Locating Defense Positions for Thwarting the Propagation of Topological Worms

被引:14
作者
Wen, Sheng [2 ]
Zhou, Wei [2 ]
Wang, Yini [1 ]
Zhou, Wanlei [1 ]
Xiang, Yang [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
[2] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
关键词
Network security; worms; propagation;
D O I
10.1109/LCOMM.2012.030512.112452
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A common view for the preferable positions of thwarting worm propagation is at the highly connected nodes. However, in certain conditions, such as when some popular users (highly connected nodes in the network) have more vigilance on the malicious codes, this may not always be the truth. In this letter, we propose a measure of betweenness and closeness to locate the most suitable positions for slowing down the worm propagation. This work provides practical values to the defense of topological worms.
引用
收藏
页码:560 / 563
页数:4
相关论文
共 9 条
[1]   Spatial-temporal modeling of malware propagation in networks [J].
Chen, ZS ;
Ji, CY .
IEEE TRANSACTIONS ON NEURAL NETWORKS, 2005, 16 (05) :1291-1303
[2]   Scale-free topology of e-mail networks [J].
Ebel, H ;
Mielsch, LI ;
Bornholdt, S .
PHYSICAL REVIEW E, 2002, 66 (03) :1-035103
[3]   Modeling the propagation of Peer-to-Peer worms [J].
Fan, Xiang ;
Xiang, Yang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (08) :1433-1443
[4]  
Fossi M., 2011, Symantec Internet Security Threat Report, VXVI.
[5]  
Mislove A., P 2007 ACM USENIX IN
[6]   A measure of betweenness centrality based on random walks [J].
Newman, MEJ .
SOCIAL NETWORKS, 2005, 27 (01) :39-54
[7]  
Yan G., P 2011 ACM S INF COM
[8]   The monitoring and early detection of Internet worms [J].
Zou, CC ;
Gong, WB ;
Towsley, D ;
Gao, LX .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (05) :961-974
[9]  
Zou CC, 2007, IEEE T DEPEND SECURE, V4, P105, DOI [10.1109/TDSC2007.1001, 10.1109/TDSC.2007.1001]