期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Novel IOV worm model and its corresponding hybrid anti-worm strategy in expressway interchange terminal
1
作者 汪峥 钱焕延 +2 位作者 汪婧雅 高嵩 徐延贵 《Journal of Central South University》 SCIE EI CAS 2013年第5期1259-1268,共10页
In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange termina... In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead. 展开更多
关键词 intemet of vehicles worm propagation model hybrid anti-worm strategy EXPRESSWAY interchange terminal
下载PDF
Research and Development of P2P Worms
2
作者 Li You Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第3期202-210,共9页
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ... With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail. 展开更多
关键词 Index Terms---Peer-to-peer (P2P) P2P worm worm propagation model.
下载PDF
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks 被引量:3
3
作者 Xiao-song ZHANG Ting CHEN +1 位作者 Jiong ZHENG Hua LI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第2期119-129,共11页
It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of model... It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon en-gender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model,in this paper,we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors:(1) network topology,(2) countermeasures taken by Internet service providers (ISPs) and users,(3) configuration diversity of nodes in the P2P network,and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways:improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation. 展开更多
关键词 Proactive peer-to-peer (P2P) worm propagation modeling Network topology Configuration diversity Attack and defense strategies Four-factor model
原文传递
Internet worm early detection and response mechanism
4
作者 WANG Jian LIU Yan-heng TIAN Da-xin WEI Da 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第3期79-84,共6页
In recent years, fast spreading worm has become one of the major threats to the security of the Internet and has an increasingly fierce tendency. In view of the insufficiency that based on Kalman filter worm detection... In recent years, fast spreading worm has become one of the major threats to the security of the Internet and has an increasingly fierce tendency. In view of the insufficiency that based on Kalman filter worm detection algorithm is sensitive to interval, this article presents a new data collection plan and an improved worm early detection method which has some deferent intervals according to the epidemic worm propagation model, then proposes a worm response mechanism for slowing the wide and fast worm propagation effectively. Simulation results show that our methods are able to detect worms accurately and early. 展开更多
关键词 worm early detection Kalman filter worm propagation model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部