|Table of Contents|

Propagation Strategy of Worms in Complicated Network Environment


Research Field:
Publishing date:


Propagation Strategy of Worms in Complicated Network Environment
ZHANG KaiQIAN Huan-yan
School of Computer Science and Technology,NUST,Nanjing 210094,China
complicated network environments IPv6 worms scanning strategies propagation models
To solve the problems that the traditional worm using single scanning strategy can not spread fast in IPv6 net and the network using network address translation(NAT) equipments,a new type of worm scanning strategy applying a subnet scanning strategy based on Teredo service in local subnet and scanning strategy based on search engines in inter-subnet is presented.By modifying the classical simple epidemic model(SEM),the propagation of the worm using this scanning strategy is analyzed based on the derivation of the propagation velocity formular of worms.The simulation experiment results show: compared with other worms,the time for the worm using the scanning strategy to infect extranet hot is 10% of that of the traditional worms in a complicated network environment,so that it has a faster propagation velocity and larger propagation region.


[ 1] 伍佑明, 杨国良, 丁圣勇. IPv6 技术及其在移动互联网中的应用[ J ]. 电信科学, 2009, 25 ( 6 ):18- 23.
[ 2] 邢长友, 杨莉, 陈鸣. 蠕虫传播建模分析[ J]. 电子科技大学学报, 2007, 36( 3) : 347- 357.
[ 3] M icro soft. TeredoOverv iew [ DB /OL] . m icroso ft. com.http: / /www. m icroso ft. com / techne t/prodtechno l/w inxppro /m a inta in /Teredo. m spx, 2007 - 07 - 21 /2007- 10- 07.
[ 4] Kephart J, White S R. M easuring and modeling computervirus preva lence[A]. Proc o f the IEEE Sym p on Securityand Privacy[ C]. Oak land, USA: IEEE Computer SocietyPress, 1993: 2- 15.
[ 5] K ienzle D M , E lderM C. Recen t w orm s: A surveyand trends[ A ]. Pro ceedings of the 2003 ACM W orkshopon Rap idM alcode[ C]. W ash ington, DC, USA:ACM, 2003.
[ 6] Zou C C, Tow sley D, GongW. On the perform ance o fInternet wo rm scann ing stra teg ies[ J]. Perfo rm ance Evaluation, 2008, 36( 2): 700- 723.
[ 7] 徐延贵, 钱焕延. M IPv6网络中蠕虫传播模型的建模与仿真[ J] . 南京理工大学学报( 自然科学版),2009, 33( 6): 839- 844.
[ 8] Zou C C. Them onito ring and ea rly de tection of Inte rnetw orm s [ J]. IEEE /ACM Transactions on Netwo rking, 2008, 13( 5): 961- 974.


Last Update: 2012-11-02