CN104166708A - Mobile phone virus spreading modeling method based on social network and semi-Markov process - Google Patents
Mobile phone virus spreading modeling method based on social network and semi-Markov process Download PDFInfo
- Publication number
- CN104166708A CN104166708A CN201410390017.2A CN201410390017A CN104166708A CN 104166708 A CN104166708 A CN 104166708A CN 201410390017 A CN201410390017 A CN 201410390017A CN 104166708 A CN104166708 A CN 104166708A
- Authority
- CN
- China
- Prior art keywords
- state
- node
- virus
- mobile phone
- social network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了一种基于社交网络和半马尔可夫过程的手机病毒传播建模方法。该方法的主要技术要点包括:首先将人们通过发送短信或彩信来进行社会交往的行为抽象成社交网络,再对社交网络的特征进行分析以揭示其与手机病毒传播之间的关系;其次,引入了半马尔可夫过程来对节点的状态转换进行建模,并将交互次数与状态转换概率有机地结合在一起,以有效地发现节点在遭受病毒攻击后状态变化的规律;第三,引入传染系数和抵抗系数来刻画个体差异性对病毒传播的影响;还开发了一个模拟器来进行实验验证。本发明与现有技术相比,其优点是考虑了人们的社交行为和个体差异性对病毒传播的影响,此方法简单、实用且能有效地提高预测病毒传播的速度和精度。The invention discloses a mobile phone virus propagation modeling method based on a social network and a semi-Markov process. The main technical points of this method include: firstly, the behavior of social interaction by sending short messages or multimedia messages is abstracted into a social network, and then the characteristics of the social network are analyzed to reveal the relationship between it and the spread of mobile phone viruses; secondly, the introduction of A semi-Markov process is used to model the state transition of the node, and the number of interactions and the state transition probability are organically combined to effectively discover the law of the state change of the node after being attacked by the virus; thirdly, the introduction of infection coefficient and resistance coefficient to describe the impact of individual differences on virus transmission; a simulator was also developed for experimental verification. Compared with the prior art, the present invention has the advantage of considering the impact of people's social behavior and individual differences on virus transmission, and the method is simple, practical and can effectively improve the speed and accuracy of predicting virus transmission.
Description
技术领域 technical field
本发明涉及手机病毒传播动力学建模与分析,提供一种基于社交网络和半马尔可夫过程的手机病毒传播建模方法,属于网络与信息安全领域。 The present invention relates to modeling and analysis of mobile phone virus propagation dynamics, provides a mobile phone virus propagation modeling method based on social network and semi-Markov process, and belongs to the field of network and information security.
背景技术 Background technique
随着短信(short message service, SMS)和彩信(multimedia messaging service, MMS)越来越受到人们的青睐,使得基于SMS/MMS的社交网络具有非常适合手机病毒的传播。因此,如何对基于SMS/MMS的病毒传播动力学进行建模与分析,成为了移动通信网络安全的一个重要问题。该病毒是在人们收发SMS/MMS进行社会交往时进行传播的,具有隐蔽性强、传播速度快、危害大等特点。另外,基于SMS/MMS的社交网络的节点度分布具有幂律分布的特性,根据社交网络和手机病毒传播的特点,设计一种病毒传播动力学模型来刻画人们社会交往对手机病毒传播的影响以及个体的差异性对手机病毒传播的影响。这样有利于发现手机病毒的传播规律和预测手机病毒的传播趋势,为遏制手机病毒的传播奠定基础。 As short message (short message service, SMS) and multimedia messaging (multimedia messaging service, MMS) are more and more popular, making SMS/MMS-based social networks very suitable for the spread of mobile phone viruses. Therefore, how to model and analyze the dynamics of virus propagation based on SMS/MMS has become an important issue in the security of mobile communication networks. The virus spreads when people send and receive SMS/MMS for social interaction, and has the characteristics of strong concealment, fast transmission speed, and great harm. In addition, the node degree distribution of SMS/MMS-based social network has the characteristics of power-law distribution. According to the characteristics of social network and mobile phone virus transmission, a virus transmission dynamics model is designed to describe the impact of people's social interaction on mobile phone virus transmission and The impact of individual variability on the spread of mobile phone viruses. This is conducive to discovering the spread of mobile phone viruses and predicting the spread of mobile phone viruses, laying the foundation for curbing the spread of mobile phone viruses.
目前,现有的针对手机病毒的相关研究,大部分传播模型都是采用生物病毒传播学原理来建模,不能适用于大规模网络环境,而且没有考虑人们的社交行为和个体的差异性对手机病毒传播的影响。 At present, most of the existing research on mobile phone viruses uses the principles of biological virus transmission to model, which cannot be applied to large-scale network environments, and does not consider the impact of people's social behavior and individual differences on mobile phones. Effects of viral spread.
因此,考虑到国家、人们对网络安全的需要,作为国家自然科学基金面上项目“智能手机病毒传播动力学建模理论及分析方法研究”(61379041)的研究成果之一,我们提出了一种基于社交网络和半马尔可夫过程的手机病毒传播建模方法。该方法将人们发送SMS/MMS来进行社会交往的行为抽象成社交网络,再对社交网络的特征进行分析以揭示其与手机病毒传播之间的关系;引入半马尔可夫过程来对节点的状态转换进行建模,并将交互次数与状态转换概率有机地结合在一起;引入传染系数和抵抗系数来刻画个体差异性对病毒传播的影响;采用Visual C++ 6.0和MATLAB 7.0的混合编程技术开发了一个模拟器来进行实验验证。 Therefore, considering the needs of the country and people for network security, we propose a A Modeling Method for Mobile Virus Propagation Based on Social Network and Semi-Markov Process. This method abstracts the behavior of people sending SMS/MMS for social interaction into a social network, and then analyzes the characteristics of the social network to reveal the relationship between it and the spread of mobile phone viruses; introduces a semi-Markov process to analyze the status of nodes Transformation is modeled, and the number of interactions is organically combined with the state transition probability; the infection coefficient and resistance coefficient are introduced to describe the impact of individual differences on virus transmission; a hybrid programming technology of Visual C++ 6.0 and MATLAB 7.0 is used to develop a Simulator for experimental verification.
发明内容 Contents of the invention
本发明的目的是提供一种基于社交网络和半马尔可夫过程的手机病毒传播建模方法。该方法考虑到病毒的复杂性及其传播过程的不确定性,能更好地刻画人们的社交行为和个体的差异性对病毒传播的影响。从而为手机病毒的防控提供一种有效的解决方案。 The purpose of the present invention is to provide a mobile phone virus propagation modeling method based on social network and semi-Markov process. This method takes into account the complexity of the virus and the uncertainty of its transmission process, and can better describe the impact of people's social behavior and individual differences on the spread of the virus. So as to provide an effective solution for the prevention and control of mobile phone viruses.
