计算机应用

• 信息安全 • 上一篇    下一篇

网络恶意代码族群增长模型

左黎明 徐保根 汤鹏志 刘二根   

  1. 华东交通大学基础学院;华东交通大学系统工程与密码学研究所
  • 收稿日期:2008-07-14 修回日期:1900-01-01 发布日期:2009-01-01 出版日期:2009-01-01
  • 通讯作者: 左黎明

Growth model in network malicious code family

<a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a><a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a><a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a><a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>   

  • Received:2008-07-14 Revised:1900-01-01 Online:2009-01-01 Published:2009-01-01
  • Contact: 黎明 左

摘要: 分析了恶意代码发展的现状和特点,根据恶意代码生命周期和变异特点给出了一个网络恶意代码族群增长模型,最后对模型进行了验证,通过模型预测结果和实际数据的比较,该模型能够比较准确地对恶意代码族群数量的发展进行刻画。

关键词: 数学模型, 恶意代码, 病毒, 族群

Abstract: The status and features of development of the malicious codes were analyzed. According to the characteristic of virus variation and the life cycle of the malicious codes, a new mathematic growth model in network malicious code family was given. At last, the mathematic model was verified. Comparison between the predicted result made by this model and the real propagation data shows that the model gives a better description of the increase in network malicious code family.

Key words: mathematic model, malicious code, virus, family