|Table of Contents|

Construction and Simulation of Worm Propagation Model in MIPv6 Networks


Research Field:
Publishing date:


Construction and Simulation of Worm Propagation Model in MIPv6 Networks
XU Yan-gui12QIAN Huan-yan1DU Hong-jun3
1.School of Computer Science and Technology,NUST,Nanjing 210094,China;2.Department of Self-propelled Gun,Shenyang Artillery Academy,Shenyang 110162,China;3.Unit 65181 of PLA,Shenyang 112611,China
MIPv6 networks MIPv6 nodes network security computer worms worm propagation models
In order to prevent the propagation of MIPv6 worm,a new type of worm called MIPv6-Worm is presented in MIPv6 network environment.A method is presented to calculate the contact rate of MIPv6 nodes.In MIPv6 networks,propagation strategy of worm is analyzed and researched.MIPv6-Worm model(MWM),an epidemic model of MIPv6 network worm,is established.The simulation results show: during the initial stage of MIPv6-Worm propagation in MIPv6 network environment and in the time of 117s,the propagation reaches the summit.Each node turns to immune state at last.The propagation probability of MIPv6-Worm is proportional to the communication radius of nodes,distribution density of susceptible nodes and velocity of nodes.The model simulates the spread process of worm correctly in MIPv6 networks,and provides a theoretical basis for taking effective measures to prevent the propagation of MIPv6 worm in the large scale.


[ 1] HypponenM. Malware goesmobile[ J]. ScientificA-merican, 2006, 295( 5): 70-77.
[ 2] Kleinberg J. Thewireless epidemic[ J]. Nature, 2007, 449( 20): 287-288.
[ 3] NekoveeM. Wormepidemics inad-hocnetworks[ J]. NewJournal of Physics, 2007, 9( a): 189- 202.
[ 4] ZhengHu,i Li Dong, Gao Zhuo. Anepidemicmodel ofmobilephone virus[ A]. 1st International Sympos-i umonPervasiveComputing andApplicationsProceed-ings( SPCA2006) [ C]. Urumch,i Xinjiang, China: XIFE, 534- 538.
[ 5] 夏玮, 李朝晖,陈增强, 等. 带有预防接种的手机蓝牙病毒传播模型[ J]. 天津大学学报, 2007, 40 ( 12): 1426-1430.
[ 6] RhodesCJ, NekoveeM. The opportunistic transmis-sionof wirelessworms betweenmobile devices[ J]. PhysicaA, StatisticalMechanicsandItsApplications, 2008, 387( 27): 6837- 6844.
[ 7] RFC4861-2007, Neighbor discovery for IP version6 ( IPv6) [ S].
[ 8] RFC4862-2007, IPv6 stateless address autoconfigura-tion[ S].
[ 9] RhodesCJ, AndersonRM. Contact rate calculation for a basic epidemicmodel[ J]. Mathematical Biosc-i ences, 2008, 216( 1): 56-62.
[ 10] ZouCC, GongW, TowsleyD. Code redwormpropa-gationmodeling and analysis[ A]. Proc of the 9th ACMSymponComputer andCommunicationSecurity [C]. Washington, USA: ACM, 2002. 138- 147.


Last Update: 2012-11-19