为了实现上述目的,本发明利用实际的短信/彩信通信数据来构建社交网络,以便发现和刻画不同个体之间的交互关系与病毒传播之间的关系。然后,对节点的异常行为及其转换规律进行分析和建模;最后,引入传染系数和抵抗系数来揭示个体的差异性与病毒传播之间的关系。主要的发明内容如下。 In order to achieve the above purpose, the present invention utilizes the actual SMS/MMS communication data to construct a social network, so as to discover and describe the relationship between the interaction between different individuals and the virus transmission. Then, analyze and model the abnormal behavior of the nodes and their transformation rules; finally, introduce the infection coefficient and resistance coefficient to reveal the relationship between individual differences and virus transmission. The main invention content is as follows.
(1)社交网络的构建(1) Construction of social network
它可用一个无向加权图G=(V,E,W)来表示,其中:V表示顶点集合,即表示移动通信网络中的手机;E为网络中节点间的有向边,表示手机用户之间发送短信的行为,边的弧头指向表示短信行为的接受方;W为有向边的权重,表示发送短信的行为的值,值越大表示发送短信的数量越多。d i 表示顶点i的度,即手机的数量(表示链接的数量或手机拥有d i 个朋友)。C ij 表示从i发送到j的短信和彩信的数量。另外,还引入两个函数f(i)和f(i, j)分别映射每个顶点 和每条边。因此,该图可以分别用f(i)和f(i, j)来确定顶点和边的权重。顶点和边的权重的映射函数表示为:f(i)= d i ,f(i, j)= C ij +C ji 。 It can be represented by an undirected weighted graph G = ( V , E , W ), where: V represents the set of vertices, that is, mobile phones in the mobile communication network; E is the directed edge between nodes in the network, representing the relationship between mobile phone users The behavior of sending short messages, the arc head of the edge points to the recipient of the short message behavior; W is the weight of the directed edge, which represents the value of the short message sending behavior, and the larger the value, the more the number of short messages sent. d i represents the degree of vertex i , that is, the number of mobile phones (means the number of links or mobile phones have d i friends). C ij represents the number of short messages and multimedia messages sent from i to j . In addition, two functions f ( i ) and f ( i , j ) are introduced to map each vertex and each edge . Therefore, the graph can use f ( i ) and f ( i , j ) to determine the weights of vertices and edges, respectively. The mapping function of the weights of vertices and edges is expressed as: f ( i ) = d i , f ( i , j ) = C ij +C ji .
顶点和边的权重可同时用来表示手机被病毒感染的概率。从f(i)= d i 可以看出,顶点的权重取决于d i 。对于基于SMS/MMS的病毒,如果某部手机的入度大,就表示它更容易被病毒感染,而出度大表示它更容易把病毒传染给其它手机。因此,那些具有节点度大的手机,无论是它的入度大还是出度大,都应当分配一个更大的顶点权重。任意两台手机相互之间的社会交往情况可用f(i, j)= C ij +C ji 来表示。 The weights of vertices and edges can be used to represent the probability of a mobile phone being infected by a virus at the same time. From f ( i ) = d i we can see that the weight of a vertex depends on d i . For SMS/MMS-based viruses, if the in-degree of a certain mobile phone is large, it means that it is more likely to be infected by the virus, while the large out-degree means that it is more likely to infect other mobile phones with the virus. Therefore, those phones with large node degrees should be assigned a larger vertex weight no matter whether it has a large in-degree or a large out-degree. The social interaction between any two mobile phones can be represented by f ( i , j ) = C ij +C ji .
(2)节点状态分类(2) Node status classification
采用半马尔可夫过程对手机感染病毒后出现异常行为进行建模的基础是将手机划分为不同的状态。根据手机本身所表现出来的行为特性,拟把个体的状态分为以下4种。 The basis of modeling the abnormal behavior of mobile phones after virus infection by semi-Markov process is to divide mobile phones into different states. According to the behavior characteristics displayed by the mobile phone itself, it is proposed to divide the individual states into the following four types.
A)易感状态S(Susceptible),即节点未被感染,并且没有免疫力;病毒从处于易感状态S的节点出发,通过网络连接向四周传播。 A) Susceptible state S (Susceptible), that is, the node is not infected and has no immunity; the virus starts from the node in the susceptible state S and spreads around through the network connection.
B)潜伏状态E(Exposed),病毒入侵后被感染的节点处于潜伏状态E,由于不同节点自身对病毒的重视程度不同,处于潜伏期E的部分节点会进入状态I和R,另一部分则会返回状态S。 B) Latent state E (Exposed). After the virus invades, the infected nodes are in the latent state E. Because different nodes attach different importance to the virus, some nodes in the latent period E will enter the state I and R , and the other part will return state S.
C)染病状态I(Infected),即节点已被感染,此时节点具有传染性。 C) Infected state I (Infected), that is, the node has been infected, and the node is infectious at this time.
D)免疫状态R(Recovered),在病毒传播开来后,部分处于状态S的节点通过采取一些安全措施对该病毒产生预免疫,进入免疫状态R。 D) Immune state R (Recovered). After the virus spreads, some nodes in state S take some safety measures to pre-immunize the virus and enter immune state R.
(3)状态之间的相互转换关系(3) Mutual conversion relationship between states
节点各状态之间的相互转换关系如下。 The mutual conversion relationship between the states of the nodes is as follows.
A)由于安装杀毒软件,一个处于易感状态的节点转换为免疫状态;由于很多原因也可使该节点转换为潜伏状态,例如:没有安装杀毒软件、从网上随意下载应用程序并进行安装。 A) Due to the installation of anti-virus software, a node in a susceptible state is converted to an immune state; due to many reasons, the node can also be converted to a latent state, such as: no anti-virus software is installed, and applications are downloaded and installed from the Internet at will.
B)如果一个处于感染状态的节点能及时地安装杀毒软件,它便能转换为免疫状态或易感状态。 B) If a node in an infected state can install anti-virus software in time, it can be transformed into an immune state or a susceptible state.
C)如果一个处于潜伏状态的节点能及时地采取相应的安全措施,它便能转换为免疫状态或易感状态;但如果正处于病毒爆发时期,也可能转换为感染状态。 C) If a node in a latent state can take corresponding safety measures in time, it can be transformed into an immune state or a susceptible state; but if it is in a virus outbreak period, it may also be transformed into an infected state.
D)当一种新病毒出现时,一个处于免疫状态的节点能再次转换为易感节点。 D) When a new virus appears, a node in an immune state can be converted into a susceptible node again.
