期刊文献+

Research on the Propagation Models and Defense Techniques of Internet Worms

Research on the Propagation Models and Defense Techniques of Internet Worms
下载PDF
导出
摘要 Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out. Internet worm is harmful to network security,and it has become a research hotspot in recent years.A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper.We first give its strict definition and discuss the working mechanism.We then analyze and compare some repre-sentative worm propagation models proposed in recent years,such as K-M model,two-factor model,worm-anti-worm model(WAW),firewall-based model,quarantine-based model and hybrid benign worm-based model,etc.Some typical defense techniques such as virtual honeypot,active worm prevention and agent-oriented worm defense,etc.,are also discussed.The future direction of the worm defense system is pointed out.
出处 《Journal of Electronic Science and Technology of China》 2008年第1期32-38,共7页 中国电子科技(英文版)
基金 supported by the Research Fund for the National Committee of China under Grant No. 05XN09
关键词 Defense system Internet worm network security propagation model Defense system, Internet worm,network security, propagation model
  • 相关文献

参考文献4

二级参考文献31

  • 1杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 2张运凯,王方伟,张玉清,马建峰.蠕虫病毒的传播机制研究[J].计算机应用研究,2005,22(4):137-139. 被引量:13
  • 3王佰玲,方滨兴,云晓春,张宏莉,陈博,刘乙璇.基于平衡树的良性蠕虫扩散策略[J].计算机研究与发展,2006,43(9):1593-1602. 被引量:8
  • 4Seeley D.A Tour of the Worm[DB/OL].http://securitydigest.org/phage/resource/seely.pdf,2004-10-30.
  • 5Zou C C,Towsley D,Gong W.On the Performance of Internet Worm Scanning Strategies[DB/OL].http://www.cs.ucf.edu/~czou/research/wormStrategy-elsevier.pdf,2003-11-20.
  • 6Zou C C,Gong W,Towsley D.Code Red Worm Propagation Modeling and Analysis[A].In 9th ACM Symposium on Computer and Communication Security[C].New York:ACM Press,2002.138-147.
  • 7Zou C C,Towsley D,Gong W.A Firewall Network System for Worm Defense in Enterprise Networks[DB/OL].http://www.cs.ucf.edu/~czou/research/FirewallNetwork-techreport.pdf,2004-06-08.
  • 8Staniford S,Paxson V, Weaver N. How to own the Internet in your spare time. In:Proc. of the USENIX Security Symposium, 2002. 8:149-167
  • 9Weaver N. Warhol worms:the potential for very fast Internet plagues,http://www.cs.berkeley.edu/-nweaver/warhol.html
  • 10Zou Cliff Changchun,Gong W, Towsley D F. Code red worm propagation modeling and analysis. In: ACM Corf. on Computer and Communications Security,2002.138-147

共引文献200

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部