搜索

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

推荐重要节点部署防御策略的优化模型

杨雄 黄德才 张子柯

引用本文:
Citation:

推荐重要节点部署防御策略的优化模型

杨雄, 黄德才, 张子柯

Recommendation of important nodes in deployment optimization model of defense strategy

Yang Xiong, Huang De-Cai, Zhang Zi-Ke
PDF
导出引用
  • 当前网络安全防御策略集中部署于高连接度节点主要有2个方面的不足: 一是高连接度节点在很多场合中并不是网络通信的骨干节点; 二是该类节点对信息的转发和传播并非总是最有效的.针对以上传统部署策略的不足, 改进了恶意病毒程序传播的离散扩散模型并采用中间路径跳数来衡量网络节点的重要程度, 提出了基于介数中心控制力和接近中心控制力模型的重要节点优先推荐部署技术.实验结果显示具有高介数中心控制力和低接近中心控制力的节点相对于传统的高连接度节点无论在无标度网络还是小世界网络均能够对恶意病毒程序的疫情扩散和早期传播速度起到更加有效的抑制作用, 同时验证了网络分簇聚类行为产生的簇团特性也将对恶意程序的传播起到一定的负面影响.
    Current network security defense strategy focuses on deploying to high degree nodes where there are mainly two aspects of the problem: One is that the high-degree nodes are not the backbone nodes for the network communication in many occasions; another is that these nodes are not always the most effective ones for forwarding and propagation information. With the disadvantage of current network defense strategy deployment, this paper tends to improve the traditional diffusion model of malicious program propagation and measure the importance of network nodes by using intermediate hops, then the important node for recommended deployment technology based on betweenness center control and closeness center control model is put forward. Experimental results show that the nodes with high betweenness centrality and low closeness centrality as compared with the high degree nodes can more effectively quarantine the spreading of the worms whether in scale-free network or in small world network. Meanwhile, the clustering behavior of a network will also play a certain negative impact on the spread of malicious programs.
    • 基金项目: 浙江省自然科学基金(批准号: LY12A05003, LQ13F030015)和江苏省高校自然科学基金(批准号: 13KJD520001)资助的课题.
    • Funds: Project supported by the Natural Science Foundation of Zhejiang pvovince, China (Grant Nos. LY12A05003, LQ13F030015), and the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province, China (Grant No. 13KJD520001).
    [1]

    Zou C C, Towsley D, Gong W B 2007 IEEE Trans. Dependable Sec. Comput. 4 105

    [2]

    Fan X, Xiang Y 2010 Future Gener. Comput.Syst. 26 1433

    [3]

    Yan G H, Chen G L, Eidenbenz S, Li N 2011 Proceedings of the 2011 ACM Symposium on Information, Computer and Communications Security Hong Kong, China, March 22-24 2011 p196

    [4]

    Xing Q B, Zhang Y B, Liang Z N 2011 Chin. Phys. B 20 120201

    [5]

    Song Y R, Jiang G P, Gong Y W 2012 Chin. Phys. B 21 010205

    [6]

    Lu Y L, Jiang G P, Song Y R 2012 Chin. Phys. B 21 100207

    [7]

    Maksim K, Lazaros K G, Shlomo H, Fredrik L, Lev M, Stanley H E, Hernan A M 2011 Nature Physics 6 888

    [8]

    Schneider C M, Moreira A A, Andrade J S, Havlin S, Herrmann H J 2011 PNAS 108 3838

    [9]

    Zhao D W, Li L X, Peng H P, Luo Q, Yang Y X 2014 Phys. Lett. A 10 770

    [10]

    Song Y R, Jiang G P 2010 Acta Phys. Sin. 59 705 (in Chinese) [宋玉蓉, 蒋国平 2010 物理学报 59 705]

    [11]

    Ebel H, Mielsch L, Bornholdt S 2002 Phys. Rev. E 66 035103

    [12]

    Mislove A, Marcon M, Gummadi K P, Druschel P, Bhattacharjee B 2007 Proceedings of 2007 ACM/USENIX Internet Measurement Conference California, USA, October 24-26 2007 p29

    [13]

    Zou C C, Gong W B, Towsley D, Gao L 2005 IEEEACM Trans. Networking 13 961

    [14]

    Newman M E J 2005 Social Networks 27 39

    [15]

    Chen D B, Gao H, L L Y, Zhou T 2013 PLoS ONE 8 77455

  • [1]

    Zou C C, Towsley D, Gong W B 2007 IEEE Trans. Dependable Sec. Comput. 4 105

    [2]

    Fan X, Xiang Y 2010 Future Gener. Comput.Syst. 26 1433

    [3]

    Yan G H, Chen G L, Eidenbenz S, Li N 2011 Proceedings of the 2011 ACM Symposium on Information, Computer and Communications Security Hong Kong, China, March 22-24 2011 p196

    [4]

    Xing Q B, Zhang Y B, Liang Z N 2011 Chin. Phys. B 20 120201

    [5]

    Song Y R, Jiang G P, Gong Y W 2012 Chin. Phys. B 21 010205

    [6]

    Lu Y L, Jiang G P, Song Y R 2012 Chin. Phys. B 21 100207

    [7]

    Maksim K, Lazaros K G, Shlomo H, Fredrik L, Lev M, Stanley H E, Hernan A M 2011 Nature Physics 6 888

    [8]

    Schneider C M, Moreira A A, Andrade J S, Havlin S, Herrmann H J 2011 PNAS 108 3838

    [9]

    Zhao D W, Li L X, Peng H P, Luo Q, Yang Y X 2014 Phys. Lett. A 10 770

    [10]

    Song Y R, Jiang G P 2010 Acta Phys. Sin. 59 705 (in Chinese) [宋玉蓉, 蒋国平 2010 物理学报 59 705]

    [11]

    Ebel H, Mielsch L, Bornholdt S 2002 Phys. Rev. E 66 035103

    [12]

    Mislove A, Marcon M, Gummadi K P, Druschel P, Bhattacharjee B 2007 Proceedings of 2007 ACM/USENIX Internet Measurement Conference California, USA, October 24-26 2007 p29

    [13]

    Zou C C, Gong W B, Towsley D, Gao L 2005 IEEEACM Trans. Networking 13 961

    [14]

    Newman M E J 2005 Social Networks 27 39

    [15]

    Chen D B, Gao H, L L Y, Zhou T 2013 PLoS ONE 8 77455

计量
  • 文章访问数:  4317
  • PDF下载量:  259
  • 被引次数: 0
出版历程
  • 收稿日期:  2014-07-26
  • 修回日期:  2014-10-10
  • 刊出日期:  2015-03-05

/

返回文章
返回