(4)节点异常行为建模(4) Node abnormal behavior modeling
在半马尔可夫过程中,节点从一个状态转移到另一个状态可以用两个矩阵来表示:P = (p ij )和F(t) = (F ij (t)),其中p ij 表示节点从状态Z i 变为状态Z j 的转移概率;F ij (t)节点表示从当前状态Z i 转移到状态Z j 的时间分布。假定一个半马尔可夫过程{X(t), t≥0},其状态空间为W={S, E, I, R}及DTMC的一步转移概率矩阵P所示,当t→∞时,转移分布P ij (t)服从非格点的分布及具有极限概率P j ,则 In a semi-Markov process, the transition of a node from one state to another can be represented by two matrices: P = ( p ij ) and F ( t ) = ( F ij ( t )), where p ij represents the node The transition probability from state Z i to state Z j ; the F ij ( t ) node represents the time distribution from current state Z i to state Z j . Assuming a semi-Markov process { X ( t ), t ≥ 0}, its state space is W = { S , E , I , R } and the one-step transition probability matrix P of DTMC, when t → ∞, The transition distribution P ij ( t ) obeys the non-lattice distribution and has a limit probability P j , then
其中,M(j)、M(k)分别表示在状态Z j 、Z k 逗留的平均时间,且,(设T i 是在状态Z i 的逗留时间,T j 是在状态Z j 的逗留时间);是{Z n }的平稳分布,且,,。 Among them, M ( j ) and M ( k ) represent the average time of staying in states Z j and Z k respectively, and , (Let T i be the time spent in state Z i and T j be the time spent in state Z j ); is a stationary distribution of { Z n }, and , , .
要计算P j ,就需要求出p ij 和M(i)。然而,通过该式来计算P j 也并不是一件容易的事情,因为难以确定逗留时间M(i)。因此,本发明不仅给出了基于半马尔可夫过程的节点行为模型及用来分析极限状态概率的计算表达式,而且建立了一个网络场景并提供了相应的理论分析。 To calculate P j , it is necessary to find p ij and M ( i ). However, it is not an easy task to calculate P j through this formula, because it is difficult to determine the residence time M ( i ). Therefore, the present invention not only provides a node behavior model based on a semi-Markov process and calculation expressions for analyzing limit state probability, but also establishes a network scene and provides corresponding theoretical analysis.
(5)个体差异性建模(5) Individual difference modeling
由于病毒的传播与个体的抵抗力和病毒传染性的强弱都有关,而现有的病毒传播模型大都没有考虑个体的差异性对病毒传播的影响。因此,本发明引入了3个参数来刻画个体的差异性对病毒传播的影响,具体描述如下。 Since the spread of the virus is related to the resistance of the individual and the strength of the virus infectivity, most of the existing virus spread models do not consider the impact of individual differences on the spread of the virus. Therefore, the present invention introduces three parameters to characterize the influence of individual differences on virus transmission, which are specifically described as follows.
A)传染系数:用IC ji (Infection Coefficient, IC)表示,即节点j对i传染性的强弱();当IC ji =0,表示该节点没有传染性;当IC ji =1,表示该节点具有极强的传染性。 A) Infection coefficient: Expressed by IC ji (Infection Coefficient, IC), that is, the strength of node j 's infectivity to i ( ); when IC ji =0, it means that the node is not infectious; when IC ji =1, it means that the node is extremely infectious.
B)抵抗系数:用RC ij (Resisted Coefficient, RC)表示,即节点i对j的抵抗能力的大小();当RC ij =1,表示该节点具有极强的抵抗能力。 B) Resistance coefficient: represented by RC ij (Resisted Coefficient, RC), that is, the resistance of node i to j ( ); when RC ij =1, it means that the node has extremely strong resistance.
C)感染阈值:用IT i (Infection Threshold, IT)表示,即节点i的朋友节点对其影响力的总和。用来判断处于状态S的节点的状态是否会发生变化。 C) Infection Threshold: represented by IT i (Infection Threshold, IT), which is the sum of the influence of node i 's friend nodes on it. It is used to judge whether the state of the node in state S will change.
(6)病毒传播模型(6) Virus transmission model
根据短信/彩信病毒传播的特点,在构建社会关系图的基础上,设计相应的状态转换算法,并利用该算法来刻画短信/彩信病毒的传播过程。状态转换算法具体为。 According to the characteristics of SMS/MMS virus propagation, on the basis of constructing the social relationship graph, the corresponding state transition algorithm is designed, and the algorithm is used to describe the propagation process of SMS/MMS virus. The state transition algorithm is specifically.
第1步:初始化网络。根据短信/彩信数据集来统计网络的相关信息,如节点的数量、短信发送情况等。 Step 1: Initialize the network. According to the SMS/MMS data set, the relevant information of the network is counted, such as the number of nodes, the sending status of SMS, etc.
第2步:初始化每个节点的状态。随机地选节点j并将其状态设置为I,其它节点状态都设置为S。 Step 2: Initialize the state of each node. Randomly select node j and set its state to I , and set the state of other nodes to S.
第3步:统计朋友节点信息。每个节点根据与其它节点发送短信/彩信的情况,来统计各自的朋友节点信息。 Step 3: Statistics of friend node information. Each node counts its own friend node information according to the situation of sending SMS/MMS with other nodes.
第4步:设在某时刻t时访问节点j,假设T表示节点从S状态转变为E状态的阈值,则:如果j的状态为I,则遍历j的朋友节点,如果其朋友节点i的状态为S,而且,此时j发送短信或彩信给i,那么:A)当时,则i以概率p SE 转变成状态E;B)当时,则i保持状态S不变;C)当IC ji =0或RC ij =1时,则i以概率p SR 转变成状态R;同时,j以概率p IR 转变成状态R;如果j的状态为E,则该节点以概率p ER 转变成状态R,或该节点以概率p EI 转变成状态I;重复执行第4步,直到遍历完所有节点为止。 Step 4: Assuming that node j is visited at a certain time t , assuming that T represents the threshold for the node to change from S state to E state, then: if the state of j is I , then traverse j ’s friend nodes, if its friend node i ’s The state is S , and at this time j sends a short message or multimedia message to i , then: A) when , then i transitions to state E with probability p SE ; B) when , then i remains in state S unchanged; C) when IC ji =0 or RC ij =1, then i transitions to state R with probability p SR ; at the same time, j transitions to state R with probability p IR ; if j 's The state is E , then the node changes to state R with probability p ER , or the node changes to state I with probability p EI ; repeat step 4 until all nodes are traversed.
第5步:t=t+1,算法结束。 Step 5: t = t +1, the algorithm ends.
