期刊文献+

一种P2P网络中基于良性蠕虫遏制反应式蠕虫的策略 被引量:1

A Strategy Based on Benign Worm Against Reactive Worm in P2P Networks
在线阅读 下载PDF
导出
摘要 针对P2P网络的反应式蠕虫,提出基于良性蠕虫的优先传播恶性感染节点的邻居节点(PRIN)遏制策略.蠕虫传播模型给出后,分析了PRIN策略的特点和可行性,并进行仿真实验.实验结果表明,与传统策略相比,PRIN策略进一步提高了蠕虫遏制效果,1‰数量的良性蠕虫即可有效遏制反应式蠕虫的传播,并在策略具体实施上忽略了良性蠕虫驻留节点类型的影响,降低了策略实施的复杂性. The strategy,prior reaction to infected peers' neighbors(PRIN) based on benign worm,was proposed to defend against reactive worm in P2P networks.After worm spread models were formulated,the characteristics and feasibility of PRIN strategy were analyzed and the simulations were given.The results show that the containment effect of PRIN strategy against worm is better than that of the traditional strategy.Only 1‰ peers infected by benign worm can effectively contain the spread of reactive worm.Moreover,the impact of the type of peers infected by benign worm is neglected and the complexity of implementation of PRIN strategy is reduced.
出处 《信阳师范学院学报(自然科学版)》 CAS 北大核心 2012年第2期253-257,共5页 Journal of Xinyang Normal University(Natural Science Edition)
基金 重庆三峡学院青年项目(11QN-28)
关键词 P2P网络 网络安全 传播模型 反应式蠕虫 良性蠕虫 P2P networks network security propagation model reactive worm benign worm
  • 相关文献

参考文献7

  • 1Staniford S,Paxson V,Weaver N.How to own the internet in your spare time[C]//Proceedings of the 11th USENIX Security Symposium.Berke-ley:CA,USA,2002:149-167.
  • 2Zhou L,Zhang L,Mcsherry F,et al.A first look at peer-to-peer worms:threats and defenses[C]//Proceedings of the Peer-to-Peer Systems 4th In-ternational Workshop.Ithaca:NY,USA,2005:24-35.
  • 3夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 4Hatahet S,Bouabdallah A,Challal Y.A new worm propagation threat in BitTorrent:modeling and analysis[C]//International Multiconferenceon Computer Science and Information Technology.Wisla:Poland,2008:791-798.
  • 5Fan X,Xiang Y.Modeling the propagation of peer-to-peer worms[J].Future Generation Computer Systems,2010,26:1433-1443.
  • 6Tang Y,Luo J,Xiao B,et al.Concept,characteristics and defending mechanism of worms[J].IEICE Transactions on Information and Systems,2009,E92-D(5):799-809.
  • 7周翰逊,赵宏,闻英友.分而治之的混合型良性蠕虫的建模与分析[J].计算机研究与发展,2009,46(7):1110-1116. 被引量:12

二级参考文献30

  • 1杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3王超,卿斯汉,何建波.基于混合对抗技术的对抗性蠕虫[J].通信学报,2007,28(1):28-34. 被引量:7
  • 4周翰逊,赵宏.主动良性蠕虫和混合良性蠕虫的建模与分析[J].计算机研究与发展,2007,44(6):958-964. 被引量:16
  • 5Kienzle D M,Elder M C.Recent worms:A survey and trends[C] //Staniford S.Proc of the ACM CCS Workshop on Rapid Malcode(WORM 2003).New Yorkk ACM,2003:1-10.
  • 6Moore D,Shannon C,Brown J.Code-Red:A case study on the spread and victims of an Internet worm[C]//Proc of the 2rid ACM S1GCOMM Workshop on Internet Measurement.New York:ACM,2002:273-284.
  • 7Moore D.Paxson V,Savage S,et al.Inside the slammer worm[J].IEEE Magazine of Security and Privacy,2003,1 (4):33-39.
  • 8Zhou Hanxun,Wen Yingyou,Zhao Hong.Detecting early worm propagation based on entropy[C]//Proc of the 2nd Int Conf on Scalable Information Systems.New York:ACM,2007:1-2.
  • 9Schechter Stuart,Jung Jaeyeon,Berger Arthur W.Fast detection of scanning worm infections[C] //Proc of the 7th Int Symp on Recent Advancesin Intrusion Detection(RAID).Berlin:Springer,2004:59-81.
  • 10Castaneda Frank,Sezery Emre Can,Xu Jun.WORM vs WORM:Preliminary study of an active counter-attack mechanism[C] //Staniford S.Proc of the ACM CCS Workshop on Rapid Malcode(WORM 2003).New York:ACM,2004:83-93.

共引文献35

同被引文献11

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部