Worm propagation modeling and analysis on network

被引:0
|
作者
Zhang, YK [1 ]
Wang, FW
Wang, CG
Ma, JF
机构
[1] Xidian Univ, Xian 710071, Peoples R China
[2] Hebei Normal Univ, Network Ctr, Shijiazhuang 050016, Hebei, Peoples R China
[3] Hebei Normal Univ, Coll Phys Sci & Informat Engn, Shijiazhuang 050016, Hebei, Peoples R China
来源
COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS | 2005年 / 3802卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, network worms that had a dramatic increase in the frequency and virulence of such outbreaks have become one of the major threats to the security of the Internet. This paper provides a worm propagation model based on the SEIR deterministic model. The model adopts the birth rate and death rate so that it can provide a more realistic portrait of the worm propagation. In the process of defending worm, dynamic quarantine strategy, dynamic infecting rate and removing rate are adopted. The analysis shows that the worm propagation speed can be efficiently reduced to give people more precious time to defend it. So the negative influence of the worm can be reduced. The simulation results verify the effectiveness of the model.
引用
收藏
页码:476 / 481
页数:6
相关论文
共 50 条
  • [41] Modeling Email Worm Propagation Using Game Theory
    Sun, Xin
    Liu, Yanheng
    Wang, Jian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 388 - +
  • [42] Modeling Worm Propagation through Hidden Wireless Connections
    Gu, Bo
    Hong, Xiaoyan
    Wang, Pu
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5357 - +
  • [43] Model and estimation of worm propagation under network partition
    Wang, Ping
    Fang, Binxing
    Yun, Xiaochun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 57 - 66
  • [44] Network Worm Propagation Model and Early Warning Studies
    Yang, Yuejiang
    Fu, Gui
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 69 - 73
  • [45] Mathematical Model to Study Propagation of Computer Worm in a Network
    Sricharan, K. Gowtham
    Kisore, N. Raghu
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 772 - 777
  • [46] Towards Understanding Dynamics of Mobile Phone Worm Propagation Using Social Network Analysis
    Wei, Qiang
    Ren, Ming
    Chen, Guoqing
    EIGHTH INTERNATIONAL CONFERENCE ON MOBILE BUSINESS, PROCEEDINGS, 2009, : 61 - 61
  • [47] Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
    Safar, Jamie L.
    Tummala, Murali
    McEachen, John C.
    Bollmann, Chad
    2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
  • [48] Modeling and Analysis of Network Survivability under Attack Propagation
    Yao, Su
    Guan, Jianfeng
    Ding, Shuwei
    Zhang, Hongke
    Song, Fei
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 96 - 108
  • [49] Modeling and analysis of network survivability under attack propagation
    Yao, Su
    Guan, Jianfeng
    Ding, Shuwei
    Zhang, Hongke
    Song, Fei
    Communications in Computer and Information Science, 2014, 490 : 96 - 108
  • [50] Network Survivability under Disaster Propagation: Modeling and Analysis
    Xie, Lang
    Heegaard, Poul E.
    Jiang, Yuming
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 4730 - 4735