(7)病毒传播分析(7) Virus transmission analysis
借鉴现有的传染病传播(如SARS、HIV、H1N1等)和有线网络病毒传播(如Code-Red、Slammer等)分析方法来确定涉及手机病毒传播的相关参数的数量以及每个参数的取值范围、初始值的大小等。对病毒传播所依赖的拓扑结构的主要形式进行分析,并设计基于有向图的Erdǒs-Rényi(ER)网络拓扑结构生成算法,其主要思想是根据ER网络拓扑结构的特点,采用随机图论对基于有向图的ER网络拓扑结构下的病毒传播进行模拟分析。 Refer to the existing analysis methods of infectious disease transmission (such as SARS, HIV, H1N1, etc.) and cable network virus transmission (such as Code-Red, Slammer, etc.) to determine the number of relevant parameters related to mobile phone virus transmission and the value of each parameter range, the size of the initial value, etc. Analyze the main form of the topological structure on which the virus spreads, and design an Erdǒs-Rényi (ER) network topology generation algorithm based on directed graphs. The main idea is to use random graph theory to Simulation analysis of virus propagation under directed graph ER network topology.
由于复杂网络领域的静态拓扑结构生成算法只考虑网络本身的特性,当应用到手机病毒传播网络生成时还需要考虑与病毒传播过程相关的条件和属性等。比如是否在两个结点之间创建边,除了满足它们各自的度值要求之外,还需要考虑个体交互是否满足给定的局部判定条件(抵抗因子和交互次数等),同时还需赋予边与交互关系相关的属性值(如交互次数、持续时间等)。采用Visual C++ 6.0和MATLAB 7.0的混合编程技术开发了一个模拟器来来验证基于有向图的ER网络拓扑结构生成算法的正确性和有效性。 Since the static topology generation algorithm in the complex network field only considers the characteristics of the network itself, when it is applied to the mobile phone virus propagation network generation, it also needs to consider the conditions and attributes related to the virus propagation process. For example, whether to create an edge between two nodes, in addition to meeting their respective degree value requirements, it is also necessary to consider whether the individual interaction meets the given local judgment conditions (resistance factor and interaction times, etc.), and at the same time, it is necessary to give the edge Attribute values related to the interaction relationship (such as the number of interactions, duration, etc.). A simulator was developed using the mixed programming technology of Visual C++ 6.0 and MATLAB 7.0 to verify the correctness and effectiveness of the directed graph-based ER network topology generation algorithm.
附图说明 Description of drawings
图1为社交网络图示例。 Figure 1 is an example of a social network graph.
图2为状态转换关系图。 Figure 2 is a state transition diagram.
图3为节点状态转换算法流程图。 Figure 3 is a flowchart of the node state transition algorithm.
图4为数据分析算法流程图。 Figure 4 is a flowchart of the data analysis algorithm.
图5为手机病毒传播动力学分析图。 Figure 5 is an analysis diagram of mobile phone virus transmission dynamics.
具体实施方式 Detailed ways
下面结合附图对本发明做进一步的详细说明。 The present invention will be described in further detail below in conjunction with the accompanying drawings.
(1)社交网络的构建(1) Construction of social network
它可用一个无向加权图G=(V,E,W)来表示,其中:V表示顶点集合,即表示移动通信网络中的手机;E为网络中节点间的有向边,表示手机用户之间发送短信的行为,边的弧头指向表示短信行为的接受方;W为有向边的权重,表示发送短信的行为的值,值越大表示发送短信的数量越多。d i 表示顶点i的度,即手机的数量(表示链接的数量或手机拥有d i 个朋友)。C ij 表示从i发送到j的短信和彩信的数量。另外,还引入两个函数f(i)和f(i, j)分别映射每个顶点和每条边。因此,该图可以分别用f(i)和f(i, j)来确定顶点和边的权重。顶点和边的权重的映射函数表示为:f(i)= d i ,f(i, j)= C ij +C ji 。 It can be represented by an undirected weighted graph G = ( V , E , W ), where: V represents the set of vertices, that is, mobile phones in the mobile communication network; E is the directed edge between nodes in the network, representing the relationship between mobile phone users The behavior of sending short messages, the arc head of the edge points to the recipient of the short message behavior; W is the weight of the directed edge, which represents the value of the short message sending behavior, and the larger the value, the more the number of short messages sent. d i represents the degree of vertex i , that is, the number of mobile phones (means the number of links or mobile phones have d i friends). C ij represents the number of short messages and multimedia messages sent from i to j . In addition, two functions f ( i ) and f ( i , j ) are introduced to map each vertex and each edge . Therefore, the graph can use f ( i ) and f ( i , j ) to determine the weights of vertices and edges, respectively. The mapping function of the weights of vertices and edges is expressed as: f ( i ) = d i , f ( i , j ) = C ij +C ji .
顶点和边的权重可同时用来表示手机被病毒感染的概率。从f(i)= d i 可以看出,顶点的权重取决于d i 。对于基于SMS/MMS的病毒,如果某部手机的入度大,就表示它更容易被病毒感染,而出度大表示它更容易把病毒传染给其它手机。因此,那些具有节点度大的手机,无论是它的入度大还是出度大,都应当分配一个更大的顶点权重。任意两台手机相互之间的社会交往情况可用f(i, j)= C ij +C ji 来表示。任意两台手机不管在何时通过发送短信和彩信来进行通信,那么它们都有机会成为朋友。因此,打开并激活一条来自对方的且携带病毒的消息的概率就会很大。表明了社交网络既可以揭示任意两台手机之间是如何彼此产生联系的,也可以刻画病毒是如何利用这种社会关系来进行传播的。 The weights of vertices and edges can be used to represent the probability of a mobile phone being infected by a virus at the same time. From f ( i ) = d i we can see that the weight of a vertex depends on d i . For SMS/MMS-based viruses, if the in-degree of a certain mobile phone is large, it means that it is more likely to be infected by the virus, while the large out-degree means that it is more likely to infect other mobile phones with the virus. Therefore, those phones with large node degrees should be assigned a larger vertex weight no matter whether it has a large in-degree or a large out-degree. The social interaction between any two mobile phones can be represented by f ( i , j ) = C ij +C ji . Any two mobile phones have a chance to become friends no matter when they communicate by sending SMS and MMS. Therefore, the probability of opening and activating a message from the other party carrying a virus is high. It shows that the social network can not only reveal how any two mobile phones are connected with each other, but also describe how the virus uses this social relationship to spread.
