期刊文献+

多频自适应共振检测病毒感染免疫性分析 被引量:1

Analysis of Immunity of Virus Infection Based on Multi Frequency Adaptive Resonance Detection
下载PDF
导出
摘要 网络病毒感染的免疫性分析是提高网络安全性能的重要因素。由于网络病毒具有发散指向性,导致对网络病毒的感染免疫性分析建模困难。提出基于多频自适应共振检测的网络病毒感染免疫性分析模型,构建多路复用器输入输出的网络病毒感染模型,进行病毒信息特征预处理,得到用户约束对照多路复用状态下的病毒入侵干扰链路结构。根据自相关函数极限分离定理,在极向环空间内进行自相关成分分析,以代价函数最小化的形式进行病毒感染强度快速寻优分离,由此实现对病毒感染的免疫性分析模型构建。通过仿真实验结果表明,采用该算法,对网络在遭受病毒感染下的免疫控制性能较平稳,代价开销控制精度合理,网络波动被约束到了一个较小的范围,展示了方法优越的病毒感染限定和免疫性能。 The analysis of network virus infection immunity is an important factor to improve the network security performance. Because the network virus has spread performance, virus immunity analysis modeling is difficult to be constructed.An improved analysis model of immunity of network virus infection is proposed based on multi frequency adaptive resonance detection, the multiplexer input and output model of the network virus infection is constructed. The virus information feature preprocessing is taken, and the constraint control multiplexing condition virus interference link structure is obtained. According to the separation theorem of autocorrelation limit function, autocorrelation analysis is taken in the poloidal loop space. The cost function is minimized in the form of virus infection intensity fast optimizing separation, and the immune virus infection analysis model is constructed. The simulation results show that, this algorithm can make the network immune from viral infection control performance is more stable, cost control precision is reasonable. Network fluctuation is constrained to a smaller range, it shows better virus infection and limitation property.
作者 翁国秀
机构地区 玉林师范学院
出处 《科技通报》 北大核心 2015年第2期152-154,共3页 Bulletin of Science and Technology
关键词 多频信号 自适应 检测 病毒 免疫性 multi frequency signal adaptive detection virus immunity
  • 相关文献

参考文献6

二级参考文献28

  • 1张维明,毛捍东,陈锋.一种基于图论的网络安全分析方法研究[J].国防科技大学学报,2008,30(2):97-101. 被引量:9
  • 2张涛,胡铭曾,云晓春,张永铮.计算机网络安全性分析建模研究[J].通信学报,2005,26(12):100-109. 被引量:41
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 4Agrawal R,Srikant R.Fast algorithms for mining association rules[A].In Proceedings of the20th international conference on very large databases held in Santiago[C].Chile,,2004:87-99.
  • 5Kuok C,Fu A,Wong M.Mining fuzzy association rules in databas-es[J].SIGMOD Record,2008,17(1):41-6.
  • 6Mannila H,Toivonen H.Discovering eneralized episodes using min-imal occurrences[A].In Proceedings of the second international conference on knowledge discovery and data mining held in Portland[C].Oregon,August,2006:146-51.
  • 7Lee W,Stolfo S,Mok K.Mining audit data to build intrusion detec-tion models[A].In Proceedings of the fourth international confer-ence on knowledge discovery and data mining held in New York[C].New York,2008:66-72.
  • 8Kent S. Security architecture for the internet protocol[S].RFC 2401 Nov,1998.
  • 9Ioannidis J, Bellovin S.Implementing pushback: router-based defense against DDoS attacks[A].Proceedings of Network and Distributed System Security Symposium[C].Catamaran Resort Hotel San Diego, California,February,2002.
  • 10Ahsan H, Mohamed M, Hefeeda, Bharat B. Detecting service violations and DoS attacks[R]. CERIAS Tech Report TR 2002-15.

共引文献65

同被引文献7

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部