浏览全部资源
扫码关注微信
1. 辽宁大学 信息学院,辽宁 沈阳 100036
2. 沈阳航空航天大学 计算机学院,辽宁 沈阳 110136
3. 东北大学 信息科学与工程学院,辽宁 沈阳 110819
[ "周翰逊(1981-),男,辽宁沈阳人,博士,辽宁大学讲师,主要研究方向为网络安全和图像处理。" ]
[ "郭薇(1983-),女,辽宁沈阳人,博士,沈阳航空航天大学讲师,主要研究方向为网络安全和图像处理。" ]
[ "刘建(1979-),男,辽宁铁岭人,辽宁大学讲师,主要研究方向为网络安全、无线传感器网络和数据挖掘。" ]
[ "贾大宇(1990-),男,辽宁沈阳人,东北大学硕士生,主要研究方向为网络安全和大数据。" ]
网络出版日期:2015-05,
纸质出版日期:2015-05-25
移动端阅览
周翰逊, 郭薇, 刘建, 等. 基于马尔可夫链的网络蠕虫传播模型[J]. 通信学报, 2015,36(5):66-71.
HOUHan-xun Z, UOWei G, IUJian L, et al. Internet worm propagation model based on Markov chain[J]. Journal on communications, 2015, 36(5): 66-71.
周翰逊, 郭薇, 刘建, 等. 基于马尔可夫链的网络蠕虫传播模型[J]. 通信学报, 2015,36(5):66-71. DOI: 10.11959/j.issn.1000-436x.2015111.
HOUHan-xun Z, UOWei G, IUJian L, et al. Internet worm propagation model based on Markov chain[J]. Journal on communications, 2015, 36(5): 66-71. DOI: 10.11959/j.issn.1000-436x.2015111.
提出了网络蠕虫的随机传播模型。首先,基于马尔可夫链对于网络蠕虫进行了建模,并且讨论了模型的极限分布以及平稳分布的存在性。然后,讨论了网络蠕虫在传播初期灭绝的充要条件以及在传播后期灭绝的必要条件。最后,讨论了网络蠕虫的传播规模。仿真实验对于模型进行了验证,讨论了模型中传播参数,时间参数以及漏洞主机数等相关参数对于网络蠕虫传播的影响,并且与G-W模型进行了数据对比,说明了本模型的优势。
A stochastic model of Internet worms is presented.Firstly
the propagation of worms is modeled based on Markov chain.The limit distribution and invariant distribution of the model is discussed.Then
necessary and sufficient conditions of the worm propagation in the initial stage and sufficient conditions of the worm propagation in the late stage are discussed.Finally
the scale of the worm propagation is discussed.The simulation validates the model.And the effect of propagation
time and vulnerable host parameter on the spread of worms is discussed.Furthermore
it is compared to the G-W model
and the advantage of it is illustrated.
SPAFFORD E H . The Internet Worm Program:an Analysis [R ] . Technical Report,CSD-TR-823,West Lafayette:Department of Computer Science,Purdue University , 1988 . 1 - 29 .
MOORE D , SHANNON C , BROWN J . Code-Red:a case study on the spread and victims of an Internet worm [A ] . Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurement [C ] . 2002 . 273 - 284 .
刘玉岭 , 冯登国 , 吴丽辉 等 . 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估 [J ] . 软件学报 , 2012 , 23 ( 3 ): 712 - 723 .
LIU Y L , FENG D G , WU L H , et al . Performance evaluation of worm attack and defense strategies based on static Bayesian game [J ] . Journal of Software , 2012 , 23 ( 3 ): 712 - 723 .
汪洁 , 王建新 , 刘绪崇 . 基于近邻关系特征的多态蠕虫防御方法 [J ] . 通信学报 , 2011 , 32 ( 8 ): 150 - 158 .
WANG J , WANG J X , LIU X C . Novel approach based on neighborhood relation signature against polymorphic internet worms [J ] . Journal on Communications , 2011 , 32 ( 8 ): 150 - 158 .
