CN105915399A - Network risk source tracing method based on back propagation - Google Patents

Network risk source tracing method based on back propagation Download PDF

Info

Publication number
CN105915399A
CN105915399A CN201610482278.6A CN201610482278A CN105915399A CN 105915399 A CN105915399 A CN 105915399A CN 201610482278 A CN201610482278 A CN 201610482278A CN 105915399 A CN105915399 A CN 105915399A
Authority
CN
China
Prior art keywords
infected
node
network
risk
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610482278.6A
Other languages
Chinese (zh)
Other versions
CN105915399B (en
Inventor
王田
文晟
吴群
吴尤可
梁俊斌
赖永炫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaqiao University
Original Assignee
Huaqiao University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaqiao University filed Critical Huaqiao University
Priority to CN201610482278.6A priority Critical patent/CN105915399B/en
Publication of CN105915399A publication Critical patent/CN105915399A/en
Application granted granted Critical
Publication of CN105915399B publication Critical patent/CN105915399B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a network risk source tracing method based on back propagation. The method comprises following steps of setting users willing to be monitored as monitoring nodes; monitoring the monitoring nodes; marking all infected monitoring nodes; broadcasting marked risks to an extracted network topology in a flooding mode, from the positions of the infected monitoring nodes according to the infected time differences of the monitoring nodes; carrying out statistics to the nodes in the network topology and adding the nodes to a potential risk source set, wherein the nodes can receive all marked risks at the same time; establishing a network risk microcosmic propagation model based on the potential risk source set and the state conversion dynamic properties of the network nodes in the risk propagation process; and positioning risk sources from the potential risk source set by using a maximum likelihood method based on the microcosmic propagation model. According to the method, on the premise of protecting the privacy of most of the users, the more precise network risk tracing result can be obtained through the relatively low calculation quantity.

