期刊文献+

Conficker蠕虫传播模型 被引量:2

Propagation Model for Conficker Worm
原文传递
导出
摘要 "飞客"(conficker)蠕虫病毒是近期在全球爆发的以微软的windows操作系统为攻击目标的计算机蠕虫病毒,从爆发至今,感染数量巨大,形成了巨大规模的僵尸网络,对互联网安全形成了巨大的威胁.采用域名重定向技术监测conficker蠕虫的扩散传播,针对其查杀率低,传播周期长的特点,考虑地域、连通性等因素所导致的感染主机传播能力的差异,建立conficker蠕虫传播模型,最后通过真实的conficker蠕虫监测数据验证了模型的有效性. Conficker is a worm outbreak recently and attack Microsoft's windows operating system.So far, it has infected a large number of computers, which form a large botnet and became a huge threat to the security of the internet.In this paper, the redirect technology of domain name is used to monitor the conficker worm.For it's low killing rate and longterm period of propagation, we build a propagation model for conficker worm which take into account the geography, connectivity and other factors cause difference in propagation capacity of computer, and finally verify the validity of the model with the real monitoring data.
出处 《数学的实践与认识》 CSCD 北大核心 2010年第12期89-97,共9页 Mathematics in Practice and Theory
基金 国家高技术研究发展计划(863计划)(2007AA010502 2007AA01Z474 2006AA01Z451)
关键词 conficker 蠕虫 僵尸网络 传播 conficker worm botnet propagation
  • 相关文献

参考文献11

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2Dagon D, Zou CC, Lee W. Modeling botnet propagation using time zones[C]//In: Proe. of the 13th Annual Network and Distributed System Security Symp. (NDSS 2006). 2006.
  • 3Kephart J O, White S R. Directed-graph Epidemiological Models of Computer Viruses[C]//Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, California,USA: IEEE Computer Society Press, 1991: 343-359.
  • 4Zou CC, Gong W, Towsley D. Code red worm propagation modeling and analysis[C]//In: Atluri V, ed. Proc. of the 9th ACM Conf. on Computer and Communications Security (CCS 2002). New York: ACM Press, 2002. 138-147.
  • 5李光正,史定华.小世界网络上随机SIS模型分析[J].计算机工程,2009,35(12):120-122. 被引量:3
  • 6Kim J, Radhakrishnan S, Dhall SK. Measurement and analysis of worm propagation on Internet network topology[C]//In: Proc. of the IEEE Int'l Conf. on Computer Communications and Networks (ICCCN 2004). 2004. 495-500.
  • 7Zou CC, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense[J]. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). New York: ACM Press, 2003, 51-60.
  • 8Zou CC, Towsley D, Gong W. On the performance of Internet worm scanning strategies[J]. Elsevier Journal of Performance Evaluation, 2005, 63(7): 700-723.
  • 9Wierman J C, Marchette D J. Modeling Computer Virus Prevalence with a Susceptible-infected- susceptible Model with Reintroduction[J]. Computational Statistics & Data Analysis, 2004, 45(1): 3-23.
  • 10Richard F, Mark B, Alexander B. Predation and the Cost of Replication: New Approaches to Malware Prevention?[J]. Computers &: Security, 2006, 25(4): 257-264.

二级参考文献8

共引文献159

同被引文献17

  • 1Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. On Detecting Camouflaging Worm[R]. Annual Computer Security Applications Conference (ACSAC), 2006.
  • 2Phillip Porras, Hassen Saidi,Vinod Yegneswaran. A Foray into Conficker's Logic and Rendezvous Points. In USENIX Workshop on Large Scale Exploits and Emergent Threats(LEET), 2009.
  • 3Jeffrey O. Kephart, David M. Chess, Steve R. White. Computers anti Epidemiology. IEEE Spectrum. 1993.
  • 4Stuart Staniford, Vern Paxson, Nicholas Weaver. How to own the Internet in you space time. Processing of the 11th USEN/X Security Symposium(Sceurity), 2002.
  • 5Cliff Changchun Zou, Weibo Gong, Don Towsley. Code Red Worm Propagation Modeling and Analysis. ACM Conference on Computer and Communications Security (CCS), 2002.
  • 6Zesheng Chen, Lixin Gao, Kevin Kwiat. Modeling the Spread of Active Worms[M]. INFOCOM, 2003. 1890-1900.
  • 7David Dagon, Cliff Zou, Wenke Lee. Modeling Botnet Propagation Using Time Zones[M]. Network and Distributed System Security Symposium(NDSS), 2006.
  • 8Justin Ma, Geoffrey M, Voelker, Stefan Savage. Self-Stopping Worms[C]. ACM workshop on Rapid Malcode(WORM). 2005.12-21.
  • 9Wei Yu, Xun Wang, Dong Xuan, David Lee. Effective Detection of Active Worms with Varying Scan Rate[R]. IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), 2006.
  • 10Aaron Clauset, Cosma Rohilla Shalizi, Newman M E J. Power-law distributions in empirical data[M]. SIAM Review 51, 2009. 661-703.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部