• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网页恶意软件传播建模与最优控制策略。

Web malware spread modelling and optimal control strategies.

机构信息

School of Mathematical Sciences, University of Electronic Science and Technology of China, Chengdu 611731, China.

College of Computer Science and Engineering, Chongqing University of Technology, Chongqing 400054, China.

出版信息

Sci Rep. 2017 Feb 10;7:42308. doi: 10.1038/srep42308.

DOI:10.1038/srep42308
PMID:28186203
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5301259/
Abstract

The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice.

摘要

Web 的普及提高了网络威胁的增长。为了准确预测网络上恶意传播,制定数学模型非常重要。本文旨在了解网络恶意软件的传播机制以及人为干预对恶意超链接传播的影响。考虑到网络恶意软件的特点,通过添加另一个延迟部分,对传统的 SIR 模型进行了扩展,提出了一种新的微分传染病模型,以解决恶意链接在网络上的传播行为。计算了模型系统的传播阈值,并从理论上分析了模型的动力学。此外,还采用最优控制理论研究了恶意软件免疫策略,旨在使安全投资和感染损失的总经济损失尽可能低。确认了最优系统相关结果的存在性和唯一性。最后,数值模拟表明,通过选择适当的特定参数控制策略,可以有效控制恶意软件链接的传播。

相似文献

1
Web malware spread modelling and optimal control strategies.网页恶意软件传播建模与最优控制策略。
Sci Rep. 2017 Feb 10;7:42308. doi: 10.1038/srep42308.
2
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.
3
Disrupting drive-by download networks on Twitter.破坏推特上的驱动式下载网络。
Soc Netw Anal Min. 2022;12(1):117. doi: 10.1007/s13278-022-00944-2. Epub 2022 Aug 20.
4
Statistical modeling of computer malware propagation dynamics in cyberspace.网络空间中计算机恶意软件传播动态的统计建模
J Appl Stat. 2020 Nov 10;49(4):858-883. doi: 10.1080/02664763.2020.1845621. eCollection 2022.
5
Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism.基于集成投票机制的深度学习评估和分类混淆型 Android 恶意软件。
Sci Rep. 2023 Feb 22;13(1):3093. doi: 10.1038/s41598-023-30028-w.
6
Optimal control analysis of malware propagation in cloud environments.
Math Biosci Eng. 2023 Jul 4;20(8):14502-14517. doi: 10.3934/mbe.2023649.
7
Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.基于流行病学理论的集群式无线传感器网络恶意软件传播模型
PeerJ Comput Sci. 2021 Sep 15;7:e728. doi: 10.7717/peerj-cs.728. eCollection 2021.
8
A Kullback-Liebler divergence-based representation algorithm for malware detection.一种基于库尔贝克-莱布勒散度的恶意软件检测表示算法。
PeerJ Comput Sci. 2023 Sep 22;9:e1492. doi: 10.7717/peerj-cs.1492. eCollection 2023.
9
Detecting and classifying method based on similarity matching of Android malware behavior with profile.基于安卓恶意软件行为与配置文件相似度匹配的检测与分类方法
Springerplus. 2016 Mar 3;5:273. doi: 10.1186/s40064-016-1861-x. eCollection 2016.
10
A novel model for malware propagation on wireless sensor networks.
Math Biosci Eng. 2024 Feb 22;21(3):3967-3998. doi: 10.3934/mbe.2024176.

引用本文的文献

1
A novel numerical solution of nonlinear stochastic model for the propagation of malicious codes in Wireless Sensor Networks using a high order spectral collocation technique.一种使用高阶谱配置技术求解无线传感器网络中恶意代码传播的非线性随机模型的新数值方法。
Sci Rep. 2025 Jan 2;15(1):228. doi: 10.1038/s41598-024-82033-2.
2
Categorizing and Harmonizing Natural, Technological, and Socio-Economic Perils Following the Catastrophe Modeling Paradigm.按照灾害建模范式对自然、技术和社会经济风险进行分类和协调。
Int J Environ Res Public Health. 2022 Oct 6;19(19):12780. doi: 10.3390/ijerph191912780.
3
Stability behavior of a two-susceptibility SHIR epidemic model with time delay in complex networks.

本文引用的文献

1
Pattern formation of an epidemic model with diffusion.具有扩散的流行病模型的模式形成
Nonlinear Dyn. 2012;69(3):1097-1104. doi: 10.1007/s11071-012-0330-5. Epub 2012 Jan 28.
2
Pattern transitions in spatial epidemics: Mechanisms and emergent properties.空间流行病中的模式转变:机制与涌现特性。
Phys Life Rev. 2016 Dec;19:43-73. doi: 10.1016/j.plrev.2016.08.002. Epub 2016 Aug 9.
3
Impact of Information based Classification on Network Epidemics.基于信息的分类对网络传播的影响。
复杂网络中具有时滞的双易感性SHIR传染病模型的稳定性行为
Nonlinear Dyn. 2021;106(1):1083-1110. doi: 10.1007/s11071-021-06804-6. Epub 2021 Aug 30.
4
Fuel shortages during hurricanes: Epidemiological modeling and optimal control.飓风期间的燃料短缺:流行病学建模与最优控制。
PLoS One. 2020 Apr 1;15(4):e0229957. doi: 10.1371/journal.pone.0229957. eCollection 2020.
Sci Rep. 2016 Jun 22;6:28289. doi: 10.1038/srep28289.
4
Predicting the epidemic threshold of the susceptible-infected-recovered model.预测易感-感染-康复模型的流行阈值。
Sci Rep. 2016 Apr 19;6:24676. doi: 10.1038/srep24676.
5
High-Performance Consensus Control in Networked Systems With Limited Bandwidth Communication and Time-Varying Directed Topologies.具有有限带宽通信和时变有向拓扑的网络系统中的高性能一致性控制。
IEEE Trans Neural Netw Learn Syst. 2017 May;28(5):1043-1054. doi: 10.1109/TNNLS.2016.2519894. Epub 2016 Feb 8.
6
Effects of time delay and space on herbivore dynamics: linking inducible defenses of plants to herbivore outbreak.时间延迟和空间对食草动物动态的影响:将植物的诱导防御与食草动物爆发联系起来。
Sci Rep. 2015 Jun 18;5:11246. doi: 10.1038/srep11246.
7
Optimizing hybrid spreading in metapopulations.优化集合种群中的混合扩散
Sci Rep. 2015 Apr 29;5:9924. doi: 10.1038/srep09924.
8
A genetic epidemiology approach to cyber-security.一种用于网络安全的遗传流行病学方法。
Sci Rep. 2014 Jul 16;4:5659. doi: 10.1038/srep05659.
9
Susceptible-infected-susceptible model: a comparison of N-intertwined and heterogeneous mean-field approximations.易感-感染-易感模型:N 交织与异质平均场近似的比较
Phys Rev E Stat Nonlin Soft Matter Phys. 2012 Aug;86(2 Pt 2):026116. doi: 10.1103/PhysRevE.86.026116. Epub 2012 Aug 28.
10
Computer security: Is this the start of cyberwarfare?计算机安全:这是网络战的开端吗?
Nature. 2011 Jun 8;474(7350):142-5. doi: 10.1038/474142a.