期刊文献+

良性网络蠕虫研究与进展 被引量:1

Research and Development of benign Worms
在线阅读 下载PDF
导出
摘要 较为全面论述目前良性网络蠕虫的研究概况,给出良性网络蠕虫的完整定义,良性网络蠕虫的功能结构和扫描、扩散策略,分析可控性策略,讨论传播模型,对良性网络蠕虫的研究发展和应用前景进行乐观地展望。 In this paper, the concept and research situation of benign worm, then the exploration function component and the scanning strategies and propagation strategies are present, and then we discuss the control ability condition of the benign worm. Finally, it makes optimistic prospect to this area.
作者 崔惠鹏
出处 《计算机与数字工程》 2007年第10期77-79,共3页 Computer & Digital Engineering
关键词 网络蠕虫 良性蠕虫 恶意蠕虫 可控性 internet worm,benign worm,bad-worm,control ability
作者简介 崔惠鹏,男,硕士研究生,研究方向:计算机安全。
  • 相关文献

参考文献8

  • 1Hyogon Kim, Inhye Kang. On the functional validity of the worm -killing worm[ J]. 2004. IEEE Communications Society, 1902- 1906
  • 2Yi - Xuan Liu, Xiao - Chun Yun, Bailing Wang. QBTP worm, an antiworm with balanced tree based spreading strategy. Hai - Bin Sun Dept. of Comput. Sci. Harbin Inst. Of Technol. , China; Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on
  • 3Stuart Stanford, Vern Paxson, Nicholas Weaver. Silicon Defense. How to Own the Internet in Your Spare Time. ICSI Center for Internet research, UC Berkeley. May, 2002
  • 4文伟平.恶意代码机理及防范技术[D].[博士学位论文],北京,中科院软件研究所,2004
  • 5文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 6郑辉.internet蠕虫研究[D]:博士论文.南开大学,2002.
  • 7刘乙璇,王佰玲,云晓春.轻负载、速度快的良性蠕虫传播策略[J].哈尔滨商业大学学报(自然科学版),2005,21(5):620-628. 被引量:4
  • 8杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27

二级参考文献36

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2[2]CERT Advisory CA-2001-23. Continued Threat of the "Code Red Ⅱ" Worm. http:∥www. cert. org/advisories/CA-2001-23 .html
  • 3[3]Moore D. The Spread of the Code-Red Worm (CRv2). http:∥www. caida.org/analysis/security/-code-red/coderedv2 analysis.xml, Nov 2001
  • 4[4]Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time. In: Proc of the USENIX Security Symposium, 2002
  • 5[5]Das Bistro Project's anti-code-red default.ida. http:∥www. dasbitro.com/default.ida
  • 6[6]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32/Nachi. A,http:∥www. f-prot.com/virusinfo/descriptions/nachi_A.html
  • 7[7]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32.Blaster. Worm,http:∥securityresponse.symantec.com/avcenter/venc/data/w32.blaster, worm.html
  • 8[8]Cliff Changchun Zou, Don Towsley, Email Virus Propagation Modeling and Analysis, Umass ECE Technical Report TR-03-CSE-04, May, 2003
  • 9[9]Michael Liljenstam, A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations, In: Proceedings of the Tenth IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Computer Society Press, Fort Worth,TX, Oct 2002
  • 10[10]David Moore, Code-Red: A case study on the spread and victims of an Internet worm, In: Presented at the Internet Measurement Workshop (IMW) in 2002

共引文献195

同被引文献12

  • 1罗军宏,张有为,谢余强,舒辉.受控蠕虫框架结构研究[J].计算机应用研究,2006,23(8):74-75. 被引量:2
  • 2HU Huaping WEI Jianli.Instant Messaging Worms Propagation Simulation and Countermeasures[J].Wuhan University Journal of Natural Sciences,2007,12(1):95-100. 被引量:2
  • 3Ma J,Voelker G,Savage S.Self-Stopping Worms[C] //Proc.of the 2005 ACM Workshop on Rapid Malcode.New York:ACM Press,2005:12-21.
  • 4Zou C C,Gong W,Towsley D.Code red worm propagation modeling and analysis[C] //Proc.of the 9th ACM Conf.on Computer and Communications Security (CCS 2002).New York:ACM Press,2002:138-147.
  • 5Kim J,Radhakrishnan S,Dhall S K.Measurement and analysis of worm propagation on internet network topology[C] //Proc.of the IEEE Int'l Conf.on Computer Communications and Networks (ICCCN 2004).[s.l.] :[s.n.] ,2004:495-500.
  • 6Zou C C,Gong W,Towsley D.Worm propagation modeling and analysis under dynamic quarantine defense[C] //Proc.of the ACM CCS Workshop on Rapid Malcode (WORM 2003).New York:ACM Press,2003:51-60.
  • 7Zou C C,Towsley D,Gong Weibo.Email Worm Modeling and Defense[C] //Proceedings of 13th International Conference on Computer Communications and Networks.[s.l.] :[s.n.] ,2004:409-414.
  • 8Zhou Ying,Wu Zhongfu,Ye Chunxiao,et al.Proactive Worm Prevention Based on P2P Networks[C] //IET International Conference on Wireless Mobile and Multimedia Networks Proceedings.Hangzhou,China:[s.n.] ,2006:405-406.
  • 9张丽萍,洪龙,王惠南.一种网络病毒传播的时滞微分方程模型[J].南京邮电大学学报(自然科学版),2007,27(5):78-83. 被引量:5
  • 10王跃武,荆继武,向继,刘琦.Contagion蠕虫传播仿真分析[J].计算机研究与发展,2008,45(2):207-216. 被引量:7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部