Description

A kind of network risks source based on back propagation retroactive method
Technical field
This invention belongs to the information security field of online network.Specifically, it is a kind of by the extensive online network of monitoring Fraction of subscribers, in a network after occurrence risk (rumour, worm-type virus, electric network fault) communication events, Security Officer can To infer source user (rumor monger, the anthelmintic of Risk of Communication quickly, accurately according to limited monitoring information and network topology Propagating source) method.
Background technology
The widely available of the Internet makes us be easier to suffer disparate networks risk, such as in online social networks, rumour is propagated wantonly, On the Internet, virus infects a large amount of main frames, and the Network Isolation fault of intelligent grid causes major power outage etc..Every year, because of these nets Network risk and the loss of the finance that causes and the wealth of society is countless.
Rumour, computer virus and smart power grid fault are all the network risks carrying out propagating in heterogeneous networks, in order to tackle this A little network risks, trace back to they propagation sources by technological means in a network and are extremely necessary.First, from judicial evidence collection Angle, is accurately positioned " cybercriminal " (rumor monger, virus-spreader) extremely important, it is provided that technology evidence hits net Network criminal.Additionally, trace back to network risks propagation source as quickly as possible to contribute to determining in time the occurrence cause of network risks, It is intervened as early as possible and can reduce the loss that these network risks cause to the full extent.Most efficient method is to enter the whole network user Row monitoring, knows the infected absolute time of each user thus judges that the most infected user is Risk of Communication source.But It is so to process to there are two significant drawback: the most real-life network often scale is excessive, and all webs' watch cost is the highest; On the other hand for the demand to secret protection, people are unwilling monitored in most cases and accept data acquisition.Such as, Often through pop-up window, Consumer's Experience plan and the various antivirus software of microsoft operation system solicit whether user agrees to submit to Local safe operation daily record, and claim that these data can preferably protect user.But, most users are generally selected Refusal.This just requires that we can only monitor minority in network and be ready the user being monitored, after Risk of Communication event occurs, logical The status information crossing these monitored nodes utilizes efficient algorithm to speculate the propagation face of the overall situation, thus obtains network risks Propagate source.
From the point of view of technological layer, this kind of research can be referred to as source and review problem, and its purpose is namely based on limited network structure and knows Know the safe condition with part of nodes and come the propagation source of localization message or network risks.At academia, traditional source is reviewed Technology has IP to follow the trail of and stepping-stone detects, but they are the most effective.This is because they can only determine from certain The true source of the packet of individual intended recipient, and in actual communication process, the source of packet is generally only network risks The participant that propagates, turn originator rather than true source.For more accurately and efficiently location Risk of Communication source, need badly will application and The aspect design of logical structure applies more advanced algorithm and technology to process source and review problem, and is not only to utilize IP layer The log information forwarded with packet carries out reviewing source.
In recent years, the source problem of reviewing had been done relevant work by a lot of researchers.Initial research is just for tradition SI model propagate tree network, occur in that further in tree network with other propagation models such as SIS, the source of SIR Review algorithm.Along with technology develops further, source is reviewed algorithm and is no longer limited to tree network, starts general networking structure The risk problem of tracing to the source is studied.Generally, source is reviewed or seeks optimum solution by the calculating of complexity tight, high Scheme, or realize Best Times performance by the heuritic approach simplified.But, generally there is great deficiency in these algorithms. The most computationally intensive (needing all users in test network), secondly location is not very accurate.The state of Chinese Academy of Sciences's classification Survey article " the Identifying that border 1 district periodical IEEE Communications Surveys and Tutorials delivered upper 2014 year Propagation Sources in Networks:State-of-the-Art and Comparative Studies " point out academic circles at present ratio More advanced source is reviewed algorithm more than 80% and will be navigated to the errors present of 2~4 network topology distances (according to hops Calculate), therefore can not meet and be actually needed.Academia and industrial quarters are needed badly and are wanted more efficient risk source searching method to solve This problem.
