Dissertation > Excellent graduate degree dissertation topics show

Internet worm propagation studies

Author: SunYiKang
Tutor: ZhangXinJia
School: Northwestern Polytechnical University
Course: Pattern Recognition and Intelligent Systems
Keywords: Internet Worm WormNet Infinite Propagation Finite Propagation free-scale network Centralize Control
CLC: TP393.08
Type: Master's thesis
Year: 2006
Downloads: 190
Quote: 0
Read: Download Dissertation

Abstract


With the development of network security, Internet worms have been paid more and more attention from all kinds of people. The old mechanism against virus could not prevent the worm spread at the first time, so some researchers tried to find new method according to the characteristics of worms’ spreading. If we try to apply worms to do useful work, there is a need to realize the worm infinite propagation first. So Internet Worm’s Spread Research comes out to be meaningful.In this paper, we categorize the worm spreading into finite spreading and infinite spreading, according to badly worms and useful worms. For finite spreading worm, we study the infection of different network topology, based upon the scale-free network theory. And we propose a method to constrain or confine worm spreading by filtering packets in main nodes on transfer path.For infinite spreading worm, we give a new finite propagation algorithm, called Worm Finite Propagation Algorithm with Centralized Control Mode. This algorithm would prove the propagating precision, and reduce the network resource for controlling the infinite spreading.Based on the research above, we build the worm spreading simulation system, called WormNet, designed by UML, implemented by VC++ and simulated using Matlab. The result of the simulation shows that: first, the filter method could do a good job in preventing worm spreading;second, new infinite spreading algorithm is more precise than Barath algorithm.In summary, the main works in this paper include: researching of finite worm spreading in scale-free network, researching of infinite worm spreading algorithm, designing and implementing worm spreading simulation system, doing a thorough simulation and analyzing the result.

Related Dissertations

  1. Research on the Worm Early Warning Based on Victim Behavior,TP393.08
  2. Multi- vector worm propagation simulation design and implementation,TP393.08
  3. The Design of a Detection and Warning System for Internet Worm Based on the Characteristics of the Network,TP393.08
  4. Solution of Large Sparse Matrix in Network Research and Influence of Traffic Model on Worm Tracing,TP393.08
  5. Mechanism and Defense of the Network Worm,TP393.08
  6. Research of Worm_warned Model Based on Abnormal Traffic,TP393.08
  7. Worms automatic writing machine and network attacks,TP309.5
  8. Internet worm immune system based on the principles of biological immune,TP393.08
  9. Research of Worm Filtering Technology Based on Internet Security Gateway,TP393.08
  10. Peer-to-peer network worm and its defense technology research,TP393.08
  11. Research on Propagation and Defense Technology Against Malicious Code,TP309.5
  12. Structure Analysis and Related Techniques Study on Network Worms,TP393.08
  13. Analysis and Defense of Instant Messaging Worms,TP393.08
  14. Worm Modeling and Defense Strategies for Large-Scale Networks,TP393.08
  15. Nonlinear Higher-order Parabolic Partial Differential Equations,O175.26
  16. Research on Key Issue of Worm Automatic Defense,TP393.08
  17. Study on Propagation and Control of Internet Worms,TP393.08
  18. Network Worm Prevention Mechanism Research Based on P2P Technology,TP393.08
  19. Computing Migration in Complex Networks,TP393.02
  20. About with weak dissipation term Camassa-Holm Equations nature,O175
  21. Blow up Criteria、Persistence Properties and Infinite Propagation Speed of Solutions to the DGH Equation,O175.2

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile