统方法对通信网络蠕虫病毒的检测效果不佳,提出基于ReliefF算法的通信网络蠕虫病毒高效检测方法。首先采用ReliefF算法采集通信网络蠕虫病毒特征,并根据应用程序接口(Application Programming Interface,API)的调用筛选特征;其次... 由于传统方法对通信网络蠕虫病毒的检测效果不佳,提出基于ReliefF算法的通信网络蠕虫病毒高效检测方法。首先采用ReliefF算法采集通信网络蠕虫病毒特征,并根据应用程序接口(Application Programming Interface,API)的调用筛选特征;其次将筛选出来的蠕虫病毒特征作为训练样本,将经过特征选择后的训练样本输入分类器中进行模型构建;最后通过交叉验证方法优化模型,并使用构建的模型检测文件中是否含有蠕虫病毒。实验结果表明,采用基于ReliefF算法的通信网络蠕虫病毒检测方法准确率较高,且优于其他两种方法。 展开更多
关键词 数据挖掘 通信网络 蠕虫病毒 检测方法
下载PDF
Simulating Greedy Propagation of P2P Worms 被引量:1
9
作者 Guo-Zheng Wu Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2010年第4期307-311,共5页
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o... Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network. 展开更多
关键词 Greedy propagation Internet worms peer-to-peer network peer-to-peer worms worms propagating.
下载PDF
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
10
作者 Pablo Velarde-Alvarado Rafael Martinez-Pelaez +1 位作者 Joel Ruiz-Ibarra Victor Morales-Rocha 《Journal of Computer and Communications》 2014年第11期24-30,共7页
In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detec... In this paper, information theory and data mining techniques to extract knowledge of network traffic behavior for packet-level and flow-level are proposed, which can be applied for traffic profiling in intrusion detection systems. The empirical analysis of our profiles through the rate of remaining features at the packet-level, as well as the three-dimensional spaces of entropy at the flow-level, provide a fast detection of intrusions caused by port scanning and worm attacks. 展开更多
关键词 INTRUSION Detection Traffic PROFILING Entropy and network wormS
下载PDF
Modeling and analysis of gradual hybrid anti-worm
11
作者 李军群 秦拯 +3 位作者 欧露 O.Salman A.X.Liu 杨金民 《Journal of Central South University》 SCIE EI CAS 2011年第6期2050-2055,共6页
The gradual hybrid anti-worm (GHAW) was presented. It changed its confrontation scheme in real time according to the percentage of vulnerable hosts present in the network. For GHAW, its process of countering malicious... The gradual hybrid anti-worm (GHAW) was presented. It changed its confrontation scheme in real time according to the percentage of vulnerable hosts present in the network. For GHAW, its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW. 展开更多
关键词 蠕虫 混合 INTERNET 建模 网络资源 模拟实验 网络环境 分而治之
下载PDF
Research on the Propagation Models and Defense Techniques of Internet Worms
12