Summary of the invention
It is an object of the invention to overcome the deficiencies in the prior art, propose a kind of network risks source based on back propagation side of reviewing Method.The method can obtain the most accurate by smaller amount of calculation on the premise of the most privacy of user of protection Network risks is traced to the source result, can be applicable to carrying out the network crime in judicial evidence collection and risk repair process in large-scale online network.
The present invention finds Risk of Communication source by suspect's search strategy of criminal investigation, and conventional algorithm is dfficult to apply on a large scale Network, applies the algorithm of forefathers, complexity, accuracy and time loss thereof will be difficult to bear in live network.Therefore, originally Invent and this process finding Risk of Communication source is divided into two subprocess: first pass through back propagation and reduce hunting zone, its Real risk source is found in secondary scope after reducing.
Specifically, back propagation, by monitor node labelling, then sends labelling from monitor node broadcast (flooding is propagated) Risk.The logic of the method is: if there is node in network topology can receive the labelling that the transmission of all of monitor node comes simultaneously Risk, then these nodes are likely to be Risk of Communication source.This algorithm pays the utmost attention to accuracy, then considers operational efficiency. Due to the screening through previous step, the set of potential risks source only exists the fraction network user.Use maximum likelihood afterwards The estimation technique combines the microcosmic propagation model test potential risks source set of risk, positions Risk of Communication source further.This The principle of step is: tests each potential risks source as propagating source, can obtain after propagating certain time with microcosmic propagation model The probability of current network state.Each potential risks source is substituted into propagation formula respectively and calculates the general of current network state The likelihood function of rate, then can obtain the potential risks source of maximum likelihood value and be most likely to be and infect source really.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of network risks source based on back propagation retroactive method, including:
Network being ready, the user setup being monitored is monitor node and is monitored;
Network risks communication events occurred after certain time, all infected monitor nodes of labelling, according to monitor node infected time Between differ from infected monitor node to the risk of Flooding broadcast labelling, energy in statistics network topology in the network topology extracted It is simultaneously received the node of all labelling risks and described node is added in the set of potential risks source;
Based on the set of potential risks source and network node dynamic of condition conversion during Risk of Communication, set up network risks Microcosmic propagation model;Described state includes health, Infection Status and infected and have infectivity;
Based on described microcosmic propagation model, Maximum Likelihood Estimation Method is used to position risk source from described potential risks source is gathered.
Preferably, described will be ready in network that the user setup being monitored is monitor node and is monitored, monitoring information includes:
If whether monitor node receives risk of infection and receives its infected absolute time of risk of infection.
Preferably, described monitor node infected time difference equation below represents:
di=max (T)-τi
Wherein, i represents that the infected monitor node of i-th, i ∈ [1, n], n represent the sum of infected monitor node; T={ τ12…τnRepresent the infected absolute time of monitor node.
Preferably, according to the infected time difference of monitor node at infected monitor node to flood in the network topology extracted The risk of broadcast flag, can be simultaneously received the node of all labelling risks and add to latent by described node in statistics network topology Risk source set in, including:
The infected time difference of infected monitor node arrives, and infected monitor node sends by node to its all adjacent nodes The risk copy of labelling;
After any node in network topology receives the risk copy of infected monitor node labelling for the first time, broadcast this risk secondary This is to its all of adjacent node;
If any node in network topology has been simultaneously received the risk copy of all infected monitor node labellings, then this Node joins in the set of potential risks source.
It is preferably, described based on the set of potential risks source and network node dynamic of condition conversion during Risk of Communication, The microcosmic propagation model setting up network risks includes:
Set up following iterative formula to represent the propagation of risk:
