期刊文献+

一种恶意软件传播的离散概率模型 被引量:3

A Discrete Probabilistic Model of Malware Propagation
下载PDF
导出
摘要 复杂网络理论为恶意软件传播的研究提供了新的思路和方法.本文针对恶意软件的实际传播机制,提出一种新的离散概率DP-SI模型,该模型可适用于任意网络拓扑.同时提出了一种节点信息网络模型方法,为大规模复杂网络及复杂网络上的传播动力学的仿真,以及离散传播动力学模型的建立,提供了有效的研究平台.仿真结果表明本模型比传统模型更接近现实,对恶意软件的控制具有一定指导意义. Complex network theory has provided the new train of thought and method to the research of malware's propagation.In this paper,against malicious software spread of the actual mechanism,we develop a new model,called the discrete probability susceptible-infectious(short for DP-SI),which could be applied to any network topology.At the same time,the node information network model method have been proposed for investigating complex network simulations,provided an efficiency research flat for simulating of propagation dynamics in the cosmically complex network as well as building discrete propagation dynamics model.The results show that this model is closer to reality than the traditional model,and it has some significance in the control of malicious software.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第4期894-898,共5页 Acta Electronica Sinica
关键词 恶意软件传播 SI模型 免疫 节点信息网络模型 malware propagation SI model immunization node information network model
  • 相关文献

参考文献19

  • 1Kaspersky Security BuUetin 2077: Malware evolution in 2007 [OL]. http://www, viruslist, com /en/analysis? pubid = 204791987,2008-03-15.
  • 2Eben Kenah, James M Robins. Second look at the spread of epidemics on networks [ J ]. Physical Review E, 2007, 76: 036113.1 - 036113.12.
  • 3张书奎,崔志明,龚声蓉,孙涌.传感器网络病毒感染传播局域控制研究[J].电子学报,2009,37(4):877-883. 被引量:4
  • 4Zou C C, Towsley D,and Gong W B. Modeling and simulation study of the propagation and defense of intemet e-mail worms [ J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(2):105- 118.
  • 5Vazquez A,Pastor-Satorras R, Vespignani A.Large scale topological and dynamical properties of the Internet[J].Physical Review E,2002,65:066130.
  • 6Chen G, Fan Z, Li X. Complex Dynamics in Communication Networks[ M]. London: Springer Publisher, 2005.213 - 234.
  • 7Newman M E J. The structure and function of complex networks[ J]. SIAM Review, 2003,45 (2) : 167 - 256.
  • 8Faloutsos M, Faloutsos P, Faloutsos C. On power law relationships of the Intemet topology [J]. Computer Communication Review, 1999,29(4) :251 - 262.
  • 9Pastor-Satorras R and Vespignani A. Epidemic dynamics and endemic states in complex networks [J]. Physical Review E, 2001,63(6) :066117.
  • 10Erd? s P,Renyi A. On the evolution of random graphs. Publications of Mathematical Institute of the Hungarian Academy of Science, 1960(5) : 17 - 61.

二级参考文献20

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2黄新力,邹福泰,马范援.Targeted Local Immunization in Scale-Free Peer-to-Peer Networks[J].Journal of Computer Science & Technology,2007,22(3):457-468. 被引量:3
  • 3D Liu, P Ning, R Li. Establishing pairwise keys in distributed sensor networks [ J ]. ACM Transactions on Information and System Security, 2005,8 (1) : 41 - 77.
  • 4Dijiang Huang, Deep Medhi. Secure pairwise key establishment in large-scale sensor networks:An area partitioning and multigroup key predistribution approach [ J ]. ACM Transactions on Sensor Networks,2007,3(3) :56 - 63.
  • 5M E J Newman. Spread of epidemic disease on networks [ J]. Physical Review E,2002,66(1):016128.
  • 6R Cohen, S Havlin. Efficient immunization strategies for computer networks and populations [ J ]. Physical Review Letters, 2003,91 (24) :7901.
  • 7R P Satorras, A Vespignani. Immunization of complex networks IJ] .Physical Review E,2002,65(3):036104.
  • 8N Madar, T Kalisky, R Cohen. Immunization and epidemics dynamics in complex networks [ J ]. The European Physical Journal B-Condensed Matter and Complex Systems,2004,38 (2) :269 - 276.
  • 9J Gomez-Gardenes, P Echenique, Y Moreno. Immunization of real complex communication networks [ J ]. The Physical Journal B-Condensed Matter and Complex Systems, 2006,49(2) :259 - 264.
  • 10H Zhang, J C Hou. Maintaining seining coverage and connectivity in large sensor networks [ J ]. Journal of Ad Hoc and Sensor Wireless Networks, 2005,1 (1) : 89 - 124.

共引文献3

同被引文献24

  • 1刘小林,刘克胜.Windows Mobile手机恶意软件的原理分析及防护措施研究[J].网络安全技术与应用,2008(9):41-43. 被引量:3
  • 2http://www, reuters, com/article/2013/04/23/net-us-usa- whitehouse-ap-idUSBRE93M12Y20130423[ EB/OL ]. 2013- 04-30.
  • 3Zhang W, Ye Y Q, Tan H L, et al. Information Diffusion Mod- el Based on Social Networkl A1. Proceedings of MCSA 2012 [ C] .Bremen: Springer Berlin Heidelberg,2012.145 - 150.
  • 4Xu B, Liu L. Information diffusion through online social net- work s[A ]. Proceedings of ICEMMS 2010 [ C ]. New York: IEEE Press,2010.53 - 56.
  • 5Zhao L J, Wang J J, Chen Y C, et al. SIHR rumor spreading model in social networks[ J ]. Physica A: Statistical Mechanics and its Applications,2012,391 (7) :2444- 2453.
  • 6Zhang B B,Guan X H,Khan M J,et al.A time-varying propa- gation model of hot topic on BBS sites and Blog networks [ J]. Information Sciences,2012,187(15) : 15 - 32.
  • 7Xu R Z,Li HL,Xing C M. Research on information dissemi- nation model for social networking services[ J ]. International Journal of Computer Science and Appfication,2013,2( 1 ) : 1 - 6.
  • 8Anderson R, May R. Infectious Diseases of Humans: Dynam- ics and Control[ M ]. Oxford University Press: Oxford, 1991.
  • 9Fn F, Chen X J, Liu L H, et al. Promotion of cooperation in- duced by the interplay between structure and game dynamics [ J]. Physica A,2007,383(2007) :651 - 659.
  • 10XIA Wei LI Zhao-hui CHEN Zeng-qiang YUAN Zhu-zhi.Commwarrior worm propagation model for smart phone networks[J].The Journal of China Universities of Posts and Telecommunications,2008,15(2):60-66. 被引量:3

引证文献3

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部