...
首页> 外文期刊>International Journal of Soft Computing and Software Engineering >Development, Implementation And Performance Evaluation Of The Optimal Anti-Worm Detection Defense Software(OAWDDS) Protocol
【24h】

Development, Implementation And Performance Evaluation Of The Optimal Anti-Worm Detection Defense Software(OAWDDS) Protocol

机译:最佳反蠕虫检测防御软件(OAWDDS)协议的开发,实现和性能评估

获取原文
           

摘要

Computer Worms known as malicious codes are defined as programs that replicate without infecting other programs and some Worms spread by copying themselves from disk to disk or computer to computer across a network, while others replicate in memory to slow the computer. There are five components of a Worm and the individual Worm nodes can be linked in a communication network to build a larger Worm network with five topologies. The five Worm network topologies are: Hierarchical Tree, Centrally Connected, Shockwave Rider-Type, Hierarchical Tree with Several Layers of Authority and Many Centralized Nodes,and Full Mesh. The Optimal Anti-Worm Detection Defense Software(OAWDDS)Protocol realizes three optimization constraints from the mathematical formalization of a Worm: five components, five topologies, and five structures. The computer networking Queueing System Modeling of the exponential Worm growth characteristics with GI/G/1, M/M/1,and E2/M/1 Queueing Parameters within the three constraints and formed computer network congestion control between possible Worm Hosts and Worm Nodes will ensure 100% elimination of Worm Network protection. The analytical Lagrangian optimization in the OAWDDS Protocol of the proportion of vulnerable machines compromised with the three constraints will ensure the following three criteria to be enforced: (A)stopping Worm attacks 100% of the time,(B)enabling 100% protection for a given system without knowing any of the signatures of the individual Worms and (C)maintaining 100% effectiveness without periodic updates like virus protection. These three criteria will assure critical government public and private infrastructure systems required to maintain the national and economic security of the U.S.
机译:计算机蠕虫(称为恶意代码)定义为在不感染其他程序的情况下进行复制的程序,某些蠕虫通过将自身从磁盘复制到整个磁盘或在整个计算机上通过网络进行复制而传播,而其他蠕虫则在内存中进行复制以降低计算机的速度。蠕虫病毒有五个组成部分,可以在通信网络中链接各个蠕虫病毒节点,以构建具有五个拓扑的大型蠕虫病毒网络。五个Worm网络拓扑是:层次树,集中连接,Shockwave Rider类型,具有多个权限层和许多集中节点的层次树以及完整网格。最佳反蠕虫检测防御软件(OAWDDS)协议从蠕虫的数学形式化实现了三个优化约束:五个组件,五个拓扑和五个结构。在三个约束内使用GI / G / 1,M / M / 1和E2 / M / 1排队参数对指数蠕虫生长特征进行计算机联网排队系统建模,并在可能的蠕虫主机和蠕虫节点之间形成计算机网络拥塞控制将确保100%消除蠕虫网络保护。 OAWDDS协议中受三个约束折衷的易受攻击机器的比例的分析拉格朗日优化将确保执行以下三个条件:(A)100%的时间阻止蠕虫攻击,(B)为100%的攻击提供保护给定系统,而无需了解各个蠕虫的任何特征,并且(C)保持100%的有效性而无需定期更新,例如病毒防护。这三个标准将确保维持美国国家和经济安全所需的关键政府公共和私人基础设施系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号