期刊文献+

蠕虫扩散策略自动生成模型

Auto-generation Model of Worm Diffusion Strategy
下载PDF
导出
摘要 针对蠕虫扩散的通用性、灵活性和可扩展性受限制问题,提出一种基于扩散策略树的蠕虫扩散策略自动生成模型。基于该模型设计了一种描述语言,描述蠕虫的扩散过程,并通过语言翻译器实现蠕虫的扩散。形式化论证了该语言的蠕虫扩散描述能力,构造模型的结构框架,阐述其工作流程。该模型理论上能实现较为普遍的扩散过程。 The commonality, flexibility and extensibility of the worm diffusion are limited, so an auto-generation model of worm diffusion strategy based on diffusion strategy tree is proposed. Based on the model, a description language is designed to descript the procession of worm diffusion and implement the worm diffusion with language interpreter. The paper formally demonstrates the worm diffusion description ability of the language, constructs the framework of the model, and expounds its work flow. Theoretically the model can achieve more prevalent diffusion process.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第6期161-163,共3页 Computer Engineering
基金 广西自然科学基金资助项目(0640069)
关键词 蠕虫 扩散策略 描述语言 worm diffusion strategy description language
  • 相关文献

参考文献5

  • 1Tidwell T, Larson R, Fitch K, et al. Modeling Internet Attacks[C]// Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. Oakland, CA: [s. n.], 2001.
  • 2Kienzle D M, Elder M C. Recent Worms: A Survey and Trends[C]//Proc. of the ACM CCS Workshop on Rapid Malcode. Washington D.C.: [s, n.], 2003.
  • 3Gebhart G. Worm Propagation and Countermeasures[R]. SANS Institute, 2004.
  • 4Bishop M, Bailey A. Critical Analysis of Vulnerability Taxonomies[D]. Department of Computer Science, University of California at Davis, 1996.
  • 5严芬,黄皓.攻击行为系统化分析方法[J].计算机科学,2006,33(10):93-96. 被引量:2

二级参考文献13

  • 1刘欣然.网络攻击分类技术综述[J].通信学报,2004,25(7):30-36. 被引量:36
  • 2Stallings W.Network and Internet Work Security Principles and Practice.NJ:Prentice Hall,1995
  • 3Li M,Jia W,Zhao W.Decision Analysis of Network-Based Intrusion Detection Systems for Denial of Service Attacks.0-7803-7010-4/01,IEEE,2001
  • 4Kumar S.Classification and detection of computer intrusions:[Ph D Thesis].Purdue University,1995
  • 5Conen F.Information system attacks:a preliminary classification scheme[J].Computers and Security,1997,16 (1):29~46
  • 6Landwehr C E,Bull A R,McDermott J P,et al.A taxonomy of computer program security flaws.ACM Computing Surveys,1994,26(3):211~254
  • 7Bishop M.A Taxonomy of (Unix)System and Network Vulnerabilities:[Technical Report].CSE-9510.Department of Computer Science,University of California at Davis,May 1995
  • 8Bishop M.Vulnerabilities analysis[A].Second International Symposium on Recent Advances in Intrusion Detection[C].USA,1999
  • 9Lindqvist U,Jonsson E.How to Systematically Classify Computer Security Intrusions.In:IEEE Symposium on Security and Privacy.Oakland,California,USA,1997.154~163
  • 10Howard J D.An Analysis of Security Incidents on the Internet:[Ph D dissertation].West Lafayette,USA:Carnegie Mellon University,1997

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部