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 Defense system Internet worm network security propagation model
下载PDF
Grid-based internet worm behavior simulator
13
作者 刘扬 王佰玲 +3 位作者 董开坤 苑新玲 张慈 饶明 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2011年第3期41-47,共7页
The traditional network simulator has function and performance limitation when simulating Internet worms,so we designed the grid-based Internet worm behavior simulator (IWBS Grid).IWBS Grid makes use of the real Inter... The traditional network simulator has function and performance limitation when simulating Internet worms,so we designed the grid-based Internet worm behavior simulator (IWBS Grid).IWBS Grid makes use of the real Internet topology,link and routing information,and simulates the worm behavior at the packet event-driven level;and proposes a high-performance Internet worms behavior simulation platform by right of the grid computing capability,resource and task management,and so on.The experimental results show that IWBS grid surpasses the traditional simulator in simulating capability,and the technology to track the worm propagation in packet level can propose the valuable information for the further study on worms. 展开更多
关键词 GRID worm behavior simulation distributed and parallel network simulator
下载PDF
具有饱和发生率的网络蠕虫病毒模型分析 被引量:1
14
作者 王瑞玲 薛亚奎 《华中师范大学学报(自然科学版)》 CAS CSCD 北大核心 2023年第3期347-353,共7页
该文研究了一类具有饱和发生率的网络蠕虫病毒的VEIQS模型,此模型考虑了疫苗接种策略和隔离控制策略.通过计算得到了病毒能否被控制的阈值R 0,论证了平衡点的存在性与稳定性.当R 0<1时,利用构造Lyapunov函数的方法得到了无病平衡点P ... 该文研究了一类具有饱和发生率的网络蠕虫病毒的VEIQS模型,此模型考虑了疫苗接种策略和隔离控制策略.通过计算得到了病毒能否被控制的阈值R 0,论证了平衡点的存在性与稳定性.当R 0<1时,利用构造Lyapunov函数的方法得到了无病平衡点P 0是全局渐近稳定的,病毒传播得到了有效控制;当R 0>1时,利用Li-Muldowney几何准则得到了地方病平衡点P*是全局渐近稳定的,病毒仍然存在.最后,对理论结果做了数值仿真并通过敏感性分析探究了各参数与阈值R 0之间的关系. 展开更多
关键词 网络蠕虫病毒 VEIQS模型 饱和发生率 稳定性分析
下载PDF
基于MapReduce的大规模在线社交网络蠕虫仿真 被引量:15
15
作者 和亮 冯登国 +2 位作者 王蕊 苏璞睿 应凌云 《软件学报》 EI CSCD 北大核心 2013年第7期1666-1682,共17页
利用云计算中的核心技术MapReduce,提出了一种在线社交网络(online social network,简称OSN)蠕虫的仿真方法.为了提高仿真精度,首先提出利用节点属性可调节的OSN有向图来描述蠕虫传播的各个过程.其次,利用运行在云环境中的多个Map函数和... 利用云计算中的核心技术MapReduce,提出了一种在线社交网络(online social network,简称OSN)蠕虫的仿真方法.为了提高仿真精度,首先提出利用节点属性可调节的OSN有向图来描述蠕虫传播的各个过程.其次,利用运行在云环境中的多个Map函数和Reduce函数来实现对OSN蠕虫传播各个过程的仿真.在真实的大规模数据集上的仿真实验结果表明,提出的仿真方法不仅具有较强的可扩展性,同时也为相关领域的研究提供了一定的帮助. 展开更多
关键词 在线社交网络蠕虫 MAPREDUCE 仿真
下载PDF
社交网络蠕虫仿真建模研究 被引量:16
16
作者 孙鑫 刘衍珩 +1 位作者 朱建启 李飞鹏 《计算机学报》 EI CSCD 北大核心 2011年第7期1252-1261,共10页
