期刊文献+

无尺度网络下的僵尸网络传播模型研究 被引量:2

New propagation model of Botnet on scale-free network
下载PDF
导出
摘要 僵尸网络是一种从传统恶意代码进化而来的新型攻击方式,已成为Internet安全的一个重大威胁。建立僵尸网络的传播模型已成为研究僵尸程序传播特性最有效的一种方法。当前建立的僵尸网络传播模型均是基于随机网络理论的,而实际的Internet是一个具有无尺度特性的复杂网络,因此,这些主流传播模型并不能完全准确反映僵尸程序在Internet的传播特性。提出了一种基于无尺度网络结构的僵尸网络传播模型,根据Internet的实际情况,结合网络流量阻塞这一Internet中的常态现象,重点考虑了真实Internet中节点的增长性和择优连接性。仿真结果表明,该模型不仅符合真实Internet网络中僵尸程序的传播规律和感染特性,而且能够反映出网络中出现拥塞时僵尸程序的感染特性。 Botnet is a novel attack strategy evolved from the traditional malicious softwares. It has become a major threat to Internet security. Propagation model of Botnet has become one of the most efficient methods to research the propagation inherent characteristics of bots. Currently the mainstream propagation model of Botnet is almost based on random network, and the actual Internet is a complex network with scale-free feature, so these mainstream propagation models can not exactly describe how the bots spread on Internet. In this paper, a new propagation model of Botnet on scale-free network is proposed, which considers carefully about the real situation of Internet with network traffic congestion what is a normal phenomenon on Internet, especially two key factors including growth and preferential attachment. The simulation result indicates that this propagation model of Botnet more exactly confirms with the propagation principle and the inflection feature of bots on actual Intemet, and it reflects the infection characteristics ofbots when the network congestion occurs.
出处 《计算机工程与应用》 CSCD 2013年第9期110-114,共5页 Computer Engineering and Applications
基金 国家自然科学基金面上项目(No.60970113)
关键词 无尺度网络 网络安全 僵尸网络 传播模型 网络流量阻塞 scale-free network network security Botnet propagation model network traffic congestion
  • 相关文献

参考文献16

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2Botnet scams are exploding[EB/OL].[2010-05-10].http://www. contentagenda.com/articleXml/LN760999245.html?industryid= 45177.
  • 3Symantec Inc.Internet security threat report,VolumeXI[EB/OL] [2010-05 - 10].http ://eval.symantec.com/mktginfo/enterprise/white_ papers/ent-whitepaper_symantec_internet_security threat report_ x 09 2006.en-us.pdf.
  • 4Symantec Inc.Symantec Internet security threat report, Volu- meX[EB/OL].[2010-05-10].http://eval.symantec.com/mktginfo/ enterprise/white papers/ent-whitepaper_symantec_internet_se- curity_threat report_ix .pdf.
  • 5CNCERT/CC2010年上半年中国互联网网络安全报告[EB/OL].[2010-05-10].http://www.cert.org.cn/articles/docs/common/ 2010092625138.shtml.
  • 6谢静,谭良.半分布式P2P僵尸网络的伪蜜罐检测方法[J].计算机工程,2010,36(14):111-113. 被引量:6
  • 7Dagon D,Zou C C,Lee W.Modeling botnet propagation us- ing time zones[C]//Proc of the 13th Annual Network and Distributed System Security Symp.San Diego,Califomia:[s.n.], 2006.
  • 8Wang L,Zhao X,Pei D,et al.Observation and analysis of BGP behavior under stress[C]//Intemet Measurement Workshop. France: [s.n.], 2002.
  • 9Streftaris G,Gibson G J.Statistical inference for stochastic ep- idemic models[C]//Proc of the 17th IWSM.Chania: [s.n.], 2002 : 609-616.
  • 10Frauenthal J C.Mathematical modeling in epidemiology[M]. New York: Springer-Verlag, 1980.

二级参考文献9

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3Grizzard J B,Sharma V,Nunnery C,et al.Peer-to-Peer Botnets:Overview and Case Study[C] //Proc.of the 1st Workshop on Hot Topics in Understanding Botnets.Boston,USA:[s.n.] ,2007.
  • 4Noh Sang-Kyun,Oh Joo-Hyung,Lee Jae-Seo,et al.Detecting P2P Botnets Using a Multi-phased Folw Model[EB/OL].(2009-03-30).http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4782883.
  • 5Gu Guofei,Porras P,Yegneswaran V,et al.BotHunter:Detecting Malware Infection Through IDS-driven Dialog Correlation[C] // Proc.of the 16th USENIX Security Symposium.Boston,USA:[s.n.] ,2007.
  • 6Wang Ping,Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Botnet[C] //Proc.of the 1st Workshop on Hot Topics in Understanding Botnets.Boston,USA:[s.n.] ,2007.
  • 7诸葛建伟,韩心慧,周勇林,宋程昱,郭晋鹏,邹维.HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J].通信学报,2007,28(12):8-13. 被引量:44
  • 8韩心慧,郭晋鹏,周勇林,诸葛建伟,邹维.僵尸网络活动调查分析[J].通信学报,2007,28(12):167-172. 被引量:14
  • 9诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157

共引文献160

同被引文献26

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部