CN108667833B - Communication system malicious software propagation modeling and optimal control method based on coupling - Google Patents
Communication system malicious software propagation modeling and optimal control method based on coupling Download PDFInfo
- Publication number
- CN108667833B CN108667833B CN201810404836.6A CN201810404836A CN108667833B CN 108667833 B CN108667833 B CN 108667833B CN 201810404836 A CN201810404836 A CN 201810404836A CN 108667833 B CN108667833 B CN 108667833B
- Authority
- CN
- China
- Prior art keywords
- malware
- malicious software
- coupling
- propagation
- representing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000008878 coupling Effects 0.000 title claims abstract description 29
- 238000010168 coupling process Methods 0.000 title claims abstract description 29
- 238000005859 coupling reaction Methods 0.000 title claims abstract description 29
- 238000004891 communication Methods 0.000 title description 8
- 230000001808 coupling effect Effects 0.000 claims abstract description 9
- 230000000644 propagated effect Effects 0.000 claims abstract description 6
- 208000015181 infectious disease Diseases 0.000 claims description 31
- 230000008569 process Effects 0.000 claims description 12
- 238000011084 recovery Methods 0.000 claims description 7
- 238000002474 experimental method Methods 0.000 claims description 5
- 238000010606 normalization Methods 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 4
- 239000000126 substance Substances 0.000 claims description 2
- 238000004088 simulation Methods 0.000 abstract description 4
- 238000012795 verification Methods 0.000 abstract description 2
- 238000011217 control strategy Methods 0.000 description 7
- 238000011160 research Methods 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 6
- 241000700605 Viruses Species 0.000 description 5
- 230000007480 spreading Effects 0.000 description 4
- 201000010099 disease Diseases 0.000 description 3
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 3
- 239000011159 matrix material Substances 0.000 description 3
- 239000011541 reaction mixture Substances 0.000 description 3
- 241000282414 Homo sapiens Species 0.000 description 2
- 230000005764 inhibitory process Effects 0.000 description 2
- 239000013598 vector Substances 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005094 computer simulation Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000013178 mathematical model Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Mathematical Physics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Computing Systems (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a coupling effect-based malware propagation modeling and optimal control method, which at least comprises the following steps: s1, considering the one-way coupling between two malicious software A and B which are simultaneously propagated in a computer network, respectively establishing respective propagation dynamics models of the malicious software A and the malicious software B by utilizing an SIS model; s2, constructing a target functional by taking the manual removal rate as a control variable, and taking respective propagation dynamics models of the malicious software A and B as constraint functions; s3 solves for optimal control variables within a given control set in conjunction with the target functional and constraint functions. Through simulation verification, the method can inhibit the spread of the malicious software and simultaneously can keep the control cost at a lower level.
Description
Technical Field
The invention relates to the field of communication and information system and network control system modeling, in particular to a coupling-based communication system malicious software propagation modeling and optimal control method.
Background
Malicious software (Malware) in a communication system is propagated through a network, which brings huge losses to human beings. In order to better understand the propagation mechanism of the malware, a suitable method is found to inhibit the propagation of the malware, in recent years, researchers build propagation models of the malware aiming at different propagation types and at different perspectives, and deeply analyze the propagation types and the propagation characteristics on the basis of the propagation models.
In research, one of the most representative methods is to study the spread of computer malware through an epidemic spread warehouse model. Epidemic compartment models have originated from the analysis of the transmission of a disease with transmission. Common chamber models are SI (separable-fed), SIS (separable-fed-separable), and SIR (separable-fed-removed). If an individual is in S-chamber, it is indicated to be in a healthy state. And I and R represent infection status and removal status, respectively. The warehouse model and the analysis method thereof are completely suitable for researching the spreading research of malicious software on a computer network. At present, a great deal of research at home and abroad is developed on the basis of the three classical warehouse models, and a reasonable mathematical model is established and analyzed by considering different factors influencing propagation.
Past research has mainly been directed to the analysis of the spread of certain malware. In fact, a plurality of kinds of malicious software spread widely on the internet at the same time, for example, while a macro virus breaks down in a computer, a trojan virus also already hides some illegal operations in the computer. It is clear that when there are multiple malware propagating simultaneously, it is a simpler way to separate the propagation of two malware, considering their propagation processes to be independent of each other. This assumption simplifies the analysis, but the results often do not reflect the reality of multiple malware spreading simultaneously.
