期刊文献+

IPv6网络中的蠕虫传播模型 被引量:1

Worm propagation model in IPv6 networks
下载PDF
导出
摘要 基于IPv6网络环境,构建了一种新型网络蠕虫—WormIPv6,对其扫描策略进行了分析研究,在此基础上分别建立SEM模型和KM模型,分别仿真WormIPv6的传播趋势。仿真实验结果表明,由于IPv6中巨大的地址空间,IPv6网络对于随机扫描蠕虫有天然的抵抗能力,在IPv6网络中,使用随机扫描策略的蠕虫根本无法传播,网络蠕虫会利用其他扫描策略。 In IPv6 network environment,a new type of worm,WormIPv6 is presented in IPv6 network.Based on the analysis and research of the scanning strategy of WormIPv6,Simple Epidemic Model(SEM) and Kermack-Mckendriek model(KM) are established for simulating the propagation of WormIPv6.The results of simulation experiment show that IPv6 network can defend against random-scanning worms due to its huge address space.It is impossible that random-scanning worms propagate in IPv6 network and Internet worm will use other scanning strategy.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第6期78-81,共4页 Computer Engineering and Applications
基金 国家部委应用基础资金资助项目
关键词 IPV6 网络蠕虫 蠕虫扫描策略 蠕虫传播模型 Internet Protocol Version 6(IPv6) Internet worm worm scanning strategy worm propagation model
  • 相关文献

参考文献11

  • 1Moore D,Shannon C,Brown J.Code-Red:A case study on the spread and victims of an Internet worm[C]//Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement,Pittsburgh, 2002 : 273-284.
  • 2Staniford S,Paxson V,Weaver N.How to own the Internet in your spare time[C]//Proceedings of the lhh Usenix Security Symposium, San Francisco, 2002 : 149-167.
  • 3Hinden R,Deering S.RFC 4291 IP Version 6 addressing architecture[S].Internet Engineering Task Force,2006.
  • 4Streftaris G,Gibson G J.Statistical inference for stochastic epidemic models[C]//Proc of the 17th Int'l Workshop on Statistical Modelling, Chania, 2002 : 609-616.
  • 5Frauenthal J C.Mathematical modeling in epidemiology [M].New York : Springer-Verlag, 1980.
  • 6Droms R.RFC 3315 Dynamic host configuration protocol for IPv6 (DHCPv6)[S].Internet Engineering Task Force,2003.
  • 7Lemon T.RFC 4361 Node-specific client identifiers for dynamic host configuration protocol version four(DHCPv4)[S].Internet Engineering Task Force, 2006.
  • 8Thomson S,Narten T.RFC 4862 IPv6 stateless address autoconfiguration[S].Intemet Engineering Task Force,2007.
  • 9刘烃,郑庆华,管晓宏,陈欣琦,蔡忠闽.IPv6网络中蠕虫传播模型及分析[J].计算机学报,2006,29(8):1337-1345. 被引量:9
  • 10Narten T,Nordmark E,Simpson W.RFC 4861 Neighbor discovery for IP version 6(IPv6)[S].Internet Engineering Task Force,2007.

二级参考文献19

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2张运凯,王长广,王方伟,马建峰.“震荡波”蠕虫分析与防范[J].计算机工程,2005,31(18):65-67. 被引量:8
  • 3Spafford E. H.. The Internet worm program: An analysis. Department of Computer Science, Purdue University, West Lafayette: Technical Report CSD-TR-823, 1988, 1-29
  • 4Moore D. , Shannon C. , Brown J.. Code-Red: A case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, Pittsburgh, 2002, 273-284
  • 5Shannon C. , Moore D.. The spread of the witty worm. IEEE Security & Privacy, 2004, 2(4): 46-50
  • 6Hinden R. , Deering S.. Internet Protocol Version 6 (IPv6) Addressing Architecture. RFC 3513, Internet Engineering Task Force, 2003
  • 7Wagner A. et al. Experiences with worm propagation simulations. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode(WORM'03), Washington, 2003, 34-41
  • 8Zou C.C. et al. Routing worm: A fast, selective attack worm based on IP address information. Electrical and Computer Engineering Department, University of Massachusetts: Technical Report TR-03-CSE-06, 2003
  • 9Kamra A. et al. The effect of DNS delays on worm propagation in an IPv6 Internet. In: Proceedings of the IEEE INFOCOM 2005, Miami, 2005, 2405-2414
  • 10Staniford S. , Paxson V. , Weaver N.. How to own the Internet in your spare time. In: Proceedings of the llth Usenix Security Symposium, San Francisco, 2002, 149-167

共引文献8

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部