Network Worm Propagating Model Based on Network Topology Unit

被引:0
|
作者
Zhang, Wei [1 ]
Guo, Shize [1 ]
Zheng, Kangfeng [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
关键词
Worm; Model; Propagation; Network;
D O I
10.1109/MINES.2009.119
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing analytic models on network worm propagation rarely consider the effect of topology structure, and it usually considers the probability and spread parameter as fixed values. They are not coinciding with real situation. Here in the paper, a microstructure based propagation model is proposed to inflect the variability with time. In this model, many probability factors are considered, for example the connecting probability from one node to another node, one node's immune probability, which make the model more general and suitable for simulation.
引用
收藏
页码:383 / 387
页数:5
相关论文
共 50 条
  • [41] Detecting Communities Based on Network Topology
    Wei Liu
    Matteo Pellegrini
    Xiaofan Wang
    Scientific Reports, 4
  • [42] An Electric Network Topology Analysis Method Based on Common Information Model
    Wu, Xiaomeng
    Yan, Suli
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 93 - 96
  • [43] Deployment model for urban guide signs based on road network topology
    Li Mina
    Huang Min
    Niu ZhongMing
    Rao MingLei
    INTELLIGENT AND INTEGRATED SUSTAINABLE MULTIMODAL TRANSPORTATION SYSTEMS PROCEEDINGS FROM THE 13TH COTA INTERNATIONAL CONFERENCE OF TRANSPORTATION PROFESSIONALS (CICTP2013), 2013, 96 : 1631 - 1639
  • [44] Detecting Communities Based on Network Topology
    Liu, Wei
    Pellegrini, Matteo
    Wang, Xiaofan
    SCIENTIFIC REPORTS, 2014, 4
  • [45] Network Topology Discovery based on SNMP
    Li Jun
    Zhang Xuefeng
    Shen Weihong
    Zou Qilin
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 194 - 199
  • [46] Identity Authentication Based on Network Topology
    Hu, Xuqiang
    Lin, Chuanwen
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 97 - 101
  • [47] A Transformation Method of Ontology Model to Network Topology Model
    Cheng, Jian-Bo
    Hao, Yan-Yu
    2018 4TH ANNUAL INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC 2018), 2018, : 345 - 348
  • [48] The Model for the P2P Worm Network Behavior Based on Data Pretreatment
    Wang, Zuli
    Wang, Lihong
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 5 - +
  • [49] Opportunistic network hierarchical model in unsteady topology
    College of Computer Science, Inner Mongolia University, Huhhot
    010021, China
    不详
    010021, China
    Dongnan Daxue Xuebao, 3 (438-442):
  • [50] Research on Network Topology of Equipment Support Organization Based on Social Network
    Liu, Ya-Dong
    Zhang, Chun-Run
    Yi, Hong-Bing
    Liu, Zeng-Yong
    2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 681 - 684