期刊文献+

基于Petri网的病毒攻击建模 被引量:4

A Model of Virus Attacks Based on Petri Nets
下载PDF
导出
摘要 针对威胁计算机网络安全的病毒攻击行为,建立了基于Petri网的病毒入侵网络基本模型,利用CPN tools仿真工具分析了模型的活性和各个库所的有界性,以利于采取有效的网络防御措施和建立安全的防御体系.利用安全策略域、域间通信信道的概念,根据病毒入侵传播的特性,建立了基于随机着色Petri网的企业网络模型,并给出了用该模型模拟与安全相关网络行为的方法. Virus attacks increasingly threaten the computer network. A preliminary model of virus invasion was established based on Petri net,and the activity of the model and the bounds of different places were analyzed by using CPN simulation tools. This model will help to adopt effective defense measures for the network and establish defense systems. Using the concepts of security policy domain and the communication channels of domain,and according to the characteristics of the dissemination of the virus invasion,a model of enterprise network was established based on the stochastic colored Petri net, and the network behavior related to security with this model was introduced in detail.
出处 《天津科技大学学报》 CAS 2014年第1期69-74,共6页 Journal of Tianjin University of Science & Technology
基金 国家自然科学基金资助项目(61070021) 天津市高等学校科技发展基金资助项目(20120803)
关键词 病毒攻击 PETRI网 随机着色Petri网 virus attacks Petri net stochastic colored Petri net
  • 相关文献

参考文献9

二级参考文献45

  • 1冯卫.计算机病毒及网络安全的对策研究[J].电脑知识与技术(过刊),2007(18):1518-1519. 被引量:5
  • 2周涛,戴冠中,慕德俊.Internet蠕虫防范技术研究与进展[J].计算机应用研究,2006,23(6):13-15. 被引量:5
  • 3[11]Wang Xiaofan, Chen Guanrong. Complex networks: small-world, scale-free, and beyond[J]. IEEE Circuits and Systems Magazine, 2003, 3(2): 6-20.
  • 4[12]Chen Guanrong, Fan Zhengping,Li Xiang. Modelling the complex Internet topology[M]. Complex Dynamics in Communication Networks[M], Springer Publisher, in press, 2004.
  • 5[13]Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the Internet topology[J]. Computer Communication Review, 1999, 29(4): 251-262.
  • 6[14]Li Xiang, Chen Guanrong. A local-world evolving network model[J]. Physica A, 2003, 328(1,2): 274-286.
  • 7[15]Kephart J O, White S R. Directed-graph epidemiological models of computer viruses[A]. Proceedings of the 1991 IEEE Symposium on Security and Privacy[C]. Oakland,California,USA:IEEE Computer Society Press,1991.343-359.
  • 8[16]Kephart J O, White S R. Measuring and modeling computer virus prevalence[A]. Proceedings of the 1993 IEEE Symposium on Security and Privacy[C]. IEEE,1993.2-15.
  • 9[17]Pastor-Satorras R, Vespingnani A. Epidemic spreading in scale-free networks[J]. Physical Review Letters, 2001,86(14): 3200-3203.
  • 10[18]Pastor-Satorras R, Vazquez A ,Vespignani A. Dynamical and correlation properties of the Internet[J]. Physical Review Letters, 2001, 87(25): 258701.

共引文献44

同被引文献38

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部