随着互联网虚拟社交网络的发展,借助网络用户进行传播的社交网络蠕虫已经成为威胁网络安全的重大隐患之一.文中从社会工程学的角度研究社交网络蠕虫的传播机制,通过量化影响用户行为的若干因素,提出了微观节点上的基于用户安全意识的行... 随着互联网虚拟社交网络的发展,借助网络用户进行传播的社交网络蠕虫已经成为威胁网络安全的重大隐患之一.文中从社会工程学的角度研究社交网络蠕虫的传播机制,通过量化影响用户行为的若干因素,提出了微观节点上的基于用户安全意识的行为博弈模型;通过分析网络用户活动的习惯特性,构建了宏观网络上离散的基于用户习惯的社交网络访问模型;从而实现了一个适用于社交网络蠕虫传播研究的仿真系统.实验分析了模型中用户相关因素对蠕虫传播的影响,验证了仿真系统的有效性.最后,利用该系统仿真了社交网络蠕虫在异质社交网络中的传播,揭示了网络拓扑结构和社交网络混杂程度对蠕虫传播的影响,为社交网络蠕虫相关研究提供了重要支持. 展开更多
关键词 社交网络蠕虫 传播模型 人类行为 博弈理论 仿真
下载PDF
一种基于邻居信任评估的虫洞防御机制 被引量:18
17
作者 洪亮 洪帆 +1 位作者 彭冰 陈晶 《计算机科学》 CSCD 北大核心 2006年第8期130-133,共4页
移动ad hoc网是一种新型无线移动网络,具有无中心、自组织、拓扑结构变化频繁以及开放式通讯信道等特性,因此ad hoc网络下的路由协议所面临的安全问题比有线网环境中更为严重。虫洞攻击就是其中的一种,能够对ad hoc网络产生致命的影响... 移动ad hoc网是一种新型无线移动网络,具有无中心、自组织、拓扑结构变化频繁以及开放式通讯信道等特性,因此ad hoc网络下的路由协议所面临的安全问题比有线网环境中更为严重。虫洞攻击就是其中的一种,能够对ad hoc网络产生致命的影响。在这种攻击下,网络的路由机制将会紊乱,特别是那些依赖通过接收对方的广播报文进行邻居探测的路由协议。本文首先从虫洞形成的根源上入手,重新定义了邻居的概念,强调了邻居作为节点信息转发第一站的功能。然后根据邻居定义,引入简化的Marsh1信任模型,将邻居的以往表现作为信任评估的经验来源,再通过具体公式对邻居关系做出判定。在具体的路由过程中,节点根据信任评估值选取高可信度的邻居作为下一跳的转发节点,从而避免虫洞攻击的危害。为了验证方法的可行性,本文将模型应用于OLSR路由协议中并在NS2中进行了仿真。 展开更多
关键词 移动AD hoc网络 虫洞攻击 邻居关系 Marsh信任模型 OLSR 安全路由
下载PDF
XSS蠕虫在社交网络中的传播分析 被引量:8
18
作者 罗卫敏 刘井波 +1 位作者 刘静 陈晓峰 《计算机工程》 CAS CSCD 北大核心 2011年第10期128-130,共3页
通过分析社交网络的特点,将节点分为活跃节点和非活跃节点。针对XSS蠕虫的传播,分析其传播受到的影响因素,建立数学模型。仿真结果表明,节点访问偏向度对XSS蠕虫传播影响较小,而XSS蠕虫采用社会工程学的熟练度及节点安全意识,对XSS蠕虫... 通过分析社交网络的特点,将节点分为活跃节点和非活跃节点。针对XSS蠕虫的传播,分析其传播受到的影响因素,建立数学模型。仿真结果表明,节点访问偏向度对XSS蠕虫传播影响较小,而XSS蠕虫采用社会工程学的熟练度及节点安全意识,对XSS蠕虫传播影响较大。活跃节点的安全意识较大程度影响了XSS蠕虫传播效率,将活跃节点作为防御点和监控点的防御策略切实可行。 展开更多
关键词 社交网络 XSS蠕虫 网络安全 活跃节点
下载PDF
基于蠕虫特征的校园网防御体系 被引量:4
19
作者 周庆国 陈文波 +2 位作者 荆涛 周睿 李廉 《兰州大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第1期106-109,共4页
随着Code Red,Slammer,冲击波,Sasser等网络蠕虫的相继大规模爆发,其影响和危害也波及我国高校的校园网.以网络蠕虫的生命周期的各个阶段特征出发,并在此基础上提出一种安全的校园网防御体系结构,来防止、防御蠕虫的传播和破坏,以保障... 随着Code Red,Slammer,冲击波,Sasser等网络蠕虫的相继大规模爆发,其影响和危害也波及我国高校的校园网.以网络蠕虫的生命周期的各个阶段特征出发,并在此基础上提出一种安全的校园网防御体系结构,来防止、防御蠕虫的传播和破坏,以保障校园网络安全正常稳定地运行. 展开更多
关键词 网络蠕虫 网络安全 校园网
下载PDF
无线传感器网络蠕虫的传播与控制 被引量:4
20
作者 傅蓉蓉 郑康锋 +1 位作者 张冬梅 杨义先 《北京交通大学学报》 CAS CSCD 北大核心 2013年第2期17-21,共5页
研究基于IEEE 802.15.4协议的无线传感器网络蠕虫传播方法,并根据IEEE802.15.4的固有特性,提出了网络环境自适应的节点免疫算法,算法通过本地及邻居信息选择免疫节点控制蠕虫的传播.针对提出的算法存在免疫过程容易陷入局部度风险最大... 研究基于IEEE 802.15.4协议的无线传感器网络蠕虫传播方法,并根据IEEE802.15.4的固有特性,提出了网络环境自适应的节点免疫算法,算法通过本地及邻居信息选择免疫节点控制蠕虫的传播.针对提出的算法存在免疫过程容易陷入局部度风险最大点的问题,借鉴模拟退火算法的基本原理,提出了改进的自适应免疫算法.仿真实验表明,本文提出的算法可以通过免疫少量的节点有效的抑制蠕虫的扩散,提高了无线传感器网络抵抗蠕虫攻击的能力. 展开更多
关键词 无线传感器网络 蠕虫 IEEE 802 15 4 传播 免疫算法
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部