In recent years, there have been some epidemic transmission problems for various contagious diseases, and research has been conducted mainly on transmission of two or more biological viruses. The results of these studies can obviously be generalized to the analysis of computer malware propagation, however, the current studies are only developed for a certain coupling relationship, which makes the model less general. Generally, the coupling relationship between various malware may be mutual promotion, mutual inhibition of propagation caused by mutual competition of resources, or possible inhibition from initial promotion to later promotion.
In combination with the concept, the invention provides a nonlinear function to describe all coupling effects in the propagation process of two kinds of malicious software, and provides a unified research framework for modeling and analyzing the propagation process of two kinds of malicious software and multiple kinds of malicious software.
Disclosure of Invention
The invention aims to provide a coupling-based communication system malware propagation modeling and optimal control method.
The invention provides a coupling effect-based malware propagation modeling and optimal control method, which at least comprises the following steps:
s1, considering the one-way coupling between two malicious software A and B which are simultaneously propagated in a computer network, respectively establishing respective propagation dynamics models of the malicious software A and the malicious software B by utilizing an SIS model; determining feasible domains of the malicious software A and B according to the condition that the number of the nodes which are not infected with the malicious software and the infection density caused by the malicious software meet the normalization condition;
s2 removing rate by manpower1(t) and2(t) as a control variable, with SA(t)、IA(t)、SB(t)、IB(t) as a state variable, constructing a target functionalAnd the respective propagation dynamics models of the malicious software A and B are used as constraint functions;
where T denotes the time T ∈ [0, T],[0,T]For a given time frame; sA(t) and SB(t) respectively representing the number of the individual nodes which are not infected with the malicious software A and B at the moment t; i isA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively;1(t) and2(t) represents the manual removal rate of malware A and B at time t, respectively; c. C1And c2Weights representing revenue and consumption, respectively;
s3 solves for optimal control variables within a given control set in conjunction with the target functional and constraint functions.
Further, in step S1, the propagation dynamics model of the malware a is established as follows:
the established propagation dynamics model of the malicious software B is as follows:
wherein: t represents a time; sA(t) and SB(t) respectively representing the number of the individual nodes which are not infected with the malicious software A and B at the moment t; i isA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively;<k>representing an average of the computer network; gamma ray1And gamma2Representing the natural recovery rate of the node;1(t) and2(t) indicates the manual removal rates of malware A and B at time t, β1(t) and β2(t) each representsTime varying infection rates of malware A and B, β1(t)∈(0,1],β2(t)∈(0,1];
andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,andis an empirical value;
α1(t) and α2(t) represents the coupling term(s),α2(t)=1; is a critical value describing the coupling between malware B and a, is an empirical value, and is determined through multiple experiments.
Further, in step S1, the feasible domains Ω of the malware a and B are:
wherein S isA(t) and SB(t) respectively representing the number of the individual nodes which are not infected with the malicious software A and B at the moment t; i isA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively;representing a 2-dimensional positive real number domain.
Further, in step S2, the constraint function is as follows:
wherein: t represents a time; sA(t) and SB(t) respectively representing the number of the individual nodes which are not infected with the malicious software A and B at the moment t; i isA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively;<k>representing an average of the computer network; gamma ray1And gamma2Respectively representing the natural recovery rate of the nodes in the propagation dynamics models of the malicious software A and B;1(t) and2(t) represents the manual removal rate of malware A and B at time t, respectively;andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,andis an empirical value; is a critical value describing the coupling between malware B and a, is an empirical value, and is determined through multiple experiments.
