计算机科学 ›› 2014, Vol. 41 ›› Issue (7): 130-134.doi: 10.11896/j.issn.1002-137X.2014.07.026

• 2013'Petri 网 • 上一篇    下一篇

无线Ad hoc网络中恶意程序传播模型研究

高为民,朱凌志,梁俊斌   

  1. 湖南工学院计算机与信息科学学院 衡阳421002;湖南工学院计算机与信息科学学院 衡阳421002;广西大学计算机与电子信息学院 南宁530004
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受湖南省科技计划项目(2014FJ6026),湖南工学院教改项目(JY201426),2014年衡阳市科技计划项目资助

Research on Malware Propagation Model for Wireless Ad hoc Network

GAO Wei-min,ZHU Ling-zhi and LIANG Jun-bin   

  • Online:2018-11-14 Published:2018-11-14

摘要: Ad hoc网络的对等体系结构和节点资源受限使得其比传统网络面临更多的安全威胁。近年来,恶意程序研究已成为国际上网络安全和信息安全领域最前沿和最活跃的研究方向之一,无线网络中恶意程序研究已经开始成为恶意程序研究领域的一个新热点。首先分析了Ad hoc网络的网络体系结构及安全威胁、常见的恶意程序的分类及仿生物传播模型,然后从SEIR病毒传播模型的微分方程入手,针对该模型应用Ad hoc无线自组网出现的问题,引入网络拓扑特性和免疫延迟等概念对恶意程序传播模型进行了改进,结合网络拓扑动态演变恶意程序传播过程设计了一个改进的传播算法和动态免疫策略。综合考虑网络病毒传播特性、网络基础特性和免疫策略对改进模型进行了仿真实验分析,实验结果表明免疫策略和节点的度都影响恶意程序传播。

关键词: 无线Ad hoc网络,恶意程序,传播模型,免疫策略 中图法分类号TP393.08文献标识码A

Abstract: Because of peer-to-peer system structure and node resources limitation, Ad hoc network faces more safety threat than the traditional network.In recent years,the malicious program research has become an international network and information security field forefront and one of the most active research directions in wireless network malicious programs,also a new research field of hot.We first analyzed the Ad hoc network architecture and security threats,common malware classification and the biological modeling propagation model,then from the SIR virus propagation model of differential equations of the model,aiming at problems for the model to use wireless Ad hoc network,through the introduction of network topology characteristics and immune delay and other concepts of malware propagation model,improved network topology,and combining the dynamic evolution of malware propagation process,designed an improved algorithm and dynamic immune strategy.Considering of the network virus propagation characteristics,network characteristics and immunization strategy,a simulation experiment analysis of the improved model was made.The experimental results show that both immunization strategy and node have effects on malware propagation.

Key words: Wireless Ad hoc network,Malware,Propagation model,Immune strategy

[1] 王长广.无线环境下恶意程序的传播机制研究[D].西安:电子科技大学,2006
[2] 王长广,沈玉龙,马建峰,等.一种蓝牙环境下恶意程序的传播模型[J].西安电子科技大学学报,2009,36(1):94-98
[3] 陶智飞.网络病毒传播模型及两阶段动态免疫策略研究[D].武汉:华中科技大学,2006
[4] 副帅,往长广,马建峰.无线传感器网络中恶意程序的传播模型[J].计算机工程,2011,7(3):129-131
[5] 杨春霞,胡丹婷.动态演化的互联网病毒建模与分析[J].计算机应用研究,2012,9(7):2678-2680
[6] 陈丹伟,唐平,周书桃.基于沙盒技术的恶意程序检测模型[J].计算机科学,2012,9(6):12-14
[7] Royer E,Melliar-Smith P M,Moser L.An analysis of optimum node density for ad Hoc mobile networks[C]∥Proc.IEEE.ICC,June 2001:857-861
[8] Yoon J,Liu Ming-yan,Noble B.Random waypoint consideredharmful[C]∥Twenty-Second Annual Joint Conference of the IEEE Computer and Communications.2003:1312-1321
[9] Bettstetter C,Krause O.On border effects in modeling mo simulation of wireless ad hoc networks[C]∥The 3rd IEEE International Conference on Mobile and Wireless Communication Networks.August 2001
[10] Bettstetter C,Resta G,Santi P.The node distribution of the random waypoint mobility mobility for wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2003,2(3):257-269
[11] 方宝平.复杂网络的病毒传播及免疫策略[D].合肥:安徽大学,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!