期刊文献+

有限资源条件下网络病毒的阻断策略 被引量:4

Virus propagation and halting strategy of network under the limited resources condition
在线阅读 下载PDF
导出
摘要 分析了通过电子邮件途径传播的计算机病毒的特点,探讨了邮件病毒传播模型.在不同的感染率和恢复率条件下,通过变更感染源,分别采用不同的阻断策略.在中国教育网中对病毒的传播和控制进行了演化模拟,提出了在资源有限的条件下复杂网络控制病毒传播的有效策略. The characteristics of computer virus propagation attached on e-mail are studied. The model of computer virus epidemic is constructed, and the evolving process of virus spreading is simulated on the China Education Network. By changing infection source and adjusting infecting rate and recovering rate, some good strategies of control the spreading of virus on complex network are proposed.
出处 《上海理工大学学报》 EI CAS 北大核心 2007年第3期250-254,共5页 Journal of University of Shanghai For Science and Technology
基金 国家自然科学基金资助项目(70571074/G0116) 上海市重点学科建设资助项目(T0502) 上海市自然科学基金资助项目(06ZR14144)
关键词 复杂网络 无标度网络 中枢节点 病毒传播 中国教育网 complex network scale-free network hub virus spreading China Education Network
  • 相关文献

参考文献16

  • 1WATTS D J,STROGATZ S H.Collective dynamics of 'small-world' networks[J].Nature,1998,(393):440-442.
  • 2BARAB(A)SI A L,ALBERT R.Emergence of scaling in random networks[J].Science,(286):509-512.
  • 3FALOUTSOS M,FALOUTSOS P,FALOUTSOS C.On power-law relationships of the internet topology[J].Computer Communications Review,1999,(29):251-262.
  • 4AMARAL L A N,SCALA A,BARTHELEMY M,et al.Classes of small-world networks[J].Proc Natl Acad Sci USA,2000,(97):11149-11152.
  • 5MARTINEZ N D.Artifacts or attributes? Effects of resolution on the Little Rock Lake food web[J].Ecological Monographs,1991,(61):367-392.
  • 6JEONG H,TOMBOR B,ALBERT R,et al.The large-scale organization of metabolic networks[J].Nature,2000,(407):651-654.
  • 7ALBERT R,JEONG H,BARABASI A L.Diameter of the world-wide web[J].Nature,1999,(401):130-131.
  • 8BARABASI A L,JEONG H,RAVASZ R,et al.On the topology of the scientific collaboration networks[J].Physica A,2002,(311):590-614.
  • 9MARIOLIS P,Interlocking directorates and control of corporations:The theory of bank control[J].Social Science Quarterly,1975,(56):425-439.
  • 10BARABASI A L,JEONG H,RAVASZ R,et al.Evolution of the social network of scientific collaborations[J].Physica A,2002,(311):590-614.

二级参考文献16

  • 1[1]Schneier B. Secrets and lies: digital security in a networked world [M]. New York: John Wiley Press, 2000. 90~124
  • 2[2]CERT. CERT/CC statistics 1988-2003 [EB/OL]. http://www.cert.org/stats/cert_stats.html, 2003-07-15
  • 3[3]Brenton C. Active defense: a comprehensive guide to network security [M]. San Francisco: Sybex Press, 2001. 100~146
  • 4[4]Microsoft. Microsoft security bulletin (MS01 020) : incorrect MIME header can cause IE to execute E mail attachment [EB/OL]. http://www.microsoft.com/technet/security/bulletin/MS01 020.asp, 2003-06-23
  • 5[5]Microsoft. Microsoft security bulletin (MS03 026) : buffer overrun in RPC interface could allow code execution (823980) [EB/OL]. http://www.microsoft.com/technet/security/bulletin/MS03 026.asp, 2003-08-25
  • 6[6]Microsoft. Security bulletins [EB/OL]. http://www.microsoft.com/security/security_bulletins/, 2003-08-20
  • 7[7]Symantec. Symantec antivirus TM corporate edition [EB/OL]. http://www.symantec.com/region/cn/enterprise/article/nav_corpo_edition_7.6.html, 2003
  • 8Chen Q,Shi D.The modeling of scale-free networks[J].Physica A,2004,335:240-243
  • 9Albert R,Jeong H,Barabási A-L.Diameter of the world wide web[J].Nature,1999,401:130-131.
  • 10Barabási A-L,Albert R.Emergence of scaling in random networks[J].Science,1999,286:509-512.

共引文献19

同被引文献47

引证文献4

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部