Further, step S3 further includes:
320 constructs a function H according to the lagrangian function L:
330 analyzes the optimal control problem by Pontryagin maximum value principle to obtain the accompanying variable lambda1(t)、λ2(t)、λ3(t)、λ4(t) should satisfy:
340 in combination with a cross-sectional condition lambda1(T)=λ2(T)=λ3(T)=λ4(T) ═ 0, the optimum control variables were calculated as follows:
wherein:
IA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively;1(t) and2(t) represents the manual removal rate of malware A and B at time t, respectively; c. C1And c2Weights representing revenue and consumption, respectively;<k represents the average of the computer network; gamma ray1And gamma2Representing the natural recovery rate of the node; sA(t) and SB(t) respectively representing the number of the individual nodes which are not infected with the malicious software A and B at the moment t; lambda [ alpha ]1(t)、λ2(t)、λ3(t)、λ4(t) represents an accompanying variable at time t;andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,andis an empirical value; is a critical value describing the coupling effect between the malicious software B and the malicious software A, is an empirical value, and is determined through a plurality of tests; t represents a specific time constant when the lagrange multiplier is 0;represents the optimal state variable SA(t)、IA(t)、SB(t)、IB(t);Andis [0,1 ]]Medium arbitrary constant, represents the upper bound of the controlled variable.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) the research on the one-way coupling effect between two types of malicious software which are simultaneously propagated is carried out, and a unified framework is provided for the simultaneous propagation process of the two types of malicious software.
(2) Considering the one-way coupling between two malicious software A and B which are simultaneously transmitted in a computer network, a transmission dynamics model is constructed, and an optimal control problem based on the transmission dynamics model is provided; through simulation verification, the optimal control method can also obviously reduce the control cost on the premise of ensuring that the number of infected nodes is as small as possible.
(3) The method is suitable for rumor propagation, biological virus propagation and fault propagation on a power system, and has strong universality.
Drawings
FIG. 1 is a graph of infection density trends of infected malware A under different control strategies;
FIG. 2 is a graph of infection density trends of infected malware B under different control strategies;
Detailed Description
In order to more clearly illustrate the present invention and/or the technical solutions in the prior art, the following will describe embodiments of the present invention with reference to the accompanying drawings. It is obvious that the drawings in the following description are only some examples of the invention, and that for a person skilled in the art, other drawings and embodiments can be derived from them without inventive effort.
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
The following description of the embodiments of the present invention will be made with reference to the accompanying drawings.
The invention relates to a communication system malicious software propagation modeling and optimal control method based on coupling, which comprises the following specific steps:
s1, considering the one-way coupling between two malicious software A and B which are simultaneously propagated in a computer network, respectively establishing respective propagation dynamics models of the malicious software A and the malicious software B by utilizing an SIS model; and determining feasible domains of the malicious software A and B according to the condition that the number of the nodes which are not infected by the malicious software and the infection density caused by the malicious software meet the normalization condition.
The following will provide a specific implementation of this step.
Considering that two malicious software A and B are spread simultaneously in a certain computer network, assuming that the average degree of the network is < k >, under the framework of an average field, a spreading dynamics model of the malicious software A and B is established as follows:
equation (1) is a propagation dynamics model of the malware a, and equation (2) is a propagation dynamics model of the malware B. In formulae (1) to (2):
t represents a time;
SA(t) represents the number of individual nodes which are not infected with the malicious software A at the time t;
SB(t) represents the number of individual nodes not infected with the malware B at the time t;
IA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively; the infection density refers to the proportion of the number of the nodes infected with the malicious software in the computer network to the number of all the nodes;
γ1and gamma2Respectively representing the natural recovery rate of the nodes in the propagation dynamics models of the malicious software A and B;
1(t) and2(t) represents the manual removal rate of malware A and B at time t, respectively;
β1(t) and β2(t) represents the time-varying infection rates of malware A and B, respectively, wherein β1(t)∈(0,1],β2(t)∈(0,1]。
The time-varying infection rate was calculated as follows:
wherein the content of the first and second substances,andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,anddetermined by a number of tests, α1(t) and α2And (t) is a coupling term used for describing the coupling action between the malicious software A and B and between the malicious software B and A respectively.
For ease of analysis, the present invention contemplates a one-way coupling between malware A and B, i.e., α2(t)=1。
Let α1(t) is defined as follows:
in the formula (3), the reaction mixture is, is a critical value for the infection density describing the coupling between malware B and a, which is an empirical value and is determined through a number of experiments.