本发明采用中国最大的移动通信网络运营商之一——中国电信所提供的短信和彩信记录来研究社交网络的构建。消息记录包括40万用户在2012年10月的3个星期内所发送的约2千万条的短信和彩信。为了保护用户隐私,短信和彩信的内容在提取时就被屏蔽了,提取的信息只保留了发送者和接收者的电话号码及发送时间,而且对电话号码也进行了技术处理,使用其它编号来代替。为了进一步说明社交网络的构建过程,从中抽取10部手机在1周内发送短信/彩信的数量来构建了一个社交网络(见附图1)。 The present invention uses SMS and MMS records provided by China Telecom, one of the largest mobile communication network operators in China, to study the construction of social networks. The message log includes approximately 20 million SMS and MMS messages sent by 400,000 users in a three-week period in October 2012. In order to protect user privacy, the contents of SMS and MMS are blocked when they are extracted, and the extracted information only retains the phone numbers of the sender and receiver and the sending time, and the phone numbers are also technically processed, and other numbers are used to replace. In order to further illustrate the construction process of the social network, a social network was built by extracting the number of text messages/MMS messages sent by 10 mobile phones within a week (see Figure 1).
(2)节点状态分类(2) Node status classification
采用半马尔可夫过程对手机感染病毒后出现异常行为进行建模的基础是将手机划分为不同的状态。根据手机本身所表现出来的行为特性可把个体的状态分为以下4种。 The basis of modeling the abnormal behavior of mobile phones after virus infection by semi-Markov process is to divide mobile phones into different states. According to the behavioral characteristics displayed by the mobile phone itself, the states of individuals can be divided into the following four types.
A)易感状态S(Susceptible),即节点未被感染,并且没有免疫力;病毒从处于易感状态S的节点出发,通过网络连接向四周传播。 A) Susceptible state S (Susceptible), that is, the node is not infected and has no immunity; the virus starts from the node in the susceptible state S and spreads around through the network connection.
B)潜伏状态E(Exposed),病毒入侵后被感染的节点处于潜伏状态E,由于不同节点自身对病毒的重视程度不同,处于潜伏期E的部分节点会进入状态I和R,另一部分则会返回状态S。 B) Latent state E (Exposed). After the virus invades, the infected nodes are in the latent state E. Because different nodes attach different importance to the virus, some nodes in the latent period E will enter the state I and R , and the other part will return state S.
C)染病状态I(Infected),即节点已被感染,此时节点具有传染性。 C) Infected state I (Infected), that is, the node has been infected, and the node is infectious at this time.
D)免疫状态R(Recovered),在病毒传播开来后,部分处于状态S的节点通过采取一些安全措施对该病毒产生预免疫,进入免疫状态R。 D) Immune state R (Recovered). After the virus spreads, some nodes in state S take some safety measures to pre-immunize the virus and enter immune state R.
(3)状态之间的相互转换关系(3) Mutual conversion relationship between states
节点各状态之间的相互转换关系如下。 The mutual conversion relationship between the states of the nodes is as follows.
A)由于安装杀毒软件,一个处于易感状态的节点转换为免疫状态;由于很多原因也可使该节点转换为潜伏状态,例如:没有安装杀毒软件、从网上随意下载应用程序并进行安装。 A) Due to the installation of anti-virus software, a node in a susceptible state is converted to an immune state; due to many reasons, the node can also be converted to a latent state, such as: no anti-virus software is installed, and applications are downloaded and installed from the Internet at will.
B)如果一个处于感染状态的节点能及时地安装杀毒软件,它便能转换为免疫状态或易感状态。 B) If a node in an infected state can install anti-virus software in time, it can be transformed into an immune state or a susceptible state.
C)如果一个处于潜伏状态的节点能及时地采取相应的安全措施,它便能转换为免疫状态或易感状态;但如果正处于病毒爆发时期,也可能转换为感染状态。 C) If a node in a latent state can take corresponding safety measures in time, it can be transformed into an immune state or a susceptible state; but if it is in a virus outbreak period, it may also be transformed into an infected state.
D)当一种新病毒出现时,一个处于免疫状态的节点能再次转换为易感节点。 D) When a new virus appears, a node in an immune state can be converted into a susceptible node again.
由于节点在遭受病毒攻击后,其状态转换有以下特点:一是节点的未来状态仅与其当前状态有关;二是导致节点状态转换的因素很多,使状态转移的时间不是指数分布的,而是一般分布。上述特点符合半马尔可夫过程的基本性质,因此,可以采用半马尔可夫过程对手机短信/彩信病毒传播的节点异常行为进行建模。结合手机病毒传播的特性,可得基于半马尔可夫过程的节点状态转换关系图(见附图2)。 After a node is attacked by a virus, its state transition has the following characteristics: first, the future state of the node is only related to its current state; distributed. The above characteristics are in line with the basic properties of the semi-Markov process. Therefore, the semi-Markov process can be used to model the abnormal behavior of the mobile phone SMS/MMS virus transmission node. Combined with the characteristics of mobile phone virus transmission, a node state transition diagram based on a semi-Markov process can be obtained (see Figure 2).
(4)节点异常行为建模(4) Node abnormal behavior modeling
在半马尔可夫过程中,节点从一个状态转移到另一个状态可以用两个矩阵来表示:P = (p ij )和F(t) = (F ij (t)),其中p ij 表示节点从状态Z i 变为状态Z j 的转移概率;F ij (t)节点表示从当前状态Z i 转移到状态Z j 的时间分布。因此,{Z n }的转移概率矩阵为: In a semi-Markov process, the transition of a node from one state to another can be represented by two matrices: P = ( p ij ) and F ( t ) = ( F ij ( t )), where p ij represents the node The transition probability from state Z i to state Z j ; the F ij ( t ) node represents the time distribution from current state Z i to state Z j . Therefore, the transition probability matrix of { Z n } is:
其中,p ii =0表示{Z n }中状态转换只有从一种状态转换为另一种状态;在上式中存在转移概率为零的情况,如p IE =0, p IE =0,表示处于感染状态的节点不会转变成为易感状态或潜伏状态。另外,由于随机矩阵中一个状态的转移概率之和等于1,因此,p IR =1, p RS =1。 Among them, p ii =0 means that the state transition in { Z n } can only change from one state to another state; in the above formula, there is a case where the transition probability is zero, such as p IE =0, p IE =0, which means A node in an infected state does not transition to a susceptible or latent state. In addition, since the sum of transition probabilities of a state in the random matrix is equal to 1, p IR =1, p RS =1.
假定一个半马尔可夫过程{X(t), t≥0},其状态空间为W={S, E, I, R}及DTMC的一步转移概率矩阵P所示,当t→∞时,转移分布P ij (t)服从非格点的分布及具有极限概率P j ,则 Assuming a semi-Markov process { X ( t ), t ≥ 0}, its state space is W = { S , E , I , R } and the one-step transition probability matrix P of DTMC, when t → ∞, The transition distribution P ij ( t ) obeys the non-lattice distribution and has a limit probability P j , then
其中,M(j)、M(k)分别表示在状态Z j 、Z k 逗留的平均时间,且,(设T i 是在状态Z i 的逗留时间,T j 是在状态Z j 的逗留时间);是{Z n }的平稳分布,且,,。 Among them, M ( j ) and M ( k ) represent the average time of staying in states Z j and Z k respectively, and , (Let T i be the time spent in state Z i and T j be the time spent in state Z j ); is a stationary distribution of { Z n }, and , , .
要计算P j ,就需要求出p ij 和M(i)。但是,通过该式来计算P j 也并不是一件容易的事情,因为难以确定逗留时间M(i)。 To calculate P j , it is necessary to find p ij and M ( i ). However, it is not an easy task to calculate P j through this formula, because it is difficult to determine the residence time M ( i ).
首先,假定在时间周期[0, t]内,由状态i转换为其它状态k的总数为N ik (),那么p ij 可近似为:。 First, assume that within the time period [0, t ], the total number of transitions from state i to other states k is N ik ( ), then p ij can be approximated as: .
另外,建立一个网络场景并给出相应的理论分析。为了分析的方便,做了如下假设。 In addition, establish a network scenario and give corresponding theoretical analysis. For the convenience of analysis, the following assumptions are made.
A)每个节点具有相同的健康指数极限值H,如果当节点的健康指数极限值低于阈值时,就有可能感染病毒。 A) Each node has the same health index limit value H , if when the node's health index limit value is lower than the threshold There is a possibility of virus infection.
B)当每个节点健康指数低于阈值时,它将由易感状态转换为潜伏状态;当每个节点健康指数低于阈值时,它将由潜伏状态转换为感染状态;当每个节点健康指数大于阈值()时,它将由感染状态转换为免疫状态。 B) When the health index of each node is lower than the threshold When , it will be converted from a susceptible state to a latent state; when the health index of each node is lower than the threshold When , it will be converted from a latent state to an infected state; when the health index of each node is greater than the threshold ( ), it will transition from an infected state to an immune state.
C)任意两个节点在单位时间内通过SMS/MMS进行社会交往时,都将遭遇一个危险指数();每个节点在单位时间内都有一个修复指数()。 C) When any two nodes conduct social communication through SMS/MMS per unit time, they will encounter a risk index ( ); each node has a repair index per unit time ( ).
D)每个节点驻留在网络的时间是随机的,与手机用户的行为有关,可以用来表示。 D) The time each node resides in the network is random and related to the behavior of mobile phone users, which can be used To represent.
E)每个节点由免疫状态再次转换为易感状态的期望时间为。 E) The expected time for each node to switch from the immune state to the susceptible state is .
由于与节点的交互次数有关,因此,可表示为: because It is related to the number of interactions of nodes, so it can be expressed as:
其中TM表示节点i的所有朋友节点给其发送消息的总数,用来表示。 Among them, TM represents the total number of messages sent to it by all friend nodes of node i , using To represent.
至今为止,由于没有有效的方法用来分析极限概率,因此,结合上面给定的网络场景,提出了一种启发式方法来评估状态转移期望时间M(i, j) ()。可得状态转移期望时间矩阵Q为: So far, since there is no effective method for analyzing the limit probability, a heuristic method is proposed to evaluate the expected state transition time M ( i , j ) ( ). The available state transition expected time matrix Q is:
如果一个节点的健康指数低于时,该节点由易感状态转换为潜伏状态,M(S,E)可近似为: If a node's health index is lower than When , the node changes from susceptible state to latent state, M ( S , E ) can be approximated as:
同样地,M(S,I), M(E,S), M(E,I), and M(I,R)可近似为: Likewise, M ( S , I ), M ( E , S ), M ( E , I ), and M ( I , R ) can be approximated as:
一般的,如果任一节点由其它状态转换为免疫状态所需的平均时间为,那么,M(S,R)和M(E,R)可近似为:,。 Generally, if any node transitions from other states to the immune state, the average time required is , then M ( S , R ) and M ( E , R ) can be approximated as: , .
另外,如果任一节点由免疫状态转换为易感状态所需的平均时间为,那么,M(R,S)可近似为:。 In addition, if the average time required for any node to transition from an immune state to a susceptible state is , then M ( R , S ) can be approximated as: .
因此,{Z n }的状态转移期望时间矩阵Q可近似为: Therefore, the state transition expectation time matrix Q of { Z n } can be approximated as:
这样通过求解矩阵Q,便可以获得逗留时间M(i)。 In this way, by solving the matrix Q, the stay time M ( i ) can be obtained.
(5)个体差异性建模(5) Individual difference modeling
由于病毒的传播与个体的抵抗力和病毒传染性的强弱都有关,而现有的病毒传播模型大都没有考虑个体的差异性对病毒传播的影响。因此,本发明引入了3个参数来刻画个体的差异性对病毒传播的影响。为了便于分析,做了如下假设:C ji 表示节点j在一周内给节点i发送短信/彩信的数量,C max 表示在一周内任意一对节点发送短信/彩信的数量最大值;N i 表示节点i的朋友节点数;、是一个常数,根据具体的实际环境进行设置;和分别是传染系数和抵抗系数的调节因子(、≥ 0)。3个参数的具体描述如下。 Since the spread of the virus is related to the resistance of the individual and the strength of the virus infectivity, most of the existing virus spread models do not consider the impact of individual differences on the spread of the virus. Therefore, the present invention introduces three parameters to characterize the impact of individual differences on virus transmission. For the convenience of analysis, the following assumptions are made: C ji represents the number of SMS/MMS messages sent by node j to node i within a week, C max represents the maximum number of SMS/MMS messages sent by any pair of nodes within a week; N i represents the number of node i i 's friend node number; , is a constant, set according to the specific actual environment; and are the adjustment factors of the infection coefficient and the resistance coefficient ( , ≥ 0). The specific description of the three parameters is as follows.
A)传染系数:用IC ji (Infection Coefficient, IC)表示,即节点j对i传染性的强弱();当IC ji =0,表示该节点没有传染性;当IC ji =1,表示该节点具有极强的传染性。 A) Infection coefficient: Expressed by IC ji (Infection Coefficient, IC), that is, the strength of node j 's infectivity to i ( ); when IC ji =0, it means that the node is not infectious; when IC ji =1, it means that the node is extremely infectious.
B)抵抗系数:用RC ij (Resisted Coefficient, RC)表示,即节点i对j的抵抗能力的大小();当RC ij =1,表示该节点具有极强的抵抗能力。 B) Resistance coefficient: represented by RC ij (Resisted Coefficient, RC), that is, the resistance of node i to j ( ); when RC ij =1, it means that the node has extremely strong resistance.
C)感染阈值:用IT i (Infection Threshold, IT)表示,即节点i的朋友节点对其影响力的总和。用来判断处于状态S的节点的状态是否会发生变化。 C) Infection Threshold: represented by IT i (Infection Threshold, IT), which is the sum of the influence of node i 's friend nodes on it. It is used to judge whether the state of the node in state S will change.
为了保证最终求出的IT i 值在区间[0,1]中,做了如下的归一化处理。 In order to ensure that the final calculated IT i value is in the interval [0,1], the following normalization processing is done.
其中N表示网络中节点总数,min{IT k }、max{IT k }分别表示所有节点中感染指数的最小值、最大值。 Among them, N represents the total number of nodes in the network, and min{ IT k } and max{ IT k } represent the minimum and maximum values of the infection index in all nodes, respectively.
(6)病毒传播模型(6) Virus transmission model
根据短信/彩信病毒传播的特点,在构建社会关系图的基础上,设计相应的状态转换算法,并利用该算法来刻画短信/彩信病毒的传播过程。状态转换算法具体为。 According to the characteristics of SMS/MMS virus propagation, on the basis of constructing the social relationship graph, the corresponding state transition algorithm is designed, and the algorithm is used to describe the propagation process of SMS/MMS virus. The state transition algorithm is specifically.
第1步:初始化网络。根据短信/彩信数据集来统计网络的相关信息,如节点的数量、短信发送情况等。 Step 1: Initialize the network. According to the SMS/MMS data set, the relevant information of the network is counted, such as the number of nodes, the sending status of SMS, etc.
第2步:初始化每个节点的状态。随机地选节点j并将其状态设置为I,其它节点状态都设置为S。 Step 2: Initialize the state of each node. Randomly select node j and set its state to I , and set the state of other nodes to S.
第3步:统计朋友节点信息。每个节点根据与其它节点发送短信/彩信的情况,来统计各自的朋友节点信息。 Step 3: Statistics of friend node information. Each node counts its own friend node information according to the situation of sending SMS/MMS with other nodes.
第4步:设在某时刻t时访问节点j,假设T表示节点从S状态转变为E状态的阈值,则:如果j的状态为I,则遍历j的朋友节点,如果其朋友节点i的状态为S, 而且,此时j发送短信或彩信给i,那么:A)当时,则i以概率p SE 转变成状态E;B)当时,则i保持状态S不变;C)当IC ji =0或RC ij =1时,则i以概率p SR 转变成状态R;同时,j以概率p IR 转变成状态R;如果j的状态为E,则该节点以概率p ER 转变成状态R,或该节点以概率p EI 转变成状态I;重复执行第4步,直到遍历完所有节点为止。 Step 4: Assuming that node j is visited at a certain time t , assuming that T represents the threshold for the node to change from S state to E state, then: if the state of j is I , then traverse j ’s friend nodes, if its friend node i ’s The state is S , and at this time j sends a short message or multimedia message to i , then: A) when , then i transitions to state E with probability p SE ; B) when , then i remains in state S unchanged; C) when IC ji =0 or RC ij =1, then i transitions to state R with probability p SR ; at the same time, j transitions to state R with probability p IR ; if j 's The state is E , then the node changes to state R with probability p ER , or the node changes to state I with probability p EI ; repeat step 4 until all nodes are traversed.
第5步:t=t+1,算法结束。 Step 5: t = t +1, the algorithm ends.
因此,可得基于SMS/MMS的手机病毒传播动力学分析的节点状态转换算法流程图(见附图3)。 Therefore, the flow chart of the node state transition algorithm for SMS/MMS-based mobile phone virus propagation dynamics analysis can be obtained (see Figure 3).
(7)病毒传播分析(7) Virus transmission analysis
借鉴现有的传染病传播(如SARS、HIV、H1N1等)和有线网络病毒传播(如Code-Red、Slammer等)分析方法来确定涉及手机病毒传播的相关参数的数量以及每个参数的取值范围、初始值的大小等。对病毒传播所依赖的拓扑结构的主要形式进行分析,并设计基于有向图的Erdǒs-Rényi(ER)网络拓扑结构生成算法,其主要思想是根据ER网络拓扑结构的特点,采用随机图论对基于有向图的ER网络拓扑结构下的病毒传播进行模拟分析。 Refer to the existing analysis methods of infectious disease transmission (such as SARS, HIV, H1N1, etc.) and cable network virus transmission (such as Code-Red, Slammer, etc.) to determine the number of relevant parameters related to mobile phone virus transmission and the value of each parameter range, the size of the initial value, etc. Analyze the main form of the topological structure on which the virus spreads, and design an Erdǒs-Rényi (ER) network topology generation algorithm based on directed graphs. The main idea is to use random graph theory to Simulation analysis of virus propagation under directed graph ER network topology.
由于复杂网络领域的静态拓扑结构生成算法只考虑网络本身的特性,当应用到手机病毒传播网络生成时还需要考虑与病毒传播过程相关的条件和属性等。比如是否在两个结点之间创建边,除了满足它们各自的度值要求之外,还需要考虑个体交互是否满足给定的局部判定条件(抵抗因子和交互次数等),同时还需赋予边与交互关系相关的属性值(如交互次数、持续时间等)。 Since the static topology generation algorithm in the complex network field only considers the characteristics of the network itself, when it is applied to the mobile phone virus propagation network generation, it also needs to consider the conditions and attributes related to the virus propagation process. For example, whether to create an edge between two nodes, in addition to meeting their respective degree value requirements, it is also necessary to consider whether the individual interaction meets the given local judgment conditions (resistance factor and interaction times, etc.), and at the same time, it is necessary to give the edge Attribute values related to the interaction relationship (such as the number of interactions, duration, etc.).
采用Visual C++ 6.0和MATLAB 7.0的混合编程技术开发了一个模拟器来来验证基于有向图的ER网络拓扑结构生成算法的正确性和有效性。结合手机病毒传播动力学的特性,可得数据分析算法流程图(见附图4)和手机病毒传播动力学分析图(见附图5)。 A simulator was developed using the mixed programming technology of Visual C++ 6.0 and MATLAB 7.0 to verify the correctness and effectiveness of the directed graph-based ER network topology generation algorithm. Combined with the characteristics of mobile phone virus transmission dynamics, the flow chart of data analysis algorithm (see Figure 4) and the analysis diagram of mobile phone virus transmission dynamics (see Figure 5) can be obtained.
