期刊文献+

动态环境下的主动蠕虫攻击分析

Analyze active worm attacks in dynamic environment
下载PDF
导出
摘要 鉴于当前很少有传播模型充分考虑到P2P节点动态特征对主动蠕虫攻击的影响,提出两个动态环境下的主动蠕虫传播模型。分析了主动蠕虫两种常见的攻击方式,给出了相应攻击背景下的节点状态转换过程,在综合考虑P2P节点动态特征的基础上提出了两种主动蠕虫传播模型,并对所提出的模型进行了数值分析,探讨动态环境下影响主动蠕虫传播速度的关键因素。实验结果表明,通过提高P2P节点的离线率和免疫力可以有效地抑制主动蠕虫对P2P网络的攻击。 Given few works focused on the propagation model that fully considered the influence of the dynamic features of P2P nodes on active worm attack,this paper proposed two propagation models of active worms in dynamic environment.First,it studied two common attack strategies of active worms and provided states transition process of nodes when active worms spread in accordance with these attack strategies.Second,it presented two propagation models combined with the dynamic characteristic of P2P nodes.And finally,it conducted mathematical analysis on these presented models and explored the key factors affecting active worm propagation in dynamic P2P environment.The experimental result shows that it is able to effectively suppress the spread of active worm in P2P networks by increasing the off-line rate and immunity of P2P nodes.
出处 《计算机应用研究》 CSCD 北大核心 2013年第6期1831-1834,共4页 Application Research of Computers
基金 国家科技重大专项基金资助项目(2011ZX03002-004-03) 重庆市高等教育成果转换基金资助项目(Kjzh10206) 公安部信息网络安全重点实验室项目(C11609)
关键词 主动蠕虫 动态环境 传播模型 P2P网络 active worm dynamic environment propagation model P2P networks
  • 相关文献

参考文献13

  • 1HONG Wei-ming. A novel method for P2P traffic identification [ J ]. Proeedia Engineering,2011,23 (1) :204- 209. 被引量:1
  • 2CHEN Ze-sheng,GAO Li-xin, KWIAT K. Modeling the spread of active worms [ C ]//Proc of IEEE INFOCOM. San Francisco: IEEE Press ,2003 : 1890-1900. 被引量:1
  • 3YU Wei, BOYER C, CHELLAPPAN S, et al. Peer-to-peer system- based active worm attacks : modeling and analysis [ C ]//Proc of IEEE International Conference on Communications. Berlin:Springer-Verlag, 2005 : 295- 300. 被引量:1
  • 4YU Wei. Analyzing the performance of Internet worm attack approaches[ C]//Proc of the 13th International Conference on Computer Communications and Networks. Chicago : IEEE Press ,2004:501-506. 被引量:1
  • 5JIA Chun-fu, LIU Xin, HU Zhi-chao,et al. Defending P2P networks against malicious worms based on benign worms[ C ]//Advances in Electric and Electronics. Berlin : Springer-Verlag ,2012:653- 660. 被引量:1
  • 6WANG Xue-song, ZHU Jing-lin, LIN Huai-zhong, et al. Modeling propagation of active P2P worm in chord network [ J ]. Advances in Intelligent and Soft Computing,2012,133(2012) :389-396. 被引量:1
  • 7RAVIKUMAR V, RAJANI M. Peer-to-peer networks for modeling Malware propagation[ J]. International ,Journal of Advanced Research in Computer Science and Software Engineering, 2012,2 ( 2 ) : 1-4. 被引量:1
  • 8ZHANG Ye-jiang, LI Zhi-tang, HU Zheng-bing, et al. Evolutionary proactive P2P worm : propagation modeling and simulation [ C ]//Proc of the 2nd International Conference on Genetic and Evolutionary Computing. [ S. l. ] :IEEE Computer Society,2008:261-264. 被引量:1
  • 9YANG Wei, CHANG Gui-ran, YAO Yu,et al. Stability analysis of P2P worm propagation model with dynamic quarantine defense [ J ]. dournal of Networks,2011,6 ( 1 ) : 153-162. 被引量:1
  • 10FENG Chao-sheng, QIN Zhi-guang, CUTHBET L, et al. Propagation model of active worms in P2P networks[ C]//Proc of the 9th International Conference for Young Computer Scientists. 2008:1908-1912. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部