期刊文献+

概率模型检测的网络传播干预策略 被引量:1

Propagation Protection Strategies of Probabilistic Model Checking Network
下载PDF
导出
摘要 网络普遍存在于自然界和人类社会中,计算机病毒、传染疾病、森林火灾以及社会流言等在网络中的传播给经济、社会带来巨大挑战.寻找有效的干预策略实现对网络传播的控制是一个重要的研究问题.根据传播过程的内在规律,引入了概率网络传播模型,将干预目标描述为相应的概率时序逻辑属性,提出了概率情况下的网络传播干预策略问题;进一步,以离散的邮件病毒传播模型为研究对象,重点分析了安装防护,定期防护两种防护措施,给出了相应的干预策略分析问题;并且,采用概率模型检测工具PRISM,结合近似模型检测方法,进行了实验分析. Network exists widely in nature and human society. The spread of infections such as computer viruses, diseases and rumors poses great challenges to economic and societal system. It is an important issue in the network propagation control to protect individuals by finding effective intervention strategies. By analyzing the innate laws of propagation processes, the probabilistic network propa- gation model is used and the intervention goals are expressed as probabilistic logical properties, and thus we put forward probabilistic intervention strategies. Moreover,the discrete spreading model of the email virus is taken as an example and a further study on two kinds of protective measures including the installing protection, the periodical protection is made. Then analyses of intervention strategies are summarized. Furthermore, and experiments are conducted by the probabilistic model checker PRISM with approximate proba- bilistic model checking.
出处 《小型微型计算机系统》 CSCD 北大核心 2017年第6期1175-1180,共6页 Journal of Chinese Computer Systems
基金 国家"九七三"重点基础研究发展计划项目(2014CB744904)资助 国家自然(61170043 61272033)资助
关键词 概率模型检测 网络传播干预策略 近似模型检测方法 形式化方法 probabilistic model checking network propagation intervention approximate probabilistic model checking formal methods
  • 相关文献

参考文献1

二级参考文献8

  • 1郝向东,王开云,张春瑞,李佳.蠕虫在P2P网络中的传播研究[J].计算机工程,2007,33(8):139-141. 被引量:5
  • 2Pastor S R, Vespignani A. Immunization of Complex Networks[J]. Physical Review E, 2002, 65(3). 被引量:1
  • 3Chen Yiping, Paul G, Havlin S, et al. Finding a Better Immunization Strategy[J]. Physical Review Letters, 2008, 101(5). 被引量:1
  • 4Gallos L K. Liljeros F, Argvrakis P, et al. Improving Immunization Strategies[J]. Physical Review E, 2007, 75(4). 被引量:1
  • 5Echenique P, Gomez G J, Moreno Y, et al. Distance-D Covering Problem in Scale-free Networks with Degree Correlation[J]. Physical Review E, 2005, 71 (3). 被引量:1
  • 6Zou C C, Towsley D, Gong Weibo. Modeling and Simulation Study of the Propagation and Defense of lnternet E-mail Worms[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(2): 105-118. 被引量:1
  • 7Adler R, Feldman R, Taqqu M. A Practical Guide to Heavy Tail: Statistical Techniques and Applications[M]. Boston, USA: Birkhauser, 1998. 被引量:1
  • 8彭俊好,徐国爱,朱振荣,杨义先.SIRS蠕虫传播模型及其分析[J].计算机工程,2008,34(7):134-136. 被引量:6

共引文献4

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部