期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Overall-Transparent Dynamic Identifier-Mapping Mechanism Against Scanning and Worm Propagation in the SINET 被引量:1
1
作者 Linyuan Yao Ping Dong +1 位作者 Hongke Zhang Xiaojun Wang 《China Communications》 SCIE CSCD 2020年第5期137-150,共14页
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t... Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation. 展开更多
关键词 dynamic identifier-mapping network scanning worm propagation smart identifier network
下载PDF
Modeling and analysis of Internet worm propagation 被引量:3
2
作者 SU Fei LIN Zhao-wen MA Yan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第4期63-68,共6页
Although the frequency of Internet worm's outbreak is decreased during the past ten years, the impact of worm on people's privacy security and enterprise's efficiency is still a severe problem, especially the emerg... Although the frequency of Internet worm's outbreak is decreased during the past ten years, the impact of worm on people's privacy security and enterprise's efficiency is still a severe problem, especially the emergence of botnet. It is urgent to do more research about worm's propagation model and security defense. The well-known worm models, such as simple epidemic model (SEM) and two-factor model (TFM), take all the computers on the internet as the same, which is not accurate because of the existence of network address translation (NAT). In this paper, we first analyze the worm's functional structure, and then we propose a three layer worm model named three layres worm model (TLWM), which is an extension of SEM and TFM under NAT environment. We model the TLWM by using deterministic method as it is used in the TFM. The simulation results show that the number of NAT used on the Internet has effects on worm propagation, and the more the NAT used, the slower the worm spreads. So, the extensive use of NAT on the Internet can restrain the worm spread to some extent. 展开更多
关键词 worm propagation MODEL TLWM NAT
原文传递
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks 被引量:3
3
作者 Xiao-song ZHANG Ting CHEN +1 位作者 Jiong ZHENG Hua LI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第2期119-129,共11页
It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of model... It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model,in this paper,we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors:(1) network topology,(2) countermeasures taken by Internet service providers (ISPs) and users,(3) configuration diversity of nodes in the P2P network,and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways:improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation. 展开更多
关键词 Proactive peer-to-peer (P2P) worm propagation modeling Network topology Configuration diversity Attack and defense strategies Four-factor model
原文传递
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation 被引量:3
4
作者 YANGFengt DUANHaixin LIxing 《Science in China(Series F)》 2005年第1期91-106,共16页
Interaction of antiworms with a worm population of e.g. hosts of worm infected and hosts of antiworm infected must be considered as a dynamic process. This study is an attempt for the first time to understand how intr... Interaction of antiworms with a worm population of e.g. hosts of worm infected and hosts of antiworm infected must be considered as a dynamic process. This study is an attempt for the first time to understand how introduction of antiworm affects the dynamic of network worm propagation. In this paper, we create a mathematical model (SIAR model) using ordinary differential equations to describe the interaction of worms and antiworms. Although idealized, the model demonstrates how the combination of a few proposed nonlinear interaction rules between antiworms and worms is able to generate a considerable variety of different kinds of responses. Taking the Blaster and Nachi worms as an example, we give a brief analysis for designing a practical antiworm system. To the best of our knowledge, there is no model for the spread of an antiworm that employs the passive scan and the finite lifetime and we believe that this is the first attempt on understanding the interaction between worms and antiworms. 展开更多
关键词 SIAR model ordinary differential equations network worm propagation BLASTER Nachi.
原文传递
Simulating Greedy Propagation of P2P Worms 被引量:1
5
作者 Guo-Zheng Wu Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2010年第4期307-311,共5页
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o... Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network. 展开更多
关键词 Greedy propagation Internet worms peer-to-peer network peer-to-peer worms worms propagating.
下载PDF
Modeling of Malicious Code Propagations in Internet of Things 被引量:2
6
作者 林昭文 苏飞 马严 《China Communications》 SCIE CSCD 2011年第1期79-86,共8页
Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will ex... Nowadays, the main communication object of Internet is human-human. But it is foreseeable that in the near future any object will have a unique identification and can be addressed and con- nected. The Internet will expand to the Internet of Things. IPv6 is the cornerstone of the Internet of Things. In this paper, we investigate a fast active worm, referred to as topological worm, which can propagate twice to more than three times faster tl^an a traditional scan-based worm. Topological worm spreads over AS-level network topology, making traditional epidemic models invalid for modeling the propagation of it. For this reason, we study topological worm propagation relying on simulations. First, we propose a new complex weighted network mod- el, which represents the real IPv6 AS-level network topology. And then, a new worm propagation model based on the weighted network model is constructed, which descries the topological worm propagation over AS-level network topology. The simulation results verify the topological worm model and demonstrate the effect of parameters on the propagation. 展开更多
关键词 IOT IPV6 worm propagation worm model weighted complex network
下载PDF
Novel IOV worm model and its corresponding hybrid anti-worm strategy in expressway interchange terminal
7
作者 汪峥 钱焕延 +2 位作者 汪婧雅 高嵩 徐延贵 《Journal of Central South University》 SCIE EI CAS 2013年第5期1259-1268,共10页
In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange termina... In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead. 展开更多
关键词 intemet of vehicles worm propagation model hybrid anti-worm strategy EXPRESSWAY interchange terminal
下载PDF
An Immunization Strategy for Social Network Worms Based on Network Vertex Influence
8
作者 YANG Wei WANG Haibo YAO Yu 《China Communications》 SCIE CSCD 2015年第7期154-166,共13页
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i... Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms. 展开更多
关键词 social network worm immunization strategy network security worm propagation worm containment
下载PDF
Research and Development of P2P Worms
9
作者 Li You Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第3期202-210,共9页
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ... With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail. 展开更多
关键词 Index Terms---Peer-to-peer (P2P) P2P worm worm propagation model.
下载PDF
Internet worm early detection and response mechanism
10
作者 WANG Jian LIU Yan-heng TIAN Da-xin WEI Da 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期79-84,共6页
In recent years, fast spreading worm has become one of the major threats to the security of the Internet and has an increasingly fierce tendency. In view of the insufficiency that based on Kalman filter worm detection... In recent years, fast spreading worm has become one of the major threats to the security of the Internet and has an increasingly fierce tendency. In view of the insufficiency that based on Kalman filter worm detection algorithm is sensitive to interval, this article presents a new data collection plan and an improved worm early detection method which has some deferent intervals according to the epidemic worm propagation model, then proposes a worm response mechanism for slowing the wide and fast worm propagation effectively. Simulation results show that our methods are able to detect worms accurately and early. 展开更多
关键词 worm early detection Kalman filter worm propagation model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部