期刊文献+

网电空间中基于蠕虫的攻防对抗技术研究 被引量:1

Research on Attack-defense Countermeasure Technology Based on Worm in Cyberspace
在线阅读 下载PDF
导出
摘要 随着网电空间战略地位的提高,其对抗技术已成为研究的热点。针对网电空间对抗建模问题,以典型的网电空间蠕虫为研究对象,采用建立蠕虫攻击传播模型和蠕虫防御模型的方法,对基于蠕虫的网电空间攻防对抗建模技术进行研究。分析蠕虫扫描策略及目的不可达报文检测方法,建立基于选择性随机扫描策略的蠕虫传播模型。在该模型的基础上,提出基于蠕虫签名的防御方法及改进措施,并设计蠕虫综合对抗模型。仿真结果表明,与基于签名的防御方法相比,综合防御方法能更有效地抑制蠕虫传播。 With the improvement of the strategic position of cyberspace, the technology of network countermeasure becomes a research focus in cyberspace. In order to overcome the problem of building the coutermeasure model in cyberspce, this paper takes worm as research object and researches the attack-defense countermeasure technology based on building the worm propagation model and the worm defense model. Firstly, a worm propagation model based on the strategy of selective-random scan is built by the analysis of the scanning strategy and the detection method. Then, at the basis of the worm propagation model, the defense method of Internet worm and improvement measures is proposed with the worm signature. In the end, this paper builds a comprehensive-countermeasure model. Simulation experimental result shows that the method of comprehensive defense can inhibit worm propagation more effectively than the method of the worm signature technology.
出处 《计算机工程》 CAS CSCD 2013年第11期119-122,共4页 Computer Engineering
关键词 网电空间 网络蠕虫 蠕虫传播模型 数字签名 综合防御 攻防对抗 cyberspace network worm worm propagation model digital signature integrated defense attack-defense countermeasure
  • 相关文献

参考文献11

  • 1马林立.外军网电空间战-现状与发展[M].北京:国防工业出版社,2012:57-58.
  • 2Shoch J F, Hupp J A. The Worm Programs: Early Experience with a Distributed Computation[J]. Communications of the ACM, 1982, 25(3): 172-180.
  • 3Moore D, Shannon C, Brown J. Code-Red: A Case Study on the Spread and Victims of an Internet Worm[C]//Proc. of ACM SICGOMM Internet Measurement Workshop. Marseille, France: ACM Press, 2002.
  • 4刘玉岭,冯登国,吴丽辉,连一峰.基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J].软件学报,2012,23(3):712-723. 被引量:34
  • 5姜伟,方滨兴,田志宏,张宏莉.基于攻防随机博弈模型的防御策略选取研究[J].计算机研究与发展,2010,47(10):1714-1723. 被引量:77
  • 6文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 7Fyodor. The Art of Port Scanning[J]. Phrack Magazine, 1997, 51(7): 11-17.
  • 8Zou C C, Towsley D, Gong W. On the Performance of Internet Worm Sacnning Strategies[D]. Amherst, USA: University of Massachusetts, 2006.
  • 9谢希仁.计算机网络[M].北京:电子工业出版社,2006:351-374.
  • 10Bakos G, Berk V H. Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Messages[C]// Proc. of the SPIE Aerosense 2002. Washington D. C., USA: [s. n.], 2002.

二级参考文献30

  • 1冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 2方滨兴.解读信息安全创新突破点[OL].[2008-03-21].http://www.cert.org.cn/articles/news/common/2007051823317.shtml,2008.
  • 3Nash J.Equilibrium points in n-person games[J].Proc of the National Academy of Sciences of the United States of America,1950,36(1):48-49.
  • 4Lee W.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22.
  • 5Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824.
  • 6Syverson P F.A different look at secure distributed computation[C]//Proc of the 1997 IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society,1997:109-115.
  • 7Burke D.Towards a game theory model of information warfare[D].Montgomery,AL:Air force Institute of Technology,Air University,1999.
  • 8Lye Kong-wei,Wing J.Game strategies in network security.International Journal of Information Security,2005,4(1/2):71-86.
  • 9Liu P,Zang W.Incentive-based modeling and inference of attacker intent,objectives,and strategies[C]//Proc of the 10th ACM Computer and Communications Security Conf (CCS03).New York:ACM,2003:179-189.
  • 10Jiang Wei,Tian Zhihong,Zhang Hongli,et al.A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision[C]//Proc of 2008 IEEE Int Conf on Networking,Sensing and Control.Washington:IEEE Computer Society,2008:648-653.

共引文献314

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部