PS(i,t;U)=[1-v (i, t)] PS(i,t-1;u)
PI(i,t;U)=v (i, t) PS(i,t-1;u)+PI(i,t-1;u)
v ( i , t ) = 1 - Π j ∈ N i [ 1 - η i j · P C ( j , t - 1 ; u ) ]
PC(i,t;U)=v (i, t) PS(i,t-1;u)
Wherein, PS(i,t;u)、PI(i,t;u)、Pc(i,t;U) represent that network risks, from the beginning of potential propagating source u ∈ U, passes respectively Broadcasting S, I and C-shaped probability of state after the t time, U represents that potential risks source is gathered, and S represents health, and I represents Infection Status, C represents infected and has infectivity;(i t) represents the infected probability of t node, η to vij∈ [0,1] is any in network The history probability of spreading of two nodes, ηijShow when=0 and between node i, j, there is not connection, ηij=1 represents that node i will receive Any information all pass to node j;NiRepresent the set of the adjacent node of node i.
Preferably, described based on described microcosmic propagation model, use Maximum Likelihood Estimation Method from described potential risks source is gathered Risk source, location, including:
Use equation below calculate potential propagating source u likelihood function L (u, t):
L ( u , t ) = Σ i ∈ S I P C ( i , t i ; u ) + Σ j ∈ S H P S ( j , t ; u )
Wherein, SIRepresent infected monitor node set, SHRepresent the most infected monitor node set, tiIt it is infected joint The infected absolute time of point;
Equation below is used to obtain the possibility predication of communication events
L ( u , t ~ u ) = m a x S I , S H ∈ S L ( u , t )
Wherein SI,SHS in ∈ S represents all monitor node set;
Likelihood function is taken u during maximum by use equation belowfAnd tfRespectively as estimating of Risk of Communication source and Risk of Communication time Evaluation:
( u f , t f ) = arg [ max u ∈ U L ( u , t ~ u ) ] .
There is advantages that
1, precision is high: by some reality catenet US.Power Grid, on Facebook, AS-level Internet Carry out 100 times tracing to the source experiment respectively.Wherein, US.Power Grid network can reach the accurate rate of about 80%, additionally The position error of 20% is 1 to 3hops.And the inventive method can be determined on 100% ground on Facebook and AS-Internet Position to risk source, is significantly better than current network risks and traces to the source algorithm.
2, it is adapted to the various different network architecture, as there is the Facebook of small world and there is Power Law AS-level Internet network etc..
3, amount of calculation is little: back-propagation algorithm greatly reduces hunting zone, source, significantly subtracts compared to traditional algorithm amount of calculation Little.
Below in conjunction with drawings and Examples, the present invention is described in further detail, but a kind of based on back propagation the net of the present invention Network risk source retroactive method is not limited to embodiment.
Accompanying drawing explanation
Fig. 1 is the main flow chart of the inventive method;
Fig. 2 is the schematic diagram that the back propagation of the present invention reduces searching method;
Fig. 3 is the individual condition conversion figure during Risk of Communication of network of the present invention;
Fig. 4 is the inventive method experimental result picture of tracing to the source on three kinds of real networks.
Detailed description of the invention
See Fig. 1, a kind of network risks source based on back propagation retroactive method, comprise the steps:
Step 101, will be ready in network that the user setup being monitored is monitor node and is monitored;
Step 102, after network risks communication events occurs certain time, all infected monitor nodes of labelling, according to monitoring joint The infected time difference of point to the risk of Flooding broadcast labelling in the network topology extracted, adds up net at infected monitor node Network topology can be simultaneously received the node of all labelling risks and described node is added in the set of potential risks source;
Step 103, based on the set of potential risks source and network node dynamic of condition conversion during Risk of Communication, builds The microcosmic propagation model of vertical network risks;Described state includes health, Infection Status and infected and have infectivity;
Step 104, based on described microcosmic propagation model, uses Maximum Likelihood Estimation Method fixed from described potential risks source is gathered Risk source, position.
Will be described in detail network risks source based on back propagation retroactive method as follows.
A certain proportion of user being ready to be monitored in monitoring network, safety manager can extract its various status informations at any time, Described status information includes but not limited to whether receive risk of infection, and the infected absolute time of its correspondence.
Further, after network risks communication events there occurs certain time, safety manager by all monitor node labellings, Then according to the infected time difference of monitor node at infected monitor node to Flooding broadcast in the network topology extracted The risk of labelling.The user that can be simultaneously received all labelling risks in network topology is potential risk resource, adds it to In the set of potential risks source.
