Chundong Wang, Qing Chang, Quancai Deng, Huai-bin Wang
{"title":"基于前缓冲两阶段漏桶算法的网络蠕虫控制技术","authors":"Chundong Wang, Qing Chang, Quancai Deng, Huai-bin Wang","doi":"10.1109/ICICIP.2010.5564161","DOIUrl":null,"url":null,"abstract":"A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.","PeriodicalId":152024,"journal":{"name":"2010 International Conference on Intelligent Control and Information Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm\",\"authors\":\"Chundong Wang, Qing Chang, Quancai Deng, Huai-bin Wang\",\"doi\":\"10.1109/ICICIP.2010.5564161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.\",\"PeriodicalId\":152024,\"journal\":{\"name\":\"2010 International Conference on Intelligent Control and Information Processing\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Intelligent Control and Information Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICIP.2010.5564161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Intelligent Control and Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICIP.2010.5564161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.