In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on ...
详细信息
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on invulnerable addresses. Inspired by the theory of good point set, this paper proposes a new scanning strategy, referred to as good point set scanning (GPSS), for worms. Experimental results show that GPSS can generate more distinct IP addresses and less unused IP addresses than the permutation scanning. Combined with group distribution, a static optimal GPSS is derived. Since the information can not be easily collected before a worm is released, a self-learning worm with GPSS is designed. Such worm can accurately estimate the underlying vulnerable-host distribution when a sufficient number of IP addresses of infected hosts are collected. We use a modified Analytical Active Worm Propagation (AAWP) to simulate data of Code Red and the performance of different scanning strategies. Experimental results show that once the distribution of vulnerable hosts is accurately estimated, a self- learning worm can propagate much faster than other worms.
To make the agents negotiate more efficiently in multi-lateral multi-issue negotiation in multi-agent based competitive e-commerce, an agent negotiation model in competitive environment is presented, and the Adaptive ...
详细信息
To make the agents negotiate more efficiently in multi-lateral multi-issue negotiation in multi-agent based competitive e-commerce, an agent negotiation model in competitive environment is presented, and the Adaptive Genetic Algorithm (AGA) is applied to the model to enhance the negotiation efficiency. In the experiments, two kinds of genetic algorithms are used to compare with, they are Standard Genetic Algorithm (SGA) and AGA. After 1000 times of experiments for the two kinds of agents to gain the satisfying result, SGA averagely needs negotiation of 183 runs, while the AGA averagely needs only 152 runs. The experiment results show that the AGA can gain the satisfying negotiation result more efficiently than SGA in competitive multi-lateral multi-issue negotiation.
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is pres...
详细信息
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in ad hoc networks, a non-intrusive multi-metric ad hoc routing protocol-NIMR is presented. By computing and storing the node fame, NIMR greatly attenuates the influence of node selfishness; By crossing-design between MAC layer and network layer, we employ a non-intrusive real-time available bandwidth measurement scheme to solve the congestion problem. Finally, we propose a new metric as the routing selection criteria, which combines fame, available bandwidth and minimum hops by weight. Simulation results show, Compared with DSR, fairness between nodes is improved and congestion control and load balance is implemented using NIMR without additionally increasing the network load. At the same time average life-span and end-to-end throughput is increased, average end-to-end delay is decreased using NIMR.
Multicasting is an important business in the field of the Wireless Local Area network (WLAN). The access point (AP) usually has to seed the same message to each station (STA) of a specific group, and the multicasting ...
详细信息
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarch...
详细信息
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarchical matrix manner. After describing the join and leave protocols, we prove that CRMS has lceil2N/trceil-collusion resistant capability. Moreover, the suggestion of how to select the parameters in CRMS is given. The simulated experiments show that CRMS is a practical group key management in wireless networks.
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of us...
详细信息
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of using the matrix operation, the random number can be generated by the DNA sequence directly and the speed of the computation is greatly improved. Therefore, the new scheme has wide application in the field of the block cipher, data signature, identity authentication, et al.
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granu...
详细信息
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granularity of categorization were too coarse. With an analysis of the characteristics of adult short messages, and considering the effectiveness and real time performance of filtering algorithm, this paper proposes an adult short message discriminating algorithm based on adultism-degree computation, and a threshold selecting algorithm based on close test optimization. Experiments show that the proposed algorithm can effectively discriminate adult short message with a 94.4% correction rate, meanwhile it can meet the requirements of practical processing.
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran...
详细信息
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with random message by using the fact that the block cipher has same output with the same input using a key. Its security is proved by quantifying the advantage of distinguishing message authentication code from the random function in terms of the quality of the block cipher as a pseudo-random permutation.
We present a new class of network attacks, referred to as flow-jamming attacks , in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming...
详细信息
ISBN:
(纸本)9781424431212
We present a new class of network attacks, referred to as flow-jamming attacks , in which an adversary with multiple jammers throughout the network jams packets to reduce traffic flow. We propose a linear programming framework for flow-jamming attacks, providing a foundation for the design of future protocols to mitigate flow-jamming. We propose metrics to evaluate the effect of a flow-jamming attack on network flow and the resource expenditure of the jamming adversary. We develop, evaluate, and compare a variety of flow-jamming attacks using the proposed metrics and the linear programming formulation. In addition, we formulate two approaches for distributed flow-jamming attacks for a set of jammers operating without centralized control and compare the performance to the centralized attacks using the linear programming formulation.
暂无评论