期刊文献+

邮件网络中基于介数的免疫策略研究 被引量:5

Research on Betweenness-based Immunization Strategy in Email Networks
下载PDF
导出
摘要 针对如何抑制病毒在邮件网络中的传播问题,在交互式邮件传播模型中分析介数免疫策略与传统基于度信息的免疫策略对病毒传播的控制能力。在真实的安然邮件网络和人工网络中对比各种免疫策略的效率与代价,结果发现节点介数免疫策略只须保护少量节点就可以降低病毒传播规模,有效地保护网络安全。 In order to restrain the virus propagating in email networks, this paper analyzes the performance of betweenness-based strategies and traditional degree-based strategies in an interactive email model. It compares the efficiency and cost of different strategies both in the Enron email network and synthetic network. The numerical results show that node-betweenness immunization strategy can effectively restrain the virus propagation with least immunized nodes.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第5期18-20,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60673015) 国家"973"计划基金资助项目(2003CB317001) 北京市自然科学基金资助项目(4102007) 北京工业大学博士生创新计划基金资助项目(bcx-2009-062)
关键词 病毒传播 免疫策略 介数 virus spreading immunization strategy betweenness
  • 相关文献

参考文献8

  • 1Pastor S R, Vespignani A. Immunization of Complex Networks[J]. Physical Review E, 2002, 65(3).
  • 2Chen Yiping, Paul G, Havlin S, et al. Finding a Better Immunization Strategy[J]. Physical Review Letters, 2008, 101(5).
  • 3Gallos L K. Liljeros F, Argvrakis P, et al. Improving Immunization Strategies[J]. Physical Review E, 2007, 75(4).
  • 4Echenique P, Gomez G J, Moreno Y, et al. Distance-D Covering Problem in Scale-free Networks with Degree Correlation[J]. Physical Review E, 2005, 71 (3).
  • 5Zou C C, Towsley D, Gong Weibo. Modeling and Simulation Study of the Propagation and Defense of lnternet E-mail Worms[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(2): 105-118.
  • 6彭俊好,徐国爱,朱振荣,杨义先.SIRS蠕虫传播模型及其分析[J].计算机工程,2008,34(7):134-136. 被引量:6
  • 7郝向东,王开云,张春瑞,李佳.蠕虫在P2P网络中的传播研究[J].计算机工程,2007,33(8):139-141. 被引量:5
  • 8Adler R, Feldman R, Taqqu M. A Practical Guide to Heavy Tail: Statistical Techniques and Applications[M]. Boston, USA: Birkhauser, 1998.

二级参考文献10

  • 1杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3Zhou Lidong, Zhang Lintao, McSherry F. A First Look at Peer-to-Peer Worms: Threats and Defenses[C]//Proc. of IPTPS'05. 2005-02.
  • 4Hethcote H W. The Mathematics of Infectious Diseases[J]. SIAM Review, 2000, 42(4): 599-653.
  • 5Serazzi G, Zanero S. Computer Virus Propagation Models[C]//Proc. of the 11^th IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, Tutorials.2003: 26-50.
  • 6Zou C C, Gong W, Towsley D. Code Red Worm Propagation Modeling and Analysis[C]//Proceedings of the 9^th ACM Conference on Computer and Communications Security. ACM Press, 2002:138-147.
  • 7Yu W, Boyer C, Xuan D. Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm attacks[R]. Computer Science Dept.,Texas A&M University, 2004.
  • 8Moore D, Paxson V, Savage S, et al. Inside the Slammer Worm[J]. IEEE Magazine of Security and Privacy, 2003, 1(4): 33-39.
  • 9Zou Changchun, Gong Weibo. Code Red Worm Propagation Modeling and Analysis[C].Proc. of the 9th ACM Symp. on Computer and Communication Security. Washington D. C., USA: [s. n.]. 2002.
  • 10Moore D. The Spread of the Code-Red Worm[Z]. (2007-01-31). http://www.caida.org/analysis/security/code-red/coderedv2_analysis. xml.

共引文献9

同被引文献30

  • 1张健,梁宏,陈建民,王琚,曹鹏,张双桥.计算机病毒危害性的评估[J].信息网络安全,2005(1):39-41. 被引量:8
  • 2周涛,傅忠谦,牛永伟,王达,曾燕,汪秉宏,周佩玲.复杂网络上传播动力学研究综述[J].自然科学进展,2005,15(5):513-518. 被引量:73
  • 3韩兰胜,陈伟,韩淑霞.网络病毒传播模型中的两个问题[J].计算机工程与应用,2005,41(29):16-18. 被引量:3
  • 4AYDIN I, KARAKOSE M, AKIN E. An adaptive arti- ficial immune system for fault classification [J]. Jour- nal of Intelligent Manufacturing, 2012, 23 ( 5 ): 1489-1499.
  • 5Shiow-Yun Chang; Tsung-Yuan Yeh. An artificial im- mune classifier for credit scoring analysis [J]. Applied Soft Computing,2012,12(2) : 611-618.
  • 6WONG N, RAY P, STEPHENS G, et al. Artificial im- mune systems for the detection of credit card fraud, an architecture, prototype and preliminary results[J]. In- formation Systems Journal, 2012,22 (1) : 53-76.
  • 7BINH L N, HUYHN T L, PANG K K. Combating Mobile Spam through Botnet Detection using Artificial Immune Systems [J]. Journal of Universal Computer Science, 2012, 18(6): 750-774.
  • 8SAMIGULINA G A. Development of decision support systems based on intellectual technology of artificial immune systems [J]. Automation and Remote Con- trol, 2012,73(2): 397-403.
  • 9周海平,蔡绍洪,贾秀丽,龙艳.随机-无标度统一混合演化网络模型[J].上海理工大学学报,2008,30(3):283-286. 被引量:4
  • 10杨洪勇,张嗣瀛.基于复杂网络的禽流感病毒传播[J].系统仿真学报,2008,20(18):5001-5005. 被引量:10

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部