检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]重庆三峡学院数学与计算机科学学院,重庆万州404000 [2]电子科技大学计算机科学与工程学院,成都610054
出 处:《计算机应用研究》2009年第4期1532-1534,1537,共4页Application Research of Computers
基 金:国家"242"信息安全计划资助项目(2006C27)
摘 要:邮件蠕虫利用e-mail在具有power-law结构特点的网络中进行传播,使得传统的蠕虫防御策略失效。结合power-law网络拓扑结构的特点,引入节点免疫和邮件服务器参与两种防御策略,分别对重复感染与非重复感染两种类型的邮件蠕虫传播进行了实验仿真。结果表明,节点的优先免疫类型、免疫起始时间、邮件服务器参与防御时间及蠕虫邮件识别正确率都与邮件蠕虫的传播有着紧密联系。E-mail worm spreads in the power-law network by sending e-mail. The policies which were used to defend traditio- nal worm were improper to defend e-mail worm. This paper presented the e-mail worm simulation based on power-law topology on two e-mail worm styles including repeated infection and unrepeated infection by considering two defense policies included node immunization and e-mail server' s filter function. The results show that many factors included the first immunized node style, the start-time of immunization, the start-time of e-mail server' s filter and the filter preciseness have great influence on e-mail worm propagation.
分 类 号:TP309.5[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.171