首页 | 本学科首页   官方微博 | 高级检索  
     

基于拓扑结构的蠕虫防御策略仿真分析
引用本文:王跃武,荆继武,向继,刘琦. 基于拓扑结构的蠕虫防御策略仿真分析[J]. 计算机学报, 2007, 30(10): 1777-1786
作者姓名:王跃武  荆继武  向继  刘琦
作者单位:中国科学院研究生院信息安全国家重点实验室,北京,100049;中国科学院研究生院信息安全国家重点实验室,北京,100049;中国科学院研究生院信息安全国家重点实验室,北京,100049;中国科学院研究生院信息安全国家重点实验室,北京,100049
摘    要:提出了基于拓扑结构控制的蠕虫防御策略,并通过构建仿真模型对其进行了仿真验证分析.首先对蠕虫传播所依赖的拓扑结构的主要形式进行了分析,提出了相应的生成算法,并对算法的有效性进行了验证;随后提出了三种拓扑结构控制策略仿真模型;最后分别对这三种策略在不同拓扑结构下的蠕虫传播控制性能进行了仿真实验.实验结果证明:通过适当地控制拓扑结构,可以有效地遏制拓扑相关蠕虫传播.

关 键 词:仿真  拓扑相关蠕虫  拓扑结构  蠕虫防御策略
修稿时间:2007-04-06

A Simulation Analysis of Worm Defense Strategies Based on Topology Structure
WANG Yue-Wu,JING Ji-Wu,XIANG Ji,LIU Qi. A Simulation Analysis of Worm Defense Strategies Based on Topology Structure[J]. Chinese Journal of Computers, 2007, 30(10): 1777-1786
Authors:WANG Yue-Wu  JING Ji-Wu  XIANG Ji  LIU Qi
Affiliation:State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, Beijing 100049
Abstract:Topology aware worms have been an important security threat on the Internet.They can spread across the Internet quickly,through topology structure information.If the topology structure were destroyed by defense strategies,the worm propagation can be held back effectively.Thus,in order to design effective topology aware worm defense strategies,it is necessary to analyze the relationship between worm defense strategies and topology structure.This paper provides a systemic analysis of worm defense strategies based on topology structure through packet level worm simulation.First the major topology structures used by topology aware worms and their generation algorithms are analyzed.Then,three defense strategy models are drawn from mainstream worm defense strategies.Finally,these defense strategies in different topology structure are analyzed with simulation experiments,and some interesting conclusions are drawn from these experiment results.These conclusions can provide valuable guidelines for real defense system implementation.
Keywords:simulation  topology aware worm  topology structure  worm defense strategies
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号