华南理工大学学报(自然科学版) ›› 2010, Vol. 38 ›› Issue (5): 80-85.doi: 10.3969/j.issn.1000-565X.2010.05.016

• 计算机科学与技术 • 上一篇    下一篇

一种随机-无标度混合的P2P蠕虫传播模型

陈君华1,2  胡昌振1,2  石峰1  危胜军2   

  1. 1.北京理工大学 计算机科学与技术学院, 北京 100081 2.北京理工大学 计算机网络攻防对抗技术实验室, 北京 100081
  • 收稿日期:2009-07-03 修回日期:2009-11-06 出版日期:2010-05-25 发布日期:2010-05-25
  • 通信作者: 陈君华(1975-),男,博士生,主要从事网络信息安全研究. E-mail:chenjunhuabj@163.com
  • 作者简介:陈君华(1975-),男,博士生,主要从事网络信息安全研究.
  • 基金资助:

    国家“863”计划项目(2009AA01Z433)

A Random and Scale-Free Hybrid P2P Worm Propagation Model

Chen Jun-hua1.2  Hu Chang-zhen1.2  Shi Feng1  Wei Sheng-jun2   

  1. 1.School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China;2.Lab for Computer Network Defense Technology,Beijing Institute of Technology,Beijing 100081,China
  • Received:2009-07-03 Revised:2009-11-06 Online:2010-05-25 Published:2010-05-25
  • Contact: 陈君华(1975-),男,博士生,主要从事网络信息安全研究. E-mail:chenjunhuabj@163.com
  • About author:陈君华(1975-),男,博士生,主要从事网络信息安全研究.
  • Supported by:

    国家“863”计划项目(2009AA01Z433)

摘要: 针对现有模型中只用节点度来构建蠕虫网络的不足,文中结合无标度网络性质和实际P2P网络通信的特点,引入一个表示新节点连接概率的调节参数,在此基础上以随机选择与优先依附混合的方式建立蠕虫传播模型,并利用平均场理论和Matlab仿真对模型的演化机理进行研究.理论分析与仿真实验表明:选择蠕虫网络中合适的节点和新感染蠕虫主机建立的连接与连接概率、节点吸引力等因素有着紧密的联系;所建立的蠕虫网络具有无标度网络的性质.

关键词: 网络安全, 蠕虫, 传播模型, 随机游走, 节点度分布

Abstract:

In order to overcome the shortcomings of the existing models that use only the node degree distruibution to construct the worm network,a worm propagation model with both random and preferential attachments is proposed,which considers both the property of scale-free network and the characteristics of real P2P network communication,and introduces a adjustment parameter representing the new node connection probability.Then,the evolution mechanism of the model is investigated based on the mean-field theory through Matlab simulation.Theoretical and simulated results show that the connection between the suitable nodes selected from the worm network and the newly-infected host is tightly related to the connection probability and the node attraction,and that the established worm network is scale-free.

Key words: network security, worm, propagation model, random walk, node degree distribution