期刊文献+

无尺度网络下具有双因素的僵尸网络传播模型 被引量:5

Botnet Propagation Model with Two-factor on Scale-free Network
在线阅读 下载PDF
导出
摘要 随着网络技术的发展,僵尸网络逐渐成为Internet上最具威胁的攻击平台。而现今的网络是随机网络、无尺度网络等构成的一个复杂网络。结合无尺度的特性,考虑僵尸网络传播过程中部分主机的免疫特性与网络阻塞特征,提出一种无尺度网络下具有双因素的僵尸网络传播模型。该模型基于Internet的实际情况,重点考虑了无尺度网络的拓扑结构,并结合了僵尸网络中部分脆弱主机由于提前从易感染的网络中移除而具有的免疫特征情况与传播过程中的网络流量阻塞情况。Matlab仿真结果表明,这种传播模型更符合真实网络中僵尸网络的传播规律。 With the developing of network, bother has become a major threat attack platform to Internet. The current network is a complex network consisting of the random network and the scale-free network. This paper, combining the features of scale-free network,immunity and network traffic congestion, proposed a new botnet propagation model with two-factor on Scale-free network. This model considers carefully the real situation of the Internet, especially the Scalefree network topology, immunity of the host removed from the susceptible network in advance and network traffic con gestion. Simulation result shows that the hornet propagation model more exactly satisfies the practical propagation laws and infection characteristics of bot on Internet.
出处 《计算机科学》 CSCD 北大核心 2012年第10期78-81,114,共5页 Computer Science
基金 国家自然科学基金面上项目(60970113)资助
关键词 无尺度网络 僵尸网络 僵尸程序 传播模型 免疫特征 网络流量阻塞 Scale-free network,Botnet,Bot,Propagation model,Immunity,Network traffic congestion
  • 相关文献

参考文献17

  • 1Barabasi A L, Albert R. Emergence of Scaling in Random Net- works[J]. Science Magazine, 1999,286(5439) :509-512.
  • 2Watts D J, Strogatzx S H. Collective Dynamics of"Small-World" Networks[J]. Nature, 1998,393 (6684) : 440-442.
  • 3Liu Li-juan. Research on Dyamic Etworking of Scale-Free Net- work[R]. TP393. Harbin Institute of Technology,2007.
  • 4洪征,吴礼发,王元元.三种构建无尺度蠕虫网络的蠕虫传播模型[J].吉林大学学报(工学版),2008,38(3):690-694. 被引量:7
  • 5张伟.僵尸网络综述[J].软件导刊,2008,7(9):188-189.
  • 6http://www, isc. org. cn/20020417/ca290326, htm.
  • 7Symantec Inc. Symantec Internet security threat report: Trends for July 06 - December06. VolumeXL 2007 [OL]. http://eval. symantee, com/mktginfo/enterprise/white_ papers/ent-whitepa- per_symantec_internet_security_threat_report x 09 2006. en- us. pdf.
  • 8Streftaris G,Gibson G J. Statistical Inference for Stochastic Epi- demic Models[C]//Proe. of the 17th 1WSM. Chania: [s. n. ], 2002 : 609-616.
  • 9Frauenthal J C. Mathematical Modeling in Epidemiology[M]. New York: Springer-Verlag, 1980.
  • 10Zou C C, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense[C]// Proceedings of the ACM CCS Workshop on Rapid Malcode. 2003:51-6.

二级参考文献47

  • 1唐芙蓉,蔡绍洪,李朝辉.无标度网络的嵌入-删除-补偿模型的建立及分析[J].中国矿业大学学报,2005,34(3):390-393. 被引量:13
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3BARABASI A L, ALBERT R. Emergence of scaling in random net- works[J]. Science,1999,286(5439) :509-512.
  • 4WATTS D J, STROGATZ S H. Collective dynamics of "small-world" networks [ J ]. Letters to Nature, 1998,393 (6684) :440-442.
  • 5LIU Li-juan. Research on dyoamie networking of scale-free network [ D]. Harbin :Harbin Institute of Technology,2007.
  • 6ZHENG Hong, WU Li-fa, WANG Yuan-yuan. Three worm propagation models to establish scale-free worm network [ J]. Journal of dJlin Uni- versity: Engineering and Techology Edition ,2008, 38 (5).
  • 7GUO Hong-gang, FANG Yang. On current situation an harm of botnet crime [ D ]. Shijiazhuang : Hebei Normal University,2008.
  • 8http ://www. isc. org. cn/20020417/ca290326, htm[ EB/OL].
  • 9STREFTARIS G, GIBSON G J. Statistical inference for stochastic epi- demic models[ C]//Proc of the 17th IWSM. 2002:609-616.
  • 10FRAUENTHAL J C. Mathematical modeling in epidemiology [ M ]. New York : Springer-Verlag, 1980.

共引文献29

同被引文献80

  • 1李跃,翟立东,王宏霞,时金桥.一种基于社交网络的移动僵尸网络研究[J].计算机研究与发展,2012,49(S2):1-8. 被引量:10
  • 2Leder W. Know Your Enemy: Containing Conficker [R]. The Honeynet Project Research Alliance, University of Bonn, Germany, 2009.
  • 3Royal P. On the kraken and bobax bomets[R/OL], http://www.damballa, com/downloads/r_pubs/Kraken Respons pdf, 2009.
  • 4Stone-Gross ],Cova M,Vigna G. Your Botnet is My Botnet:A- nalysis of A Botnet Takeover [C]//ACM Conference on Com- puter and Communications Security(CCS). 2009:635-647.
  • 5Yadav S, Reddy A, Ranjan S. Detecting Algorithmically Genera- ted Malicious Domain Names [A]//10th Annual ACM Confer- ence on Internet Measurement[C]. New York,USA, 2010:48-61.
  • 6Stalmans E, Irwin B. A Framework for DNS Based Detection and Mitigation of Malware Infections on a Network [A]//lnfor- mation Security South Africa(ISSA)[C]. 2011:76-83.
  • 7Jiang N, Zhang Z. Identifying Suspicious Activities through DNS Failure Graph Analysis [A]//Network Protocols (ICNP), the 18th IEEE International Conference [C]. 2010:144-153.
  • 8Yadav S, Reddy A N. Winning with DNS Failures: Strategies for Faster Botnet Detection [A]// 7th International ICST Confe- rence on Security and Privacy in Communication Networks [C]. 2011:133-145.
  • 9Hao S, Feamster N, Pandrangi. An Internet Wide View into DNS Lookup Patterns[R/OL] http://labs, verisignine, corn/ projects/malicious-domain-names, html, 2010.
  • 10Antonakakis M,Perdisci R, Dagon D, et al. Building A Dynamic Reputation System for DNS[A]//the Proceedings of 19th USENIX Security Symposium ( USENIX Security ' 10 ) [ C]. 2010 : 273-289.

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部