Computer Science ›› 2014, Vol. 41 ›› Issue (7): 130-134.doi: 10.11896/j.issn.1002-137X.2014.07.026

Previous Articles     Next Articles

Research on Malware Propagation Model for Wireless Ad hoc Network

GAO Wei-min,ZHU Ling-zhi and LIANG Jun-bin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Because of peer-to-peer system structure and node resources limitation, Ad hoc network faces more safety threat than the traditional network.In recent years,the malicious program research has become an international network and information security field forefront and one of the most active research directions in wireless network malicious programs,also a new research field of hot.We first analyzed the Ad hoc network architecture and security threats,common malware classification and the biological modeling propagation model,then from the SIR virus propagation model of differential equations of the model,aiming at problems for the model to use wireless Ad hoc network,through the introduction of network topology characteristics and immune delay and other concepts of malware propagation model,improved network topology,and combining the dynamic evolution of malware propagation process,designed an improved algorithm and dynamic immune strategy.Considering of the network virus propagation characteristics,network characteristics and immunization strategy,a simulation experiment analysis of the improved model was made.The experimental results show that both immunization strategy and node have effects on malware propagation.

Key words: Wireless Ad hoc network,Malware,Propagation model,Immune strategy

[1] 王长广.无线环境下恶意程序的传播机制研究[D].西安:电子科技大学,2006
[2] 王长广,沈玉龙,马建峰,等.一种蓝牙环境下恶意程序的传播模型[J].西安电子科技大学学报,2009,36(1):94-98
[3] 陶智飞.网络病毒传播模型及两阶段动态免疫策略研究[D].武汉:华中科技大学,2006
[4] 副帅,往长广,马建峰.无线传感器网络中恶意程序的传播模型[J].计算机工程,2011,7(3):129-131
[5] 杨春霞,胡丹婷.动态演化的互联网病毒建模与分析[J].计算机应用研究,2012,9(7):2678-2680
[6] 陈丹伟,唐平,周书桃.基于沙盒技术的恶意程序检测模型[J].计算机科学,2012,9(6):12-14
[7] Royer E,Melliar-Smith P M,Moser L.An analysis of optimum node density for ad Hoc mobile networks[C]∥Proc.IEEE.ICC,June 2001:857-861
[8] Yoon J,Liu Ming-yan,Noble B.Random waypoint consideredharmful[C]∥Twenty-Second Annual Joint Conference of the IEEE Computer and Communications.2003:1312-1321
[9] Bettstetter C,Krause O.On border effects in modeling mo simulation of wireless ad hoc networks[C]∥The 3rd IEEE International Conference on Mobile and Wireless Communication Networks.August 2001
[10] Bettstetter C,Resta G,Santi P.The node distribution of the random waypoint mobility mobility for wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2003,2(3):257-269
[11] 方宝平.复杂网络的病毒传播及免疫策略[D].合肥:安徽大学,2011

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!