Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate

被引:0
|
作者
Kown, Su-kyung [1 ]
Jang, Bongsoo [2 ]
Lee, Byoung-Dai [3 ]
Do, Younghae [4 ]
Baek, Hunki [5 ]
Choi, Yoon-Ho [1 ]
机构
[1] Pusan Natl Univ, Sch Elect Elect & Comp Engn, Busan, South Korea
[2] Ulsan Natl Inst Sci & Technol, Dept Math Sci, Ulsan, South Korea
[3] Kyonggi Univ, Dept Comp Sci, Suwon, South Korea
[4] Kyungpook Natl Univ, Dept Math, KNU Ctr Nonlinear Dynam, Daegu, South Korea
[5] Catholic Univ Daegu, Dept Math Educ, Daegu, South Korea
来源
INFORMATION SECURITY APPLICATIONS, WISA 2016 | 2017年 / 10144卷
基金
新加坡国家研究基金会;
关键词
Worm propagation; Centrality theory; Centrality-based random scanning strategy; Anonymity-based random scanning strategy;
D O I
10.1007/978-3-319-56549-1_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart devices interconnected through Internet became one of everyday items. In particular, we are now able to access Internet anywhere and anytime with our smartphones. To support the ad-hoc access to Internet by using smartphones, the computer network structure has become more complex. Also, a certain network node is highly connected to support the diverse Internet services. In this paper, we note that when a node is infected by malicious programs, their propagation speeds from the node with a high level of centrality will be faster than those from the node with a low level of centrality, which identifies the most important nodes within a network. From experiments under diverse worm propagation parameters and the well-known network topologies, we evaluate the influence of Centrality-based random scanning strategy on early worm propagation rate. Therefore, we show that centrality-based random scanning strategy, where an initial infected node selects the victim based on the level of centrality, can make random scanning worms propagate rapidly compared to Anonymity-based random scanning strategy, where an initial infected node selects the victim uniformly.
引用
收藏
页码:90 / 101
页数:12
相关论文
共 50 条
  • [21] The Coordinated Cyber Physical Power Attack Strategy Based on Worm Propagation and False Data Injection
    Feng X.-M.
    Sun Q.-Y.
    Wang B.-Y.
    Gao J.-W.
    Zidonghua Xuebao/Acta Automatica Sinica, 2022, 48 (10): : 2429 - 2441
  • [22] Sequential seeding strategy for social influence diffusion with improved entropy-based centrality
    Ni, Chengzhang
    Yang, Jun
    Kong, Demei
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 545
  • [23] A Novel Centrality Cascading Based Edge Parameter Evaluation Method for Robust Influence Maximization
    Deng, Xiaolong
    Dou, Yingtong
    Lv, Tiejun
    Quoc Viet Hung Nguyen
    IEEE ACCESS, 2017, 5 : 22119 - 22131
  • [24] Distortion propagation-based optimal λ decision for random access rate control in HEVC
    Yang, Zhenglong
    Wang, Guozhong
    Li, Guoping
    Zhu, Wenfa
    JOURNAL OF ELECTRONIC IMAGING, 2020, 29 (01)
  • [25] Analysis and evaluation of random-based message propagation models on the social networks
    Lai, Wei Kuang
    Chen, Yi Uan
    Wu, Tin-Yu
    COMPUTER NETWORKS, 2020, 170
  • [26] Strategy evaluation based on rate of return figures in agricultural business planning
    Peyerl, Von Hermann
    Breuer, Guenter
    BERICHTE UBER LANDWIRTSCHAFT, 2007, 85 (03): : 341 - 357
  • [27] Comprehensive evaluation of protein-coding sORFs prediction based on a random sequence strategy
    Yu, Jiafeng
    Guo, Li
    Dou, Xianghua
    Jiang, Wenwen
    Qian, Bowen
    Liu, Jian
    Wang, Jun
    Wang, Chunling
    Xu, Congmin
    FRONTIERS IN BIOSCIENCE-LANDMARK, 2021, 26 (08): : 272 - 278
  • [28] A novel community influence evaluation scheme based on information propagation in social network
    Zhang, Bo
    Song, Qianqian
    Peng, Ruxiang
    Huang, Zhenhua
    Xu, Qian
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2016, 7 (01) : 29 - 41
  • [29] Products early failure rate evaluation based on process information fusion
    School of Reliability and Engineering System, Beijing University of Aeronautics and Astronautics, Beijing
    100191, China
    不详
    100054, China
    Beijing Hangkong Hangtian Daxue Xuebao, 8 (1560-1566):
  • [30] Modified fuzzy-based random early detection for constant bit rate and poisson traffic
    Santhosh, R. R.
    Selvakumar, M.
    Sankaranarayanan, P. E.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL I, PROCEEDINGS, 2007, : 429 - +