吉林大学学报(工学版)

• • Previous Articles     Next Articles

Three worm propagation models to establish scalefree worm networks

Hong Zheng;Wu Li-fa;Wang Yuan-yuan   

  1. Institute of Command Automation, PLA University of Science and Technology, Nanjing 210007, China
  • Received:2007-02-05 Revised:2007-06-05 Online:2008-05-01 Published:2008-05-01

Abstract: Robustness and smallworld property of scalefree network are the desirable features in worm network. Taking advantage of worm propagation properties, this paper proposed three worm propagation models which are employed to build scalefree worm network. In these models, a compromised host is connected to the worm network by linking with suitable worm nodes. The nodes are chosen according to the node properties, such as the degree and fitness of the node. Theoretical analysis and simulation were conducted and the results demonstrate that the worm networks generated by the proposed models are scalefree.

Key words: computer systems organization, worm, scalefree network, propagation model, network security

CLC Number: 

  • TP393.08
[1] DONG Jian-feng, ZHANG Yu-feng, DAI Zhi-qiang. Improved recommendation algorithm based on DPM model [J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[2] LIU Lei, LIU Li-juan, WU Xin-wei, ZHANG Peng. Compiler testing method based on ECP metamorphic relation [J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[3] DONG Li-yan, WANG Yue-qun, HE Jia-nan, SUN Ming-hui, LI Yong-li. Collaborative filtering recommendation algorithm based on time decay [J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[4] HU Guan-yu, QIAO Pei-li. Chaos covariance matrix adaptation evolution strategy optimization algorithm [J]. 吉林大学学报(工学版), 2017, 47(3): 937-943.
[5] DENG Chang-yi, GUO Rui-feng, ZHANG Yi-wen, WANG Hong-liang. Lower power dynamic scheduling algorithm for sporadic tasks based on balance factor [J]. 吉林大学学报(工学版), 2017, 47(2): 591-600.
[6] HU Guan-yu, QIAO Pei-li. High dimensional differential evolutionary algorithm based on cloud population for network security prediction [J]. 吉林大学学报(工学版), 2016, 46(2): 568-577.
[7] QU Jian-jun, GUO Wen-feng, LI Jiang, LIU Chang. Design of an inverse clamping piezoelectric inchworm motor with linear long distance [J]. 吉林大学学报(工学版), 2015, 45(4): 1168-1174.
[8] TIAN Gui-zhong, LIU Zhi-ling, ZHOU Hong-gen, SONG Jiang-chao, ZHU Tao. Quasi-static axial tensile mechanical characteristics of silkworm's anterior silk gland [J]. 吉林大学学报(工学版), 2015, 45(3): 872-877.
[9] LUO Zhi-yong,YOU Bo,XU Jia-zhong,LIANG Yong. Automatic recognition model of intrusive intention based on three layers attack graph [J]. 吉林大学学报(工学版), 2014, 44(5): 1392-1397.
[10] LIU Xiao-wu, WANG Hui-qiang, LYU Hong-wu, AN Shu-zhao. Quantitative awareness of network security situation based on fusion [J]. 吉林大学学报(工学版), 2013, 43(06): 1650-1657.
[11] WANG Gai-ge, GUO Li-hong, DUAN Hong, LIU Luo, WANG He-qi. Target threat assessment using glowworm swarm optimization and BP neural network [J]. 吉林大学学报(工学版), 2013, 43(04): 1064-1069.
[12] ZHANG Hua, PENG Lai-hu, HU Xu-dong, WANG Xian-mei. Model of enterprise cloud manufacture applying to textile machining industry [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 337-340.
[13] WANG Xin-ying, LIU Gang, GU Fang-ming, XIAO Wei. Heterogeneous feature fusion method based on semantic and shape for 3D model retrieval [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 359-363.
[14] WU Xiao-xuan, NI Zhi-wei, NI Li-ping. Clustering ensembles algorithm based on fractal dimension [J]. 吉林大学学报(工学版), 2012, 42(增刊1): 364-367.
[15] ZHENG Ming, SHEN Wei, BAI Tian, LIU Gui-xia, GONG Lei-guang. Novel instant message system based on extensible markup language [J]. , 2012, (06): 1548-1552.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!