基于前缓冲两阶段漏桶算法的网络蠕虫控制技术

Chundong Wang, Qing Chang, Quancai Deng, Huai-bin Wang
{"title":"基于前缓冲两阶段漏桶算法的网络蠕虫控制技术","authors":"Chundong Wang, Qing Chang, Quancai Deng, Huai-bin Wang","doi":"10.1109/ICICIP.2010.5564161","DOIUrl":null,"url":null,"abstract":"A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.","PeriodicalId":152024,"journal":{"name":"2010 International Conference on Intelligent Control and Information Processing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm\",\"authors\":\"Chundong Wang, Qing Chang, Quancai Deng, Huai-bin Wang\",\"doi\":\"10.1109/ICICIP.2010.5564161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.\",\"PeriodicalId\":152024,\"journal\":{\"name\":\"2010 International Conference on Intelligent Control and Information Processing\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Intelligent Control and Information Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICIP.2010.5564161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Intelligent Control and Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICIP.2010.5564161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在充分分析了蠕虫与正常连接请求的区别后,提出了一种新的网络蠕虫控制技术。该方法考虑到蠕虫攻击唯一端口和分散IP地址的特点,根据不同端口使用多个数据集,避免了端口之间的影响。该方法针对普通连接的瞬时突发特性,利用两级漏桶控制延迟队列的输出。该方法既可以缩短正常请求在延迟队列中的停留时间,又可以防止蠕虫的发生。分析表明,该方法在蠕虫爆发前发挥了重要作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting out, the method takes advantage of two-stage leaky bucket to control the output of delay queues. The method can not only shorten the period of staying in the delay queue of normal requests, but also prevent the worms. The analysis shows that this method plays a significant role before the outburst of the worms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信