首页 | 本学科首页   官方微博 | 高级检索  
     

隐蔽型蠕虫传播过程建模与分析
引用本文:郑黎明,邹鹏,贾焰,韩伟红. 隐蔽型蠕虫传播过程建模与分析[J]. 信息网络安全, 2011, 0(9): 9-12,18. DOI: 10.3969/j.issn.1671-1122.2011.09.003
作者姓名:郑黎明  邹鹏  贾焰  韩伟红
作者单位:1. 国防科技大学计算机学院,湖南长沙,410073
2. 装备指挥技术学院,北京,100029
基金项目:国家高技术研究发展计划(863计划)资助项目(2011AA010702); 江苏省基金(BK2010131)
摘    要:
文章针对隐蔽型蠕虫隐蔽性强和传播周期长等特点,引入周期性因素、感染能力差异因素和扫描速率变化等因素,建立了隐蔽型蠕虫的传播模型,通过模拟实验与各类其他蠕虫传播模型进行对比,并通过与真实网络测量数据的比较验证了所提模型的合理性和有效性。

关 键 词:网络安全  隐蔽蠕虫  传播模型  模拟

A Propagation Model for Stealth Worm
ZHENG Li-ming,ZOU Peng,JIA Yan,HAN Wei-hong. A Propagation Model for Stealth Worm[J]. Netinfo Security, 2011, 0(9): 9-12,18. DOI: 10.3969/j.issn.1671-1122.2011.09.003
Authors:ZHENG Li-ming  ZOU Peng  JIA Yan  HAN Wei-hong
Affiliation:ZHENG Li-ming1,ZOU Peng2,JIA Yan1,HAN Wei-hong1 ( 1. School of Computer,National University of Defense Technology,Changsha Hunan 410073,China,2. Academy of Equipment Command and Technology,Beijing 100029,China )
Abstract:
In this paper, a spreading model of the worm with slow rate is constructed. Based on the highly unnoticeable and long period features of the worms, the proposed model incorporates the factors of the period, the difference between infection possibilities and the variation of the scanning rate. The experimental results demonstrate the effectiveness of the proposed model.
Keywords:networking security  stealthy worm  propagation model  simulation  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号