Font Size: a A A

The Propagation Model Of Internet Malicious Mobile Code

Posted on:2004-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:L H LuFull Text:PDF
GTID:2168360152957034Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
In recent years, Malicious Mobile Codes (MMC) which have seriously damaged network resources world-wide and even endangered the basic network establishment have obtained great attention.In order to better control MMC, in this paper, we studied the characteristics of MMC, discussed the advantages and disadvantages of existed MMC propagation models and analyzed the key elements of MMC propagation schemes.Based on the analyses, we proposed a group of novel MMC propagation models which consider at the same time the influences of opening environment of network, the re-infection characteristics of MMC and the MMC life-span . These propagation models include the Single Propagation Model (SPM), the Inter-Infection Model (IIM) and the Mutex Propagation Model (MPM). SPM is a simple improvement on the existed propagation models. IIM goes a further step based on SPM, which considers the interaction between different malicious mobile codes. MPM considers another kind of effect between MMC, which can be addressed as "mutex".Based on these three models, a unified model called SIRC is presented which covers all three characteristics of MMC.The experiments of simulation on Nimda, Code Red II, Nachi and Blaster show the effectiveness of our model.We also discussed future works and other possible research topics.
Keywords/Search Tags:epidemic model, malicious mobile code, propagation, inter-infection, mutex infection, network security, computer virus, worm
PDF Full Text Request
Related items