洪征 , 吴礼发 . 基于阳性选择的蠕虫检测系统 [J ] . 软件学报 , 2010 , 21 ( 4 ): 816 - 826 .
HONG Z , WU L F . Worm detection system based on positive selection [J ] . Journal of Software , 2010 , 21 ( 4 ): 816 - 826 .
唐勇 , 诸葛建伟 , 陈曙晖 等 . 蠕虫正则表达式特征自动提取技术研究 [J ] . 通信学报 , 2013 , 34 ( 3 ): 141 - 147 .
TANG Y , ZHUGE J W , CHEN S H , et al . Automatic generating regular expression signatures for real network worms [J ] . Journal on Communications , 2013 , 34 ( 3 ): 141 - 147 .
STANIFORD S , PAXSON V , WEAVER N . How to own the Internet in your spare time [A ] . Proc of the 11th Usenix Security Symp [C ] . San Francisco , 2002 .
ZOU C C , GONG W , TOWSLEY D . Code Red worm propagation modeling and analysis [A ] . Proc of the 9th ACM Symp.on Computer and Communication Security [C ] . 2002 . 138 - 147 .
CHEN Z , GAO L , KWIAT K . Modeling the spread of active worms [A ] . IEEE INFOCOM 2003 [C ] . 2002 . 1890 - 1900 .
YU W , WANG X , PRASAD C , ZHAO W . Modeling and detection of Camouflaging worm [J ] . IEEE Transaction on Dependable and Secure Computing , 2011 , 8 ( 4 ): 377 - 390 .
冯朝胜 , 秦志光 , 袁丁 等 . P2P 网络中被动型蠕虫传播与免疫建模 [J ] . 电子学报 , 2013 , 41 ( 5 ): 884 - 889 .
FENG C S , QIN Z G , YUAN D , et al . Modeling propagation and immunization of passive worms in peer-to-peer networks [J ] . Acta Electronica Sinica , 2013 , 41 ( 5 ): 884 - 889 .
孙鑫 , 刘衍珩 , 朱建启 等 . 社交网络蠕虫仿真建模研究 [J ] . 计算机学报 , 2011 , 34 ( 7 ): 1252 - 1261 .
SUN X , LIU Y H , ZHU J Q , et al . Research on simulation and modeling of social network worm propagation [J ] . Chinese Journal of Computers , 2011 , 34 ( 7 ): 1252 - 1261 .
YU W , ZHANG N , FU X W , et al . Self-disciplinary worms and countermeasures:modeling and analysis [J ] . IEEE Transactions on Parallel and Distributed Systems , 2010 , 21 ( 10 ): 1501 - 1514 .
张伟 , 王汝传 , 李鹏 . 基于云安全环境的蠕虫传播模型 [J ] . 通信学报 , 2012 , 33 ( 4 ): 17 - 24 .
ZHANG W , WANG R C , LI P . Worm propagation modeling in cloud security [J ] . Journal on Communications , 2012 , 33 ( 4 ): 17 - 24 .
JENNIFER T . Jackson and sadie creese,virus propagation in heterogeneous bluetooth networks with human behaviors [J ] . IEEE Transactions on Dependable and Secure Computing , 2012 , 9 ( 6 ): 930 - 943 .
刘烃 , 郑庆华 , 管晓宏 等 . 基于随机实验的蠕虫传播预测研究 [J ] . 通信学报 , 2007 , 28 ( 12 ): 72 - 77 .
LIU J , ZHENG Q H , GUAN X H , et al . Research of worm-propagation prediction based on stochastic experiment [J ] . Journal on Communications , 2007 , 28 ( 12 ): 72 - 77 .
SARAH S , NESS B S , SAURABH B . Modeling and automated containment of worms [J ] . IEEE Transactions on Dependable and Secure Computing , 2008 , 5 ( 2 ): 528 - 537 .
ROSS S . Stochastic Processes [M ] . John Wiley & Sons , 1996
0
浏览量
1493
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构