Dissertation > Excellent graduate degree dissertation topics show

Research on Dynamical Interaction Models of Network Virus and Its Defense Strategies

Author: SongLiPeng
Tutor: JinZuo
School: University of North
Course: The MISSILES flight and Control Engineering
Keywords: Internet worm Botnet Propagation and interaction model Removable device Throttling method
CLC: TP393.08
Type: PhD thesis
Year: 2012
Downloads: 166
Quote: 0
Read: Download Dissertation

Abstract


With the rapid growth of network applications, network security is becoming increasinglyserious and security events occur frequently, booming especially in recent years. Internetviruses, mainly including worm and botnet, have become one of the most serious securitythreats to the Internet due to their characteristics of fast propagating speed, complex andvarious invasion methods, significant damages. Furthermore, they can not only causetremendous damage to national economy but also bring threats to national political and militarysecurity. In recent years, the research on internet virus has been one of the most importantand active research topics in the fields of network security and military security in manycountries. How to contain internet virus has been an urgent issue.Internet viruses develop two new features when they increase dramatically during the lastfew years. One is that there are complex interactions among internet viruses and the other isthat the propagation and containment of internet viruses are closely related to user’s behavior.Analyzing and taking full advantage of these features may contribute to raise efficientcounter-virus methods. Thus, we analyze the interaction models among internet viruses and thecounter-virus methods based on user’s behavior and its regulation. The detailed contents of ourresearch are given below:1. A two-botnet static interaction model based on game theory and a botnet propagationdynamicsmodel are put forward. Based on the static interaction model, the replicator equationsare used to characterize the dynamical evolution of the strategies adopted by interacting botnetowners. Then,the evolutionary game dynamics which occurs at a fast time scale is coupled tothe botnet propagation dynamics model. Two stable equilibria of the fast evolutionary gamemodel and the thresholds below which two botnet owners will choose the competitive strategyare given. Additionally, we substitute the equilibria into the coupled model and get two reducedmodels. The thresholds which determine whether the botnet can survive or not in both reducedmodels are given. We also explore the influence of interaction parameters on the thresholds.2. The concept of altruistic worm is presented and the interactions between the altruisticworm and the other worms are analyzed. Then, we presented two interaction models. One includes the influence of adaptive human behavior and the other does not. For each model, twothresholds which determine whether the other worm (not the altruistic worm) can survive ornot are given. One is for the altruistic worm’s existence state and the other is not.Furthermore, we also explore the influence of parameters concerning adaptive human behavioron the thresholds.3. The propagation model of worm via both removable devices and internet is provided.Then, we give the threshold determining whether the worm can survive or not and explore theinfluence of the parameters concerning removable devices on the threshold.4. Inspired by the accumulation characteristic among the web sites scanned by localusers within a subnet, we propose the throttling method based on subnet. Then, we design thedeployment scheme of the throttling method at the edge router of subnet and analyze thethreshold used to detect the suspicious subnet in the throttling method.

Related Dissertations

  1. Research of IRC Botnet Detection Based on Behavior,TP393.08
  2. The Design and Implementation of Botnet Detection Module Based on IP Flows,TP393.08
  3. Packet-based feature zombie Trojan detection technology,TP393.08
  4. Research on the Worm Early Warning Based on Victim Behavior,TP393.08
  5. Multi- vector worm propagation simulation design and implementation,TP393.08
  6. The Design of a Detection and Warning System for Internet Worm Based on the Characteristics of the Network,TP393.08
  7. The Research and Implement of Controlled Bonnets Attacks Experimental Platform,TP393.08
  8. The low interaction malicious software capture technology,TP393.08
  9. Solution of Large Sparse Matrix in Network Research and Influence of Traffic Model on Worm Tracing,TP393.08
  10. Mechanism and Defense of the Network Worm,TP393.08
  11. Worms automatic writing machine and network attacks,TP309.5
  12. Research and Implementation of Forensics System on DDoS Attack Based on Botnet,TP393.08
  13. IRC -based botnet detection system protocol implementation,TP393.08
  14. Research of Correlative Method with Multiple Sensors in Bots Detection,TP393.08
  15. Research on Command and Control Channel of Botnet,TP393.08
  16. Network Worm Prevention Mechanism Research Based on P2P Technology,TP393.08
  17. Study on Propagation and Control of Internet Worms,TP393.08
  18. Research on Key Issue of Worm Automatic Defense,TP393.08
  19. The Research on Web Application and Data Security,TP393.08
  20. Research on Countermeasure Techniques for the Botnet,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile