Computer Science ›› 2015, Vol. 42 ›› Issue (3): 128-131.doi: 10.11896/j.issn.1002-137X.2015.03.026

Previous Articles     Next Articles

Understanding Spread of Worms with Multi-area and Selectivity

ZHANG Jian-feng, CHEN Gou-xi and YANG Qiu-xiang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Today worm not only spread more quicklying,but also can implement selective infection based on the diffe-rent characteristics of the regions.Firstly,on the characteristic,quantifying certain factors of the average scan rate based on AAWP model by the probability distribution of the vulnerability of different regions,we raised a multi-area and selective worm propagation model named Areas-AAWP with discrete time.Then,under this model,we analyzed the correlation between the scanning strategies adopted by each subarea,judged the degree of relevance to the whole infectious process between subareas,and analyzed the important impact on the overall efficiency of infection by this degree of relevance.Finally,the experiments testify that the whole worm infection rate increases with the degree of correlation among multi-zone scanning increases,and forms the obvious regional differences in infection.

Key words: Discrete model,Areas-AAWP,Multi-area and selective,Scanning strategy,Correlation

[1] Moore D,Shannon C.Code-Red:a case study on the spread and victims of an Internet worm[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment.Marseille,France:ACM,2002:273-284
[2] Nazario J.The conficker cabal announced[EB/OL].http://www.asert.arbornetworks.com/2009/02/the-conficker-cabal-announced/,2009
[3] Kermack W O,McKendrick A G.Contributions to the mathematical theory of epidemics.II.The problem of endemicity[J].Proceedings of the Royal society of London,1932,8(834):55-83
[4] Chen Z,Gao L,Kwiat K.Modeling the spread of active worms[C]∥Twenty-Second Annual Joint Conference of the IEEE Computer and Communications(INFOCOM 2003).IEEE Societies,2003:1890-1900
[5] Zou C C,Towsley D,Gong W,et al.Routing worm:A fast,selective attack worm based on ip address information[C]∥Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation.Washington,DC,USA:IEEE Computer Society,2005:199-206
[6] Li Y,Chen Z,Chen C.Understanding divide-conquer-scanningworm-s[C]∥Performance,Computing and Communications Conference,2008(IPCCC 2008).IEEE International,Austin,Texas:IEEE,2008:51-58
[7] Chen Z,Ji C.An information-theoretic view of network-awaremalware attacks[J].IEEE Transactions on Information Forensics and Security,2009,4(3):530-541
[8] Bose A,Shin K G.Agent-based modeling of malware dynamics in heterogeneous environments[J].Security and Communication Networks,2011,6(12):1576-1589
[9] Wagdarikar R R,C Maheshwar R,Raichurakar M A.Securing a Network by Modeling and Containment of Worms Using Preference Scanning[J].International Journal of Research in Computerand Communication Technology,2013,2(10):959-963
[10] 佟晓筠,李巧军.基于免疫主机的蠕虫非线性传播新模型优化[J].计算机科学,2013,9(5):99-101
[11] 苏飞,林昭文,马严,等.IPv6 网络环境下的蠕虫传播模型研[J].通信学报,2011,32(9):51-60

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!