期刊文献+

主动良性蠕虫和混合良性蠕虫的建模与分析 被引量:16

Modeling and Analysis of Active-Benign Worms and Hybrid-Benign Worms
在线阅读 下载PDF
导出
摘要 自从1988年Morris蠕虫爆发以来,网络蠕虫就在不断地威胁着网络的安全.传统防范措施已不再适用于蠕虫的防治,使用良性蠕虫来对抗蠕虫正成为一种新的应急响应技术.良性蠕虫的思想就是将恶意的蠕虫转化成良性的蠕虫,而且该良性蠕虫还可以运用相同的感染机制免疫主机.这种方法可以主动地防御恶意蠕虫并且在没有传统的蠕虫防御框架下仍具有潜在的部署能力.首先,分别将主动良性蠕虫和混合良性蠕虫划分成3个子类;然后,基于两因素模型分别对主动良性蠕虫和混合良性蠕虫的3个子类进行建模,推导了在有延迟以及无延迟的情况下6类良性蠕虫的传播模型;最后,通过仿真实验验证了传播模型.更进一步,基于仿真结果讨论了每种良性蠕虫抑制恶意蠕虫的效果,并且得到如下结论:在相同的感染条件下,复合型的混合良性蠕虫抑制蠕虫传播的效果最好. Since the Morris worm occurred in 1988, worms have threatened the network persistently, the traditional anti-virus technologies no longer scale to deal with the worm threat, and benign worms become a new active countermeasure. The idea of benign worm is to transform a malicious worm into an anti-worm which spreads itself using the same mechanism as the original worm and immunizes a host. This method allows for an active measure to malicious worms that can potentially be deployed with no additional infrastructure in place. First of all, an active-benign worm and a hybrid-benign worm are classified into three sub-types, respectively. Then, three sub-types of the active-benign worm and the hybrid-benign worm are modeled respectively based on the two-factor model, and the models of six types of benign worms are derived under the circumstances of no delay time and of delay time. Finally, the simulation validates the models. Furthermore, the effect of each type containing the spread of worms is discussed based on the results. And there comes the conclusion that a composition-hybrid-benign worm is the most effective approach for containing the propagation of worms under the same infectious condition.
作者 周翰逊 赵宏
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第6期958-964,共7页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60602061) 国家"八六三"高技术研究发展计划基金项目(2006AA01Z413)~~
关键词 网络安全 主动良性蠕虫 混合良性蠕虫 蠕虫建模 两因素模型 model network security active-benign worm hybrid-benign worm worm modeling two-factor
  • 相关文献

参考文献15

  • 1D M Kienzle,M C Elder.Recent worms:A survey and trends[C].The ACM CCS Workshop on Rapid Malcode(WORM 2003),Washington,2003
  • 2D Moore,C Shannon,J Brown.Code-red:A case study on the spread and victims of an Internet worm[C].The 2nd ACM SIGCOMM Workshop on Internet Measurement,Marseille,France,2002
  • 3EEye Digital Security.Code Red worm[OL].http://www.eeye.com/html/research/advimries/al20010717.html,2001
  • 4D Moore,V Paxson,S Savage,et al.Inside the Slammer worm[J].IEEE Magazine of Security and Privacy,2003,1 (4):33-39
  • 5N Weaver,S Staniford,V Paxson.Very fast containment of scanning worms[C].The 13th Usenix Security Symp,San Diego,CA,2004
  • 6Stuart Schechter,Jaeyeon Jung,Arthur W Berger.Fast detection of scanning worm infections[C].The 7th Int'l Symp on Recent Advances in Intrusion Detection(RAID),French Riviera,France,2004
  • 7S Staniford,V Paxson,N Weaver.How to own the Internet in your spare time[C].The 11th Usenix Security Symp,San Francisco,2002.http://www,icir.org/vern/papers/cdc-usenixsec02/cdc.pdf
  • 8C C Zou,W Gong,D Towsley.Code red Worm propagation modeling and analysis[C].The 9th ACM Conf on Computer and Communication Security(CCS'02),Washington,DC,2002
  • 9Dan Wu,Dongyang Long,Changji Wang,et al.The 6th Int'l Conf on Algorithms and Architectures for Parallel Processing,Melbourne,2005
  • 10杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27

二级参考文献18

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2[2]CERT Advisory CA-2001-23. Continued Threat of the "Code Red Ⅱ" Worm. http:∥www. cert. org/advisories/CA-2001-23 .html
  • 3[3]Moore D. The Spread of the Code-Red Worm (CRv2). http:∥www. caida.org/analysis/security/-code-red/coderedv2 analysis.xml, Nov 2001
  • 4[4]Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time. In: Proc of the USENIX Security Symposium, 2002
  • 5[5]Das Bistro Project's anti-code-red default.ida. http:∥www. dasbitro.com/default.ida
  • 6[6]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32/Nachi. A,http:∥www. f-prot.com/virusinfo/descriptions/nachi_A.html
  • 7[7]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32.Blaster. Worm,http:∥securityresponse.symantec.com/avcenter/venc/data/w32.blaster, worm.html
  • 8[8]Cliff Changchun Zou, Don Towsley, Email Virus Propagation Modeling and Analysis, Umass ECE Technical Report TR-03-CSE-04, May, 2003
  • 9[9]Michael Liljenstam, A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations, In: Proceedings of the Tenth IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Computer Society Press, Fort Worth,TX, Oct 2002
  • 10[10]David Moore, Code-Red: A case study on the spread and victims of an Internet worm, In: Presented at the Internet Measurement Workshop (IMW) in 2002

共引文献30

同被引文献136

引证文献16

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部