The collection potential risk resource false code of above-mentioned steps is as follows:
In above-mentioned false code, di=max (T)-τi, (i ∈ [1, n]), n represents the sum of infected monitoring user, and i is district Between variable in [1, n], be used for representing i-th user.And T={ τ12…τn(n=| SI|) represent that infected user is felt The absolute time of dye.tmaxRepresent the wheel number of back propagation, and tmax> max (di)。
In the present embodiment, being illustrated in figure 2 back propagation and reduce the schematic diagram of searching method, wherein figure (a) represents basic Network topology structure, figure (b) represent Risk of Communication event, figure (c) represent back propagation event.By in figure (c) Reverse diffusion method at infected monitor node according to infect time difference send labelling risk.Such as Fig. 2, according to being felt The absolute time difference of infection of dye node is classified, be divided into A, B, C, D tetra-class (practical situation has larger class, In figure only as a example by four classes).Assume T={ τ12…τn(n=| SI|) represent the infected absolute time of infected user, Then infection time difference di=max (T)-τi, (i ∈ [1, n]).By diThe node of=0,1,2,3 is respectively labeled as D, C, B, A Category node.During back propagation, A category node is first broadcasted, B category node broadcast after the unit interval, the like.Network connects simultaneously The node receiving all labelling risks is then potential risk source node.After back propagation, obtain less potential risk resource set, And risk source is first to be scheduled in this set.
Further, the microcosmic propagation model of network risks is set up.In the microcosmic propagation model of risk, it is of interest that network is individual The dynamic that user converts at Risk of Communication status of processes.Following four iterative formula given below represents the propagation of risk:
PS(i,t;U)=[1-v (i, t)] PS(i,t-1;u) (1)
PI(i,t;U)=v (i, t) PS(i,t-1;u)+PI(i,t-1;u) (2)
v ( i , t ) = 1 - Π j ∈ N i [ 1 - η i j · P C ( j , t - 1 ; u ) ] - - - ( 3 )
Pc(i,t;U)=v (i, t) PS(i,t-1;u) (4)
Wherein, S represents health, and I represents Infection Status (not having infectivity), and C represents that node is infected and has infectivity. (as Fig. 3 represents the individual condition conversion figure during Risk of Communication of network, it is similar to reality, does not consider the weight of risk Multiple infection.User only can propagate risk in infected next round, loses infectivity subsequently, becomes I state, and I state will not Retransmit risk.).P in formula (1), (2), (4)S(i,t;u)、PI(i,t;u)、Pc(i,t;U) network wind is represented respectively Danger, from the beginning of propagating source u ∈ U, is S, I and C-shaped probability of state after propagating the t time.ηij∈ [0,1] is any in network The history probability of spreading of two users.Work as ηijRepresent when=0 and between node i, j, there is not connection, ηij=1 represents use in every case Family i receives new information and will be forwarded to user j.(i t) represents the individual infected probability of t, and its all topologys is adjacent v Occupy (NiRepresent user i neighbor user set) Pc(i,t;U) relevant.
Further, based on the potential risk resource set confirmed, use Maximum Likelihood Estimation Method true from potential risk resource set The most positive risk source, i.e. risk source, location.Concrete method can be obtained by following three formula:
L ( u , t ) = Σ i ∈ S I P C ( i , t i ; u ) + Σ j ∈ S H P S ( j , t ; u ) - - - ( 5 )
L ( u , t ~ u ) = m a x S I , S H ∈ S L ( u , t ) - - - ( 6 )
( u f , t f ) = arg [ m a x u ∈ U L ( u , t ~ u ) ] - - - ( 7 )
Wherein, SIIt is infected monitoring user's set, SHIt is the most infected monitoring user's set, tiIt it is infected user's quilt The absolute time infected.First by all potential risks source u ∈ U utilization (5) formula calculate its likelihood function L (u, t).Because Each potential risks source may the most repeatedly be simultaneously received risky copy, therefore by (6) Shi Lai get Possibility predication to the propagation timeSolve finally by (7) formula, likelihood function is taken u during maximumfAnd tf Respectively as Risk of Communication source and the estimated value of Risk of Communication time.
Concrete, at some reality catenet US.Power Grid, Facebook, AS-level Internet is carried out respectively Tracing to the source for 100 times experiment, be illustrated in figure 4 the experimental result picture of tracing to the source on above-mentioned three kinds of real networks, in figure, δ is monitored User accounts for the ratio of the total user of network.Wherein, US.Power Grid network averagely can reach the accurate rate of about 80%, The position error of other 20% is 1 to 3hops.And the inventive method can 100% ground on Facebook and AS-Internet Navigate to risk source, be significantly better than current network risks and trace to the source algorithm.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all the spirit and principles in the present invention it In, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (6)

