| 注册
首页|期刊导航|中国电子科技|Research on the Propagation Models and Defense Techniques of Internet Worms

Research on the Propagation Models and Defense Techniques of Internet Worms

Tian-Yun Huang

中国电子科技2008,Vol.6Issue(1):32-38,7.
中国电子科技2008,Vol.6Issue(1):32-38,7.

Research on the Propagation Models and Defense Techniques of Internet Worms

Research on the Propagation Models and Defense Techniques of Internet Worms

Tian-Yun Huang1

作者信息

  • 1. School of Computer Science and Technology, Southwest University for NationalitiesCSWUN, Chengdu, 610041, China
  • 折叠

摘要

Abstract

Internet worm is harmful to network security, and it has become a research hotspot in recent years. A thorough survey on the propagation models and defense techniques of Internet worm is made in this paper. We first give its strict definition and discuss the working mechanism. We then analyze and compare some repre sentative worm propagation models proposed in recent years, such as K-M model, two-factor model, worm-anti worm model (WAW), firewall-based model, quarantine based model and hybrid benign worm-based model, etc. Some typical defense techniques such as virtual honeypot, active worm prevention and agent-oriented worm defense, etc, are also discussed. The future direction of the worm defense system is pointed out.

关键词

Defense system, Internet worm, network security, propagation model

Key words

Defense system, Internet worm, network security, propagation model

分类

信息技术与安全科学

引用本文复制引用

Tian-Yun Huang..Research on the Propagation Models and Defense Techniques of Internet Worms[J].中国电子科技,2008,6(1):32-38,7.

基金项目

This work was supported by the Research Fund for the National Committee of China under Grant No. 05XN09. ()

中国电子科技

1674-862X

访问量2
|
下载量0
段落导航相关论文