[1]项春霞[],蒋国平[],夏玲玲[],等. 基于异质网络的邮件蠕虫病毒传播模型[J].计算机技术与发展,2016,26(01):90-96.
 XIANG Chun-xia[],JIANG Guo-ping[],XIA Ling-ling[],et al. Propagation Model of Email Worm-virus Based on Heterogeneous Networks[J].,2016,26(01):90-96.
点击复制

 基于异质网络的邮件蠕虫病毒传播模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年01期
页码:
90-96
栏目:
安全与防范
出版日期:
2016-01-10

文章信息/Info

Title:
 Propagation Model of Email Worm-virus Based on Heterogeneous Networks
文章编号:
1673-629X(2016)01-0090-07
作者:
 项春霞[1] 蒋国平[2] 夏玲玲[1] 宋波[1]
 1.南京邮电大学 计算机学院;2.南京邮电大学 自动化学院
Author(s):
 XIANG Chun-xia[1] JIANG Guo-ping[2] XIA Ling-ling[1] SONG Bo[1]
关键词:
 邮件蠕虫病毒个体差异性交互马尔可夫链方法杀毒软件
Keywords:
 email worm-virusindividual differencesinteraction of Markov chainsantivirus software
分类号:
TP393.0
文献标志码:
A
摘要:
 文中根据现实生活中邮件蠕虫病毒发生后个体不同的行为机制,以及安装杀毒软件的概率和杀毒软件的查杀能力随时间变化的事实,结合邮件网络的结构特性,提出了一种改进的基于异质网络的邮件蠕虫病毒 SEIR(Susceptible-Ex-posed-Infected-Removed)传播模型。结合邮件蠕虫病毒的传播特点,利用相互作用的马尔可夫链方法推导出相应的 SEIR模型的动力学方程组,表征邮件蠕虫病毒的传播过程。通过蒙特卡罗方法对 SEIR 模型传播动力学过程进行实验仿真,探索影响邮件蠕虫病毒传播的基本因素。仿真结果表明,改进的邮件蠕虫病毒 SEIR 传播模型更加符合真实邮件网络上的蠕虫病毒传播过程,且快速地提高杀毒软件的安装概率以及杀毒软件的查杀能力能够有效地抑制邮件蠕虫病毒的传播。
Abstract:
 Currently,email has become one of the most commonly communication in daily life,while email worm-virus constitutes one of the major Internet security threats and has attracted considerable attention. Therefore,the research on the spreading models of email worm-virus has a great significance in preventing and controlling the propagation of email viruses. The probability of installing antivirus soft-ware,and the virus-killing ability of antivirus software are time-varying when the email worm-virus outbreaks. According to the above factors and the different opening probability of suspicious email caused by individual differences,propose an improved email worm-virus spreading SEIR (Susceptible-Exposed-Infected-Removed) model in heterogeneous networks with consideration of the scale-free fea-ture of email networks. Use the Interaction of Markov Chains (IMC) method to derive the dynamical equations of SEIR model,represen-ting the process of email worm-virus propagation. Furthermore,Monte-Carlo method is used to explore the basic factors affecting the propagation of email worm-virus. The simulation results show that the new SEIR model based on heterogeneous networks performs well on describing the real propagation of email worm-virus. In addition,the results of simulation also point out that quick increasing probabil-ity of installing antivirus software or improving virus-killing ability of antivirus can effectively restrain the propagation of email worm-virus.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(01):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(01):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(01):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(01):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(01):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(01):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(01):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(01):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(01):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(01):47.

更新日期/Last Update: 2016-04-12