|Table of Contents|

Construction and Simulation of Worm Propagation Model in MIPv6 Networks

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2009年06期
Page:
839-844
Research Field:
Publishing date:

Info

Title:
Construction and Simulation of Worm Propagation Model in MIPv6 Networks
Author(s):
XU Yan-gui12QIAN Huan-yan1DU Hong-jun3
1.School of Computer Science and Technology,NUST,Nanjing 210094,China;2.Department of Self-propelled Gun,Shenyang Artillery Academy,Shenyang 110162,China;3.Unit 65181 of PLA,Shenyang 112611,China
Keywords:
MIPv6 networks MIPv6 nodes network security computer worms worm propagation models
PACS:
TP393.08
DOI:
-
Abstract:
In order to prevent the propagation of MIPv6 worm,a new type of worm called MIPv6-Worm is presented in MIPv6 network environment.A method is presented to calculate the contact rate of MIPv6 nodes.In MIPv6 networks,propagation strategy of worm is analyzed and researched.MIPv6-Worm model(MWM),an epidemic model of MIPv6 network worm,is established.The simulation results show: during the initial stage of MIPv6-Worm propagation in MIPv6 network environment and in the time of 117s,the propagation reaches the summit.Each node turns to immune state at last.The propagation probability of MIPv6-Worm is proportional to the communication radius of nodes,distribution density of susceptible nodes and velocity of nodes.The model simulates the spread process of worm correctly in MIPv6 networks,and provides a theoretical basis for taking effective measures to prevent the propagation of MIPv6 worm in the large scale.

References:

[ 1] HypponenM. Malware goesmobile[ J]. ScientificA-merican, 2006, 295( 5): 70-77.
[ 2] Kleinberg J. Thewireless epidemic[ J]. Nature, 2007, 449( 20): 287-288.
[ 3] NekoveeM. Wormepidemics inad-hocnetworks[ J]. NewJournal of Physics, 2007, 9( a): 189- 202.
[ 4] ZhengHu,i Li Dong, Gao Zhuo. Anepidemicmodel ofmobilephone virus[ A]. 1st International Sympos-i umonPervasiveComputing andApplicationsProceed-ings( SPCA2006) [ C]. Urumch,i Xinjiang, China: XIFE, 534- 538.
[ 5] 夏玮, 李朝晖,陈增强, 等. 带有预防接种的手机蓝牙病毒传播模型[ J]. 天津大学学报, 2007, 40 ( 12): 1426-1430.
[ 6] RhodesCJ, NekoveeM. The opportunistic transmis-sionof wirelessworms betweenmobile devices[ J]. PhysicaA, StatisticalMechanicsandItsApplications, 2008, 387( 27): 6837- 6844.
[ 7] RFC4861-2007, Neighbor discovery for IP version6 ( IPv6) [ S].
[ 8] RFC4862-2007, IPv6 stateless address autoconfigura-tion[ S].
[ 9] RhodesCJ, AndersonRM. Contact rate calculation for a basic epidemicmodel[ J]. Mathematical Biosc-i ences, 2008, 216( 1): 56-62.
[ 10] ZouCC, GongW, TowsleyD. Code redwormpropa-gationmodeling and analysis[ A]. Proc of the 9th ACMSymponComputer andCommunicationSecurity [C]. Washington, USA: ACM, 2002. 138- 147.

Memo

Memo:
-
Last Update: 2012-11-19