Claims (4)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410390017.2A CN104166708A (en) | 2014-08-11 | 2014-08-11 | Mobile phone virus spreading modeling method based on social network and semi-Markov process |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410390017.2A CN104166708A (en) | 2014-08-11 | 2014-08-11 | Mobile phone virus spreading modeling method based on social network and semi-Markov process |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104166708A true CN104166708A (en) | 2014-11-26 |
Family
ID=51910521
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410390017.2A Pending CN104166708A (en) | 2014-08-11 | 2014-08-11 | Mobile phone virus spreading modeling method based on social network and semi-Markov process |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104166708A (en) |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106027513A (en) * | 2016-05-15 | 2016-10-12 | 广东技术师范学院 | Method for analyzing propagation characteristics of computer virus in SDN mobile environment |
| CN106599691A (en) * | 2016-12-23 | 2017-04-26 | 贾志娟 | Computer virus spreading source tracing method based on complex network |
| CN108092832A (en) * | 2018-02-12 | 2018-05-29 | 山东师范大学 | A kind of social networks Virus Info suppressing method and system |
| CN109299429A (en) * | 2018-07-11 | 2019-02-01 | 重庆邮电大学 | A dynamic social relationship modeling method based on Wiener process |
| CN109903853A (en) * | 2019-01-08 | 2019-06-18 | 南京邮电大学 | A method for constructing a two-layer network communication model based on individual sensitivity and mass media influence |
| CN110321424A (en) * | 2019-06-14 | 2019-10-11 | 电子科技大学 | A kind of AIDS personnel's behavior analysis method based on deep learning |
| GB2574093A (en) * | 2018-03-25 | 2019-11-27 | British Telecomm | Malware barrier |
| US11470109B2 (en) | 2018-03-25 | 2022-10-11 | British Telecommunications Public Limited Company | Malware barrier |
| US11533333B2 (en) | 2018-03-25 | 2022-12-20 | British Telecommunications Public Limited Company | Malware infection prediction |
| US12273376B2 (en) | 2020-12-31 | 2025-04-08 | British Telecommunications Public Limited Company | Identifying computer systems for malware infection mitigation |
| US12511386B2 (en) | 2020-02-17 | 2025-12-30 | British Telecommunications Public Limited Company | Malware propagation forecasting |
| US12526309B2 (en) | 2020-02-17 | 2026-01-13 | British Telecommunications Public Limited Company | Real-time malware propagation forecasting |
-
2014
- 2014-08-11 CN CN201410390017.2A patent/CN104166708A/en active Pending
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106027513B (en) * | 2016-05-15 | 2019-01-08 | 广东技术师范学院 | Propagation characteristic analysis method of the computer virus under SDN mobile environment |
| CN106027513A (en) * | 2016-05-15 | 2016-10-12 | 广东技术师范学院 | Method for analyzing propagation characteristics of computer virus in SDN mobile environment |
| CN106599691B (en) * | 2016-12-23 | 2019-06-18 | 贾志娟 | A kind of Computer Virus Spread based on complex network seeks source method |
| CN106599691A (en) * | 2016-12-23 | 2017-04-26 | 贾志娟 | Computer virus spreading source tracing method based on complex network |
| CN108092832A (en) * | 2018-02-12 | 2018-05-29 | 山东师范大学 | A kind of social networks Virus Info suppressing method and system |
| US11470109B2 (en) | 2018-03-25 | 2022-10-11 | British Telecommunications Public Limited Company | Malware barrier |
| GB2574093A (en) * | 2018-03-25 | 2019-11-27 | British Telecomm | Malware barrier |
| GB2574093B (en) * | 2018-03-25 | 2020-10-07 | British Telecomm | Malware barrier |
| US11533333B2 (en) | 2018-03-25 | 2022-12-20 | British Telecommunications Public Limited Company | Malware infection prediction |
| CN109299429A (en) * | 2018-07-11 | 2019-02-01 | 重庆邮电大学 | A dynamic social relationship modeling method based on Wiener process |
| CN109903853A (en) * | 2019-01-08 | 2019-06-18 | 南京邮电大学 | A method for constructing a two-layer network communication model based on individual sensitivity and mass media influence |
| CN109903853B (en) * | 2019-01-08 | 2022-08-23 | 南京邮电大学 | Double-layer network propagation model construction method based on individual sensitivity and mass media influence |
| CN110321424A (en) * | 2019-06-14 | 2019-10-11 | 电子科技大学 | A kind of AIDS personnel's behavior analysis method based on deep learning |
| CN110321424B (en) * | 2019-06-14 | 2021-07-27 | 电子科技大学 | A Deep Learning-Based Behavior Analysis Method for AIDS Personnel |
| US12511386B2 (en) | 2020-02-17 | 2025-12-30 | British Telecommunications Public Limited Company | Malware propagation forecasting |
| US12526309B2 (en) | 2020-02-17 | 2026-01-13 | British Telecommunications Public Limited Company | Real-time malware propagation forecasting |
| US12273376B2 (en) | 2020-12-31 | 2025-04-08 | British Telecommunications Public Limited Company | Identifying computer systems for malware infection mitigation |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104166708A (en) | Mobile phone virus spreading modeling method based on social network and semi-Markov process | |
| Peng et al. | Propagation model of smartphone worms based on semi-Markov process and social relationship graph | |
| Hota et al. | Game-theoretic vaccination against networked SIS epidemics and impacts of human decision-making | |
| Peng et al. | Smartphone malware and its propagation modeling: A survey | |
| Zhao et al. | Multiple routes transmitted epidemics on multiplex networks | |
| Dudorov et al. | Probability analysis of cyber attack paths against business and commercial enterprise systems | |
| CN103532957B (en) | A kind of long-range shell behavioral values device and method of wooden horse | |
| CN104796416A (en) | Botnet simulation method and botnet simulation system | |
| CN103957203B (en) | A network security defense system | |
| CN103294833B (en) | The junk user of concern relation based on user finds method | |
| CN103093049B (en) | A kind of malicious code propagation prediction method towards social networks and system | |
| CN103476033A (en) | Wireless sensor network security protocol verification method based on model checking | |
| Jia et al. | Modeling and analyzing malware propagation in social networks with heterogeneous infection rates | |
| CN107908645A (en) | A kind of immunization method of the online social platform gossip propagation based on Analysis of The Seepage | |
| CN114205816B (en) | Electric power mobile internet of things information security architecture and application method thereof | |
| Jafar et al. | Optimal control of malware propagation in IoT networks | |
| Wang et al. | The spatial–temporal perspective: The study of the propagation of modern social worms | |
| CN111224942B (en) | Malicious software propagation control method and device based on ternary association diagram detection | |
| Yang et al. | An immunization strategy for social network worms based on network vertex influence | |
| CN103501302A (en) | Method and system for automatically extracting worm features | |
| Lu et al. | Network security situation awareness based on network simulation | |
| Zhang et al. | The dynamical modeling analysis of the spreading of passive worms in P2P networks | |
| Xiao et al. | SAIDR: A new dynamic model for SMS-based worm propagation in mobile networks | |
| Vasilyev et al. | Providing information security on the base of artificial immune system for industrial internet of things | |
| Chen | Epidemic thresholds in networks: Impact of heterogeneous infection rates and recovery rates |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20141126 |