Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer virus spreading source tracing method based on complex network

A computer virus and complex network technology, applied in the field of computer virus transmission source seeking based on complex network, can solve the problem that the virus transmission cannot be suppressed from the source, and achieve the effect of enriching the defense system and improving security

Inactive Publication Date: 2017-04-26
贾志娟
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of model cannot determine which is the source of the computer virus, therefore, it is impossible to suppress the spread of the virus from the source

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer virus spreading source tracing method based on complex network
  • Computer virus spreading source tracing method based on complex network
  • Computer virus spreading source tracing method based on complex network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings.

[0026] Such as figure 1 , 2 , 3, 4, and 5, the present invention comprises the following steps:

[0027] ①. Construct a network diagram of computer virus transmission;

[0028] ②. Construct virus infection state vector;

[0029] ③. Construct immune state vector;

[0030] ④. Construct the network timing state matrix.

[0031] The step ① adopts connection matrix E n×n Describe the connectivity of the network, where e ij = 1 means node v i and node v j directly connected in the network, e ij = 0 means node v i and node v j are not connected in the network, and e ij = e ji .

[0032] The step ② uses the SIR model to study the propagation characteristics of computer viruses in the network.

[0033] The step ③ is specifically to use the immune state vector to store the computer nodes that have been killed in the network. It is assumed that as long as the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer virus spreading source tracing method based on a complex network, and relates to the technical field of computer virus network spreading. The source tracing method comprises the following steps: (1) building a computer virus spreading network diagram; (2) building a virus infection state vector; (3) building an immune state vector; and (4) building a network time sequence state matrix. Through adoption of the computer virus spreading source tracing method based on the complex network, an effective strategy is provided for the control of computer virus spreading; a computer virus defense system is further enriched; and the security of a computer is improved.

Description

technical field [0001] The invention relates to the technical field of computer virus network propagation, in particular to a method for seeking the source of computer virus propagation based on a complex network. Background technique [0002] With the rapid development of network technology, computer network has become an indispensable part of people's social life. People can use the network for information exchange, office, entertainment and other social activities. However, the Internet also provides a new platform for the spread of computer viruses. The spread of computer viruses on the Internet has caused a huge threat to the Internet and has become the biggest security risk on the Internet. Therefore, it has become a primary task in the field of network information security to analyze the network propagation characteristics and source characteristics of computer viruses, and to propose effective defense strategies. [0003] A computer virus is a set of computer instr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 贾志娟王永刚杨艳艳刘新新黄有天
Owner 贾志娟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products