• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Hanxun, Zhao Hong, Wen Yingyou. Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms[J]. Journal of Computer Research and Development, 2009, 46(7): 1110-1116.
Citation: Zhou Hanxun, Zhao Hong, Wen Yingyou. Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms[J]. Journal of Computer Research and Development, 2009, 46(7): 1110-1116.

Modeling and Analysis of Divide-and-Rule-Hybrid-Benign Worms

More Information
  • Published Date: July 14, 2009
  • Due to the active defense against the propagation of worms, benign worms are attracting wide attention in the field of worm research. The idea of benign worm is to transform a malicious worm into an anti-worm which spreads itself using the same mechanism as the original worm and immunizes a host. It allows for an active measure of malicious worms that can potentially be deployed with no additional infrastructure in place. A divide-and-rule-hybrid-benign worm is a pattern of hybrid benign worms. It can avoid the additional traffic generated by benign worms in the final stage of benign worms countering against worms. Divide-and-rule-hybrid-benign worms are classified into three subtypes by analyzing their characteristics. The propagation models of these three subtypes are derived under the circumstance of time delay and no time delay, and they depict the process of divide-and-rule-hybrid-benign worms countering against worms. Finally, the simulation validates the propagation models. And there is a conclusion that a composite divide-and-rule-hybrid-benign worm is the most effective approach for containing the propagation of worms under the same infectious condition. These models of benign worms lead to a better understanding and prediction of the scale and speed of benign worms countering against the propagation of worms.
  • Related Articles

    [1]Feng Chenjiao, Song Peng, Wang Zhiqiang, Liang Jiye. A Method on Long Tail Recommendation Based on Three-Factor Probabilistic Graphical Model[J]. Journal of Computer Research and Development, 2021, 58(9): 1975-1986. DOI: 10.7544/issn1000-1239.2021.20200377
    [2]Wang Jian, Zhao Guosheng, Zhao Zhongnan, Li Ke. Formal Modeling and Factor Analysis for Vulnerability Propagation Oriented to SDN[J]. Journal of Computer Research and Development, 2018, 55(10): 2256-2268. DOI: 10.7544/issn1000-1239.2018.20180447
    [3]He Xiao, Ma Zhiyi, Shao Weizhong, Hu Changjun. A Graphical Modeling Language for Model Transformations[J]. Journal of Computer Research and Development, 2015, 52(9): 2145-2162. DOI: 10.7544/issn1000-1239.2015.20148187
    [4]Yang Hailu, Zhang Jianpei, and Yang Jing. Community-Based Bidirectional Feedback System for Hybrid Worm Containment in Mobile Internet[J]. Journal of Computer Research and Development, 2014, 51(2): 311-324.
    [5]Zhang Shuifa, Ding Huan, and Zhang Wensheng. Background Modeling and Object Ddetection Based on Two-Model[J]. Journal of Computer Research and Development, 2011, 48(11): 1983-1990.
    [6]Feng Chaosheng, Qin Zhiguang, Laurence Cuthbert, Laurissa Tokarchuk. Reactive Worms Propagation Modeling and Analysis in Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2010, 47(3): 500-507.
    [7]Wang Yuewu, Jing Jiwu, Xiang Ji, and Liu Qi. Contagion Worm Propagation Simulation and Analysis[J]. Journal of Computer Research and Development, 2008, 45(2): 207-216.
    [8]Zhou Hanxun, Zhao Hong. Modeling and Analysis of Active-Benign Worms and Hybrid-Benign Worms[J]. Journal of Computer Research and Development, 2007, 44(6): 958-964.
    [9]Chang Qun, Wang Xiaolong, Lin Yimeng, Daniel S. Yeung, Chen Qingcai. Reducing Gaussian Kernel's Local Risks by Global Kernel and Two-Stage Model Selection Based on Genetic Algorithms[J]. Journal of Computer Research and Development, 2007, 44(3).
    [10]Wang Bailing, Fang Binxing, Yun Xiaochun, Zhang Hongli, Chen Bo, Liu Yixuan. A New Friendly Worm Propagation Strategy Based on Diffusing Balance Tree[J]. Journal of Computer Research and Development, 2006, 43(9): 1593-1602.

Catalog

    Article views (711) PDF downloads (477) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return