期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Research on the Propagation Models and Defense Techniques of Internet Worms
1
作者 Tian-Yun Huang 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页
Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give... Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. 展开更多
关键词 Defense system internet worm network security propagation model
在线阅读 下载PDF
Simulating Greedy Propagation of P2P Worms 被引量:1
2
作者 Guo-Zheng Wu Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2010年第4期307-311,共5页
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o... Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network. 展开更多
关键词 Greedy propagation internet worms peer-to-peer network peer-to-peer worms worms propagating.
在线阅读 下载PDF
Research of internet worm warning system based on system identification
3
作者 Tao ZHOU Guanzhong DAI Huimin YE 《控制理论与应用(英文版)》 EI 2006年第4期409-412,共4页
The frequent explosion of Internet worms has been one of the most serious problems in cyberspace security.In this paper,by analyzing the worm's propagation model,we propose a new worm warning system based on the m... The frequent explosion of Internet worms has been one of the most serious problems in cyberspace security.In this paper,by analyzing the worm's propagation model,we propose a new worm warning system based on the method of system identification,and use recursive least squares algorithm to estimate the worm's infection rate.The simulation result shows the method we adopted is an efficient way to conduct Internet worm warning. 展开更多
关键词 Cyberspace security internet worm System identification Recursive least squares
在线阅读 下载PDF
Modeling and analysis of gradual hybrid anti-worm
4
作者 李军群 秦拯 +3 位作者 欧露 O.Salman A.X.Liu 杨金民 《Journal of Central South University》 SCIE EI CAS 2011年第6期2050-2055,共6页
The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering maliciou... The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW. 展开更多
关键词 network security internet worm anti-worm vulnerable host propagation model
在线阅读 下载PDF
Analysis of SVEIR worm attack model with saturated incidence and partial immunization 被引量:2
5
作者 WANG Fangwei HUANG Wenyan +1 位作者 SHEN Yulong WANG Changguang 《Journal of Communications and Information Networks》 2016年第4期105-115,共11页
Internet worms can propagate across networks at terrifying speeds,reduce network security to a remarkable extent,and cause heavy economic losses.Thus,the rapid elimination of Internet worms using partial immunization ... Internet worms can propagate across networks at terrifying speeds,reduce network security to a remarkable extent,and cause heavy economic losses.Thus,the rapid elimination of Internet worms using partial immunization becomes a significant matter for sustaining Internet infrastructure.This paper addresses this issue by presenting a novel worm susceptible-vaccinated-exposed-infectious-recovered model,named the SVEIR model.The SVEIR model extends the classical susceptible-exposed-infectious-recovered model(refer to SEIR model)through incorporating a saturated incidence rate and a partial immunization rate.The basic reproduction number in the SVEIR model is obtained.By virtue of the basic reproduction number,we prove the global stabilities of an infection-free equilibrium point and a unique endemic equilibrium point.Numerical methods are used to verify the proposed SVEIR model.Simulation results show that partial immunization is highly effective for eliminating worms,and the SVEIR model is viable for controlling and forecasting Internet worms. 展开更多
关键词 internet worm attack model STABILITY saturated incidence partial immunization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部