α as described above1(t) is defined based on the following considerations, when IBWhen t is 0, there is no coupling between malware B and A, so α1(t)=1。
On the other hand, consider β1(t)∈(0,1]Therefore α1(t) hasBoundary of ChinaWhen in useα1(t) this upper bound will not be reached if IB(t) ≠ 0, and coupled terms can be written asIt is clear that the definition of the coupling term includes all unidirectional coupling between B and a.
Suppose SA(t)、IA(t)、SB(t)、IB(t) satisfies the normalization condition, i.e. SA(t)+IA(t)=SB(t)+IB(t) ═ 1, then the feasible domains Ω for malware a and B in the computer network are:
in the formula (4), the reaction mixture is,representing a 2-dimensional positive real number domain.
Will be pointed out next toThe case (2) provides a concrete implementation procedure of steps S2 to S4, wherein the \ representation is not included.
S2 human removal rate of malicious software A and B1(t) and2and (t) as a control variable, constructing a target functional, and taking respective propagation dynamics models of the malicious software A and B as constraint functions.
Artificial removal rate in a model of propagation dynamics of malware1(t) and2(t) as the only control variable, the following set of artificial removal rates is given as the control set:
in the formula (5), t represents time; t > 0 is a given time constant, L2(0, T) represents the integral in two dimensions;andis a group of [0,1]Represents the upper bound of the control variable.
In order to minimize the number of infected nodes by control and minimize the consumption of the communication system, the following target functional J, constraint function and initial condition are considered, target functional formula (6), constraint function formula (7) and initial condition formula (8):
in formulae (6) to (8):
IA(t) and IB(t) respectively representing the infection densities caused by the malware a and B in the computer network at time t;
1(t) and2(t) is expressed as decrease IA(t) and IB(t) the cost of manual removal of malware a and B, such as the cost of removing malware a and B;
c1and c2Respectively representing the weights of income and consumption, and giving values to the system;
s (0) and I (0) represent initial states;
S0representing the number of nodes which are not infected with the malicious software at 0 moment;
I0representing the amount of infection density caused by the malware at time 0.
The constraint function (7) may be rewritten as:
in formula (9):
therefore, there are:
wherein phi is1And phi2Representing two different sets of state vectors, the prime notation of "'" indicates φ1Corresponding parameters, denoted φ with a prime symbol2The corresponding parameters.
Then:
It follows therefore that:
so the constant V ═ max { M, | | B | } < ∞, | | | | | | | represents the matrix norm.
The function D (phi) satisfies the Ripritz continuous condition, from the definition of the control variables and to the state variable SA(t)、IA(t)、SB(t)、IB(t) it can be concluded that a solution to the constraint function exists.
The ultimate goal of the target functional is to obtain the optimal control variablesMake it satisfy
S3 according to the existence of optimal control variableAnd (3) enabling the target functional to be established, and obtaining the optimal control condition by combining a given control set according to the optimal control system, the corresponding constraint function and the optimal state solution under the initial condition if the accompanying variable meets the condition.
Lagrangian function L giving the optimal control problem:
in the formula (14), IA(t) and IB(t) represents the infection density of the computer network due to malware a and B, respectively;1(t) and2(t) for reducing IA(t) and IB(t) cost paid; c. C1And c2Weights representing revenue and consumption, respectively, are given to the system.
Define the Hamiltonian (Hamiltonian) function H:
in formula (15), λ1(t)、λ2(t)、λ3(t)、λ4(t) represents an accompanying variable at time t.
There is an optimum control variableEquation (13) is satisfied, and the constraint function (see equation (7)) and the initial condition (see equation (8)) are satisfied.
The Pontryagin maximum value principle is adopted to analyze the optimal control problem, and the Pontryagin maximum value principle provides the optimal control variable systemAnd constraint function, optimal state variable of initial conditionThen, there is an accompanying variable λ1(t)、λ2(t)、λ3(t)、λ4(t) should satisfy:
the cross-section conditions are as follows:
in equation (17), T represents a specific time constant when the lagrangian multiplier is 0.
Further, there are:
in the formula (18), the reaction mixture,andis [0,1 ]]Any one of the number of the constants is,representing the upper bound of the controlled variable.
