Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 738-743.doi: 10.11896/jsjkx.210300212
• Interdiscipline & Application • Previous Articles Next Articles
ZHANG Xi-ran1, LIU Wan-ping1, LONG Hua2
CLC Number:
[1] PEÑA-LÓPEZ I.ITU Internet report 2005:the Internet ofthings[R].Geneva:ITU,2005. [2] ANGRISHI K.Turning internet of things (iot) into Internet of vulnerabilities (iov):Iot botnets[J].arXiv:1702.03681,2017. [3] BERTINO E,ISLAM N.Botnets and internet of things security[J].Computer,2017,50(2):76-79. [4] KAMBOURAKIS G,KOLIAS C,STAVROU A.The miraibotnet and the iot zombie armies[C]//IEEE Military Communications Conference (MILCOM).2017:267-272. [5] JI Y,YAO L,LIU S,et al.The study on the botnet and its prevention policies in the internet of things[C]//2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD).IEEE,2018:837-842. [6] JERKINS J A,STUPIANSKY J.Mitigating IoT insecurity with inoculation epidemics[C]//Proceedings of the ACMSE 2018 Conference.2018:1-6. [7] JIAO D.Inventory of the most serious DDoS attacks in 2016[J].Computer and Network,2016,42(24):48-50. [8] XIAO J C.Eight DDoS attacks affecting enterprise IoT security[J].Computer and network,2017,43(10):56-57. [9] WANG H L.DDoS attacks grew wildly in the first- half of 2017[J].Computer and Network,2017,43(23):53. [10] ZHANG X,ZHANG K L,SANG H Q,et al.2019 IoT Security Annual Report[J].Information Security an-d Communication Confidentiality,2020(1):45-62. [11] MMD-0055-2016-Linux/PnScan, ELF worm that still circlesaround[J/OL].The MalwareMustDie Blog,2016.https://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html. [12] GOODIN D.Record-Breaking DDoS Reportedly Delivered by >145K Hacked Cameras[J/OL].Ars Technica.http://arstechnica.com/security/2016/09/botnet-of-145K-cameras-reportedly-deliver-internets-biggest-ddos-ever. [13] WILLIAMS C.You Can Now Rent a Mirai Botnet of 400,000 Bots[J/OL].Bleeping Computer.https://www.bleepingcomputer.com/news/security/you-can-now-rent-a-mirai-botnet-of-400-000-bots. [14] LIU W,ZHONG S.Web malware spread modelling and optimal control strategies[J].Scientific Reports,2017,7(1):1-19. [15] WILLIAMS C.Today the Web Was Broken by CountlessHacked Devices-Your 60-Second Summary[J/OL].www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained. [16] LI B S,CHANG A Q,ZHANG J X.IoT botnets seriouslythreaten network infrastructure security-analysis of Dyn companÝs botnet attack[J].Information Security Research,2016,2(11):1042-1048. [17] LIU W,ZHONG S.Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method[J].Applied Mathematical Modelling,2018,63:491-507. [18] LIU W,WU X,YANG W,et al.Modeling cyber rumor spreading over mobile social networks:A compartment approach[J].Applied Mathematics and Computation,2019,343:214-229. [19] MISHRA B K,KESHRI N.Mathematical model on the transmission of worms in wireless sensor network[J].Applied Mathe-matical Modelling,2013,37(6):4103-4111. [20] ACARALI D,RAJARAJAN M,KOMNINOS N,et al.Model-ling the spread of botnet malware in IoT-based wireless sensor networks[J].Security and Communication Networks,2019. [21] BREBAN R,DRAKE J M,STALLKNECHT D E,et al.Therole of environmental transmission in recurrent avian influenza epidemics[J].PLoS Comput. Biol.,2009,5(4):e1000346. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[14] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[15] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
|