1. network risks source based on a back propagation retroactive method, its feature is, including:
Network being ready, the user setup being monitored is monitor node and is monitored;
Labelling all infected monitor nodes, according to the infected time difference of monitor node at infected monitor node to having extracted The risk of Flooding broadcast labelling in network topology, can be simultaneously received the node of all labelling risks and incite somebody to action in statistics network topology Described node adds in the set of potential risks source;
Based on the set of potential risks source and network node dynamic of condition conversion during Risk of Communication, set up network risks Microcosmic propagation model;Described state includes health, Infection Status and infected and have infectivity;
Based on described microcosmic propagation model, Maximum Likelihood Estimation Method is used to position risk source from described potential risks source is gathered.
Network risks source based on back propagation the most according to claim 1 retroactive method, it is characterised in that described To be ready in network that the user setup being monitored is monitor node and is monitored, monitoring information includes:
If whether monitor node receives risk of infection and receives its infected absolute time of risk of infection.
Network risks source based on back propagation the most according to claim 1 retroactive method, it is characterised in that described Monitor node infected time difference equation below represents:
di=max (T)-τi
Wherein, i represents that the infected monitor node of i-th, i ∈ [1, n], n represent the sum of infected monitor node; T={ τ12…τnRepresent the infected absolute time of monitor node.
Network risks source based on back propagation the most according to claim 3 retroactive method, it is characterised in that according to The infected time difference of monitor node at infected monitor node to the risk of Flooding broadcast labelling in the network topology extracted, Statistics network topology can be simultaneously received the node of all labelling risks and described node is added to the set of potential risks source In, including:
The infected time difference of infected monitor node arrives, and infected monitor node sends by node to its all adjacent nodes The risk copy of labelling;
After any node in network topology receives the risk copy of infected monitor node labelling for the first time, broadcast this risk secondary This is to its all of adjacent node;
If any node in network topology has been simultaneously received the risk copy of all infected monitor node labellings, then this Node joins in the set of potential risks source.
Network risks source based on back propagation the most according to claim 4 retroactive method, it is characterised in that described Based on the set of potential risks source and network node dynamic of condition conversion during Risk of Communication, set up the micro-of network risks Sight propagation model includes:
Set up following iterative formula to represent the propagation of risk:
PS(i, t;U)=[1-v (i, t)] PS(i, t-1;u)
PI(i,t;U)=v (i, t) PS(i,t-1;u)+PI(i,t-1;u)
v ( i , t ) = 1 - Π j ∈ N i [ 1 - η i j · P C ( j , t - 1 ; u ) ]
Pc(i,t;U)=v (i, t) PS(i,t-1;u)
Wherein, PS(i,t;u)、PI(i,t;u)、Pc(i,t;U) represent that network risks, from the beginning of potential propagating source u ∈ U, passes respectively Broadcasting S, I and C-shaped probability of state after the t time, U represents that potential risks source is gathered, and S represents health, and I represents Infection Status, C represents infected and has infectivity;(i t) represents the infected probability of t node, η to vij∈ [0,1] is any in network The history probability of spreading of two nodes, ηijShow when=0 and between node i, j, there is not connection, ηij=1 represents that node i will receive Any information all pass to node j;NiRepresent the set of the adjacent node of node i.
Network risks source based on back propagation the most according to claim 5 retroactive method, it is characterised in that described Based on described microcosmic propagation model, Maximum Likelihood Estimation Method is used to position risk source, bag from described potential risks source is gathered Include:
Use equation below calculate potential propagating source u likelihood function L (u, t):
L ( u , t ) = Σ i ∈ S I P C ( i , t i ; u ) + Σ j ∈ S H P S ( j , t ; u )
Wherein, SIRepresent infected monitor node set, SHRepresent the most infected monitor node set, tiIt it is infected joint The infected absolute time of point;
Equation below is used to obtain the possibility predication of communication events
L ( u , t ~ u ) = m a x S I , S H ∈ S L ( u , t )
Wherein SI,SHS in ∈ S represents all monitor node set;
Likelihood function is taken u during maximum by use equation belowfAnd tfRespectively as estimating of Risk of Communication source and Risk of Communication time Evaluation:
( u f , t f ) = arg [ max u ∈ U L ( u , t ~ u ) ] .
CN201610482278.6A 2016-06-27 2016-06-27 A kind of network risks source retroactive method based on backpropagation Active CN105915399B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610482278.6A CN105915399B (en) 2016-06-27 2016-06-27 A kind of network risks source retroactive method based on backpropagation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610482278.6A CN105915399B (en) 2016-06-27 2016-06-27 A kind of network risks source retroactive method based on backpropagation

