{"title":"分析了网络蠕虫攻击方法的性能","authors":"Wei Yu","doi":"10.1109/ICCCN.2004.1401717","DOIUrl":null,"url":null,"abstract":"Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. In this paper, we address the issue by analyzing the impacts of worm attack approaches on Internet worm propagation. In particular, we analyze four worm attack approaches with considering following attack strategies: pure random-based/ PlP (peer-to-peer) hitlist-based strategies for victim selection and cooperation-based/ non-cooperation-based strategies for worm instance coordination. Our numerical analysis results show that the attack approach with combining the worm instance cooperation and P2P hitlist-based victim selection strategies achieves the best performance compared to all other attack approaches in term of attack efficiency","PeriodicalId":229045,"journal":{"name":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Analyzing the performance of Internet worm attack approaches\",\"authors\":\"Wei Yu\",\"doi\":\"10.1109/ICCCN.2004.1401717\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. In this paper, we address the issue by analyzing the impacts of worm attack approaches on Internet worm propagation. In particular, we analyze four worm attack approaches with considering following attack strategies: pure random-based/ PlP (peer-to-peer) hitlist-based strategies for victim selection and cooperation-based/ non-cooperation-based strategies for worm instance coordination. Our numerical analysis results show that the attack approach with combining the worm instance cooperation and P2P hitlist-based victim selection strategies achieves the best performance compared to all other attack approaches in term of attack efficiency\",\"PeriodicalId\":229045,\"journal\":{\"name\":\"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2004.1401717\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2004.1401717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analyzing the performance of Internet worm attack approaches
Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. In this paper, we address the issue by analyzing the impacts of worm attack approaches on Internet worm propagation. In particular, we analyze four worm attack approaches with considering following attack strategies: pure random-based/ PlP (peer-to-peer) hitlist-based strategies for victim selection and cooperation-based/ non-cooperation-based strategies for worm instance coordination. Our numerical analysis results show that the attack approach with combining the worm instance cooperation and P2P hitlist-based victim selection strategies achieves the best performance compared to all other attack approaches in term of attack efficiency