Dissertation > Excellent graduate degree dissertation topics show

Research of IPv4-IPv6Dual-stack Benign Worm Propagation Model

Author: ChenChen
Tutor: YaoYu
School: Northeastern University
Course: Applied Computer Technology
Keywords: IPv4-IPv6dual-stack network benign worm worm-anti-worm propagationmodel
CLC: TP393.04
Type: Master's thesis
Year: 2013
Downloads: 0
Quote: 0
Read: Download Dissertation


People always believe that the IPv6network is safer than the IPv4because IPv6has huge network addresses. However, more and more researches show that IPv6is not unbreakable and it also faces serious threats of worms. The IPv4-IPv6dual-stack worm is a new worm which could spread in IPv4-IPv6hybrid networks rapidly using an intelligent scanning mechanism. Studies show that the worm is able to propagate much faster in IPv4-IPv6dual-stack network than that in the pure IPv4Internet. So, the worm is the potential threat from IPv4network to IPv6network transition.This thesis studies the propagation mechanism and propagation process of IPv4-IPv6dual-stack worm, analysis of the dual-stack worm propagation model and the WAW model. Based on this, the worm-anti-worm strategy is used to protect the vulnerable hosts from the attacks of the dual-stack malicious worms and a dual-stack worm containment model is proposed to describe the propagation of benign and malicious worms. After building model, we get the propagation curve of benign and malicious worms by numerical analysis.In the thesis, the simulation experiment on containment model is designed. Comparison of numerical analysis and simulation results shows the interaction of the two worms and verifies the effectiveness of the model. In addition, we conduct multiple sets of simulation experiments with different key parameters, and put forward several methods to improve the effect of benign worm though analysis of the simulation results.

Related Dissertations

  1. Self - control method of peer-to-peer network worm,TP393.08
  2. Research and Implementation of Distributed Worm Detection and Active Defense System,TP393.08
  3. Peer-to-peer network worm and its defense technology research,TP393.08
  4. Research of P2P Worm Behavior Model and Its Quarantining Metheds,TP393.08
  5. Research on Mechanism and Defense of Malicious Code,TP393.08
  6. Research on Worm Propagation and Prevention-cure in Internet of Vehicles,TN915.08
  7. Research in High-speed Railway Broadband Wireless Access,TN925.93
  8. Design and Implementation of Anti Worm Framework,TP393.08
  9. The Study of Immunization Strategy under the Cloud Environment,TP393.08
  10. Modeling and Analysis of Anti-worms Interacting with Internet Worms,TP393.08
  11. Divide-and-Rule-Hybrid-Benign Worms Confrontation Strategy Based on Time-delay,TP393.08
  12. Research on MP2P Resource Index Diffusion Methods,TP393.02
  13. Research of SIP and the Application of SIP in Video Communication,TP393.04
  14. Research on Reliable Multicast Protocol and It’s Buffer Management,TP393.04
  15. Study on Ethernet MAC Protocol and Its FPGA Implementation,TP393.04
  16. Stable iBGP Route Research Based on Minimal Hops,TP393.04
  17. The Research of Mobile IPv6 Handover Technology,TP393.04
  18. Research and Improvement of Count-to-infinity in Rapid Spanning Tree,TP393.04
  19. Distributed Switch MVRP Research and Implementation Agreement,TP393.04
  20. Digital home network standard protocols Research and Implementation,TP393.04
  21. P2P Protocol Recognition Technology and Traffic Restrictions on Research,TP393.04

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Communication protocols, communication protocols
© 2012 www.DissertationTopic.Net  Mobile