Publications (2)

Publication Number Publication Date
CN105915399A true CN105915399A (en) 2016-08-31
CN105915399B CN105915399B (en) 2019-02-26

Family

ID=56759754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610482278.6A Active CN105915399B (en) 2016-06-27 2016-06-27 A kind of network risks source retroactive method based on backpropagation

Country Status (1)

Country Link
CN (1) CN105915399B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411904A (en) * 2016-10-10 2017-02-15 华侨大学 Network risk control method based on microstate prediction
CN106557985A (en) * 2016-11-21 2017-04-05 云南大学 A kind of social network information propagating source method for solving based on random walk
CN111695760A (en) * 2020-04-23 2020-09-22 优渊领智科技(武汉)有限公司 Production quality risk recording and tracing method and system
CN113222774A (en) * 2021-04-19 2021-08-06 浙江大学 Social network seed user selection method and device, electronic equipment and storage medium
CN113553541A (en) * 2021-06-04 2021-10-26 扬州大学 Independent path analysis-based source positioning method under independent cascade model
CN114693464A (en) * 2022-03-08 2022-07-01 电子科技大学 Self-adaptive information propagation source detection method
WO2024108913A1 (en) * 2022-11-24 2024-05-30 浪潮(北京)电子信息产业有限公司 Method and system for determining information dissemination source, electronic device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090133123A1 (en) * 2005-06-03 2009-05-21 Board Of Trustees Of Michigan State University Worm Propagation Modeling In A Mobile AD-HOC Network
CN103347279A (en) * 2013-07-11 2013-10-09 清华大学 Transmitting method and transmitting system based on risk assessment
CN104361231A (en) * 2014-11-11 2015-02-18 电子科技大学 Method for controlling rumor propagation in complicated network
CN104579815A (en) * 2014-09-15 2015-04-29 南京航空航天大学 Probability model checking method for network protection strategy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090133123A1 (en) * 2005-06-03 2009-05-21 Board Of Trustees Of Michigan State University Worm Propagation Modeling In A Mobile AD-HOC Network
CN103347279A (en) * 2013-07-11 2013-10-09 清华大学 Transmitting method and transmitting system based on risk assessment
CN104579815A (en) * 2014-09-15 2015-04-29 南京航空航天大学 Probability model checking method for network protection strategy
CN104361231A (en) * 2014-11-11 2015-02-18 电子科技大学 Method for controlling rumor propagation in complicated network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PEDRO C. PINTO等: "Locating the Source of Diffusion in Large-Scale Networks", 《PHYSICAL REVIEW LETTERS》 *
张聿博等: "面向社交网络信息源定位的观察点部署方法", 《软件学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411904A (en) * 2016-10-10 2017-02-15 华侨大学 Network risk control method based on microstate prediction
CN106557985A (en) * 2016-11-21 2017-04-05 云南大学 A kind of social network information propagating source method for solving based on random walk
CN111695760A (en) * 2020-04-23 2020-09-22 优渊领智科技(武汉)有限公司 Production quality risk recording and tracing method and system
CN113222774A (en) * 2021-04-19 2021-08-06 浙江大学 Social network seed user selection method and device, electronic equipment and storage medium
CN113222774B (en) * 2021-04-19 2023-05-23 浙江大学 Social network seed user selection method and device, electronic equipment and storage medium
CN113553541A (en) * 2021-06-04 2021-10-26 扬州大学 Independent path analysis-based source positioning method under independent cascade model
CN113553541B (en) * 2021-06-04 2023-10-13 扬州大学 Independent path analysis-based source positioning method under independent cascade model
CN114693464A (en) * 2022-03-08 2022-07-01 电子科技大学 Self-adaptive information propagation source detection method
CN114693464B (en) * 2022-03-08 2023-04-07 电子科技大学 Self-adaptive information propagation source detection method
WO2024108913A1 (en) * 2022-11-24 2024-05-30 浪潮(北京)电子信息产业有限公司 Method and system for determining information dissemination source, electronic device, and storage medium

Also Published As

Publication number Publication date
CN105915399B (en) 2019-02-26

Similar Documents

Publication Publication Date Title
CN105915399A (en) Network risk source tracing method based on back propagation
Wu et al. A risk defense method based on microscopic state prediction with partial information observations in social networks
CN103581186B (en) A kind of network security situational awareness method and system
CN104618377B (en) Botnet detecting system and detection method based on NetFlow
CN109286631B (en) The vehicle node method for evaluating trust of social attribute is merged in vehicle-mounted social networks
CN106411904B (en) A kind of network risks control method based on microstate prediction
Le et al. Traffic dispersion graph based anomaly detection
CN104580222A (en) DDoS attack distributed detection and response system and method based on information entropy
CN104836810A (en) Coordinated detection method of NDN low-speed cache pollution attack
Shen et al. Controllable information sharing for user accounts linkage across multiple online social networks
da Penha et al. Fusing light and temperature data for fire detection
CN108805710A (en) A kind of distribution type electric energy method of commerce based on block chain intelligence contract technology
CN107451923A (en) A kind of online social networks rumour Forecasting Methodology based on forwarding Analytic Network Process
Xu et al. Detection on application layer DDoS using random walk model
CN103914491A (en) Data excavating method and system for high quality user generation content (UGC)
CN105471623A (en) Key IP address safety alarm association analysis method based on fuzzy scene
CN106789333A (en) A kind of complex network propagating source independent positioning method based on time layering
Liu et al. Internet of things based solutions for transport network vulnerability assessment in intelligent transportation systems
CN105897774A (en) Machine learning based estimation method for security state of network user
CN105959368A (en) Social cloud hot spot resource prediction and disposition method
CN107908766A (en) A kind of city focus incident dynamic monitoring method and system
Wang et al. Detecting Ethereum Phishing Scams with Temporal Motif Features of Subgraph
Sainia et al. Prediction of Malicious Objects in Computer Network and Defense
Fu et al. An implementation scheme of flow-net and its applications on detecting attacks in wireless networks
CN107135153A (en) The information source and influence power node positioning method inversely reviewed based on propagation path

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant