[1]张凯,钱焕延.复杂网络环境中蠕虫的传播策略研究[J].南京理工大学学报(自然科学版),2010,(06):744-748.
 ZHANG Kai,QIAN Huan-yan.Propagation Strategy of Worms in Complicated Network Environment[J].Journal of Nanjing University of Science and Technology,2010,(06):744-748.
点击复制

复杂网络环境中蠕虫的传播策略研究
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
期数:
2010年06期
页码:
744-748
栏目:
出版日期:
2010-12-31

文章信息/Info

Title:
Propagation Strategy of Worms in Complicated Network Environment
作者:
张凯;钱焕延;
南京理工大学计算机科学与技术学院
Author(s):
ZHANG KaiQIAN Huan-yan
School of Computer Science and Technology,NUST,Nanjing 210094,China
关键词:
复杂网络环境 互联网协议版本6 蠕虫 扫描策略 传播模型
Keywords:
complicated network environments IPv6 worms scanning strategies propagation models
分类号:
TP393.08
摘要:
针对采用单一扫描策略的传统蠕虫无法在IPv6网络及有网络地址转换设备存在的网络中快速传播的问题,提出了一种新型的蠕虫分层扫描策略,即在本地应用基于Teredo服务的子网内扫描策略,在子网间应用基于搜索引擎的扫描策略。通过对经典的简单传染病蠕虫传播模型进行补充与修改,在推导出了蠕虫传播速度公式的基础上分析与预测了使用这种扫描策略的蠕虫的传播状况。仿真实验结果证明,使用这种新型扫描策略的蠕虫与其他蠕虫相比,在复杂网络环境中感染外网中主机所花费的时间仅为传统蠕虫的10%,即有更快的传播速度与更大的传播范围。
Abstract:
To solve the problems that the traditional worm using single scanning strategy can not spread fast in IPv6 net and the network using network address translation(NAT) equipments,a new type of worm scanning strategy applying a subnet scanning strategy based on Teredo service in local subnet and scanning strategy based on search engines in inter-subnet is presented.By modifying the classical simple epidemic model(SEM),the propagation of the worm using this scanning strategy is analyzed based on the derivation of the propagation velocity formular of worms.The simulation experiment results show: compared with other worms,the time for the worm using the scanning strategy to infect extranet hot is 10% of that of the traditional worms in a complicated network environment,so that it has a faster propagation velocity and larger propagation region.

参考文献/References:

[ 1] 伍佑明, 杨国良, 丁圣勇. IPv6 技术及其在移动互联网中的应用[ J ]. 电信科学, 2009, 25 ( 6 ):18- 23.
[ 2] 邢长友, 杨莉, 陈鸣. 蠕虫传播建模分析[ J]. 电子科技大学学报, 2007, 36( 3) : 347- 357.
[ 3] M icro soft. TeredoOverv iew [ DB /OL] . m icroso ft. com.http: / /www. m icroso ft. com / techne t/prodtechno l/w inxppro /m a inta in /Teredo. m spx, 2007 - 07 - 21 /2007- 10- 07.
[ 4] Kephart J, White S R. M easuring and modeling computervirus preva lence[A]. Proc o f the IEEE Sym p on Securityand Privacy[ C]. Oak land, USA: IEEE Computer SocietyPress, 1993: 2- 15.
[ 5] K ienzle D M , E lderM C. Recen t w orm s: A surveyand trends[ A ]. Pro ceedings of the 2003 ACM W orkshopon Rap idM alcode[ C]. W ash ington, DC, USA:ACM, 2003.
[ 6] Zou C C, Tow sley D, GongW. On the perform ance o fInternet wo rm scann ing stra teg ies[ J]. Perfo rm ance Evaluation, 2008, 36( 2): 700- 723.
[ 7] 徐延贵, 钱焕延. M IPv6网络中蠕虫传播模型的建模与仿真[ J] . 南京理工大学学报( 自然科学版),2009, 33( 6): 839- 844.
[ 8] Zou C C. Them onito ring and ea rly de tection of Inte rnetw orm s [ J]. IEEE /ACM Transactions on Netwo rking, 2008, 13( 5): 961- 974.

备注/Memo

备注/Memo:
基金项目: 国防科工委应用基础资金作者简介: 张凯( 1979- ), 男, 博士生, 主要研究方向: 计算机网络通信, E-m ail:zhangkai27@ yahoo. com. cn; 通讯作者: 钱焕延( 1950- ) , 男, 教授, 博士生导师, 主要研究方向: 计算机网络通信, E-m a il:hyqian@ ma il.njust. edu. cn。
更新日期/Last Update: 2012-11-02