S4 was verified using MATLAB for numerical simulation.
And selecting appropriate parameters to establish a malware propagation model based on coupling by using an MATLAB platform, and comparing the variation trends of infected nodes under different conditions to verify the superiority of the optimal control method.
In the numerical simulation, the optimal control variable system can carry out numerical solution by using an Euler method. Consider a random computer network with a number of nodes N of 1000, the average of the network<k>Given an initial condition of I ═ 6A(0)=0.05,IB(0) 0.05; through a plurality of tests, other parameters are selected:γ1=0.01,γ2=0.02,c1=2,c2=1, and selecting the time T of the optimal control as 300.
Fig. 1 and 2 show the trend of the malware a and B infecting nodes without control, constant control, feedback control, and optimal control (i.e., the method of the present invention), respectively. For the case of no control, there is inevitably an outbreak of endemic disease, i.e. malware spreading throughout the network, under the above-mentioned set parameters. And the other three control strategies can effectively control the propagation of related objects, and the number of nodes infected with the malicious software can be reduced to 0 by both constant control and optimal control.
In order to better illustrate the superiority of the method of the present invention, the total cost of the four control strategies at different terminal time points is calculated respectively, and the relevant data are shown in table 1. It can be seen from the table that the total cost of using the optimal control strategy is lowest. Both optimal and constant control can reduce the number of infected nodes to 0 at set parameters, but it is clear that the total cost is
TABLE 1 Total cost Table of four control strategies at different terminal times
The optimal control strategy achieves the aim of controlling the spread of the malicious software by controlling the number of infected nodes, when the spread is controlled to a certain extent, the number of the nodes needing to be controlled is gradually reduced, and the optimal control variable isAndis shown in fig. 3.
The present embodiment is mainly demonstrated for the one-way coupling effect between two kinds of malware, and the proposed propagation model for the propagation process of two objects is also applicable to propagation of rumors, propagation of biological viruses, and fault propagation on power systems.
The specific embodiments described herein are merely illustrative of the patent spirit of the invention. Various modifications or additions may be made or substituted in a similar manner to the specific embodiments described herein by those skilled in the art without departing from the spirit of the invention or exceeding the scope thereof as defined in the appended claims.
Claims (5)
1. The malware propagation modeling and optimal control method based on the coupling effect is characterized by at least comprising the following steps:
s1, considering the one-way coupling between two malicious software A and B which are simultaneously propagated in a computer network, respectively establishing respective propagation dynamic models of A and B by utilizing an SIS model; determining feasible domains of A and B according to the fact that the number of the nodes which are not infected with a piece of malicious software and the infection density caused by the piece of malicious software meet normalization conditions;
s2 removing rate by manpower1(t) and2(t) as a control variable, with SA(t)、IA(t)、SB(t)、IB(t) as a state variable, constructing a target functionalAnd the respective propagation dynamics models of the malicious software A and B are used as constraint functions;
where T denotes the time T ∈ [0, T],[0,T]For a given time frame; sA(t) and SB(t) respectively representing the number of the individual nodes which are not infected with the malicious software A and B at the moment t; i isA(t) and IB(t) represents the infection density caused by the malware A and B at the time t respectively;1(t) and2(t) represents the manual removal rate of malware A and B at time t, respectively; c. C1And c2Weights representing revenue and consumption, respectively;
s3, solving an optimal control variable in a given control set by combining a target functional and a constraint function;
rate of manual removal1(t) and2(t) As a unique control variable, the following set of artificial removal rates is given as the control setAB:
2. The coupling-based malware propagation modeling and optimal control method of claim 1, wherein:
in step S1, the established propagation dynamics model of the malware a is:
the established propagation dynamics model of the malicious software B is as follows:
wherein:<k>representing an average of the computer network; gamma ray1And gamma2Representing the natural recovery rate of the node β1(t) and β2(t) represents the time-varying infection rates of malware A and B, respectively, β1(t)∈(0,1],β2(t)∈(0,1];
andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,andis an empirical value;
4. The coupling-based malware propagation modeling and optimal control method of claim 1, wherein:
in step S2, the constraint function is as follows:
wherein:<k>representing an average of the computer network; gamma ray1And gamma2Respectively representing the natural recovery rate of the nodes in the propagation dynamics models of the malicious software A and B;andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,andis an empirical value; is a critical value describing the coupling between malware B and a, is an empirical value, and is determined through multiple experiments.
5. The coupling-based malware propagation modeling and optimal control method of claim 1, wherein:
step S3 further includes:
320 constructs a function H according to the lagrangian function L:
330 analyzes the optimal control problem by Pontryagin maximum value principle to obtain the accompanying variable lambda1(t)、λ2(t)、λ3(t)、λ4(t) should satisfy:
340 in combination with a cross-sectional condition lambda1(T)=λ2(T)=λ3(T)=λ4(T) ═ 0, the optimum control variables were calculated as follows:
wherein:
c1and c2Weights representing revenue and consumption, respectively;<k>representing an average of the computer network; gamma ray1And gamma2Representing the natural recovery rate of the node; lambda [ alpha ]1(t)、λ2(t)、λ3(t)、λ4(t) represents an accompanying variable at time t;andrespectively represent the infection rates of the malware a and B in the respective propagation processes without considering the mutual influence of the malware a and B,andis an empirical value; is a critical value describing the coupling effect between the malicious software B and the malicious software A, is an empirical value, and is determined through a plurality of tests; t represents a specific time constant when the lagrange multiplier is 0; represents the optimal state variable SA(t)、IA(t)、SB(t)、IB(t);Andis [0,1 ]]Medium arbitrary constant, represents the upper bound of the controlled variable.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810404836.6A CN108667833B (en) | 2018-04-28 | 2018-04-28 | Communication system malicious software propagation modeling and optimal control method based on coupling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810404836.6A CN108667833B (en) | 2018-04-28 | 2018-04-28 | Communication system malicious software propagation modeling and optimal control method based on coupling |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108667833A CN108667833A (en) | 2018-10-16 |
CN108667833B true CN108667833B (en) | 2020-09-08 |
Family
ID=63781606
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810404836.6A Active CN108667833B (en) | 2018-04-28 | 2018-04-28 | Communication system malicious software propagation modeling and optimal control method based on coupling |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108667833B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760208B (en) * | 2022-03-25 | 2024-01-30 | 广州大学 | Wireless sensor network control method based on time division |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004078780A (en) * | 2002-08-21 | 2004-03-11 | Nippon Telegr & Teleph Corp <Ntt> | Method, device, and program for prediction, and recording medium recording the prediction program |
CN106126970A (en) * | 2016-06-20 | 2016-11-16 | 西安建筑科技大学 | There is the severtal populations competition multiple target website bit combination optimization method of protection zone |
CN107844626A (en) * | 2017-09-21 | 2018-03-27 | 南京邮电大学 | A kind of viral transmission control method with multicast rate |
-
2018
- 2018-04-28 CN CN201810404836.6A patent/CN108667833B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004078780A (en) * | 2002-08-21 | 2004-03-11 | Nippon Telegr & Teleph Corp <Ntt> | Method, device, and program for prediction, and recording medium recording the prediction program |
CN106126970A (en) * | 2016-06-20 | 2016-11-16 | 西安建筑科技大学 | There is the severtal populations competition multiple target website bit combination optimization method of protection zone |
CN107844626A (en) * | 2017-09-21 | 2018-03-27 | 南京邮电大学 | A kind of viral transmission control method with multicast rate |
Non-Patent Citations (3)
Title |
---|
"Modeling and analysis of the propagation dynamics of modern email malware";Wen S,Zhou W,Ghang J,et al.;《IEEE Transactions on Dependable & Secure Computing》;20141231;第11卷(第4期);361-374页 * |
"基于一维元胞自动机的复杂网络恶意软件传播研究";宋玉蓉,蒋国平;《物理学报》;20090915;第58卷(第9期);5911-5918页 * |
"基于耦合作用的通信系统恶意软件传播建模与最优控制";冯希军,苑超,徐晓寅,孔政敏;《武汉大学学报(工学版)》;20190831;第52卷(第8期);741-746页 * |
Also Published As
Publication number | Publication date |
---|---|
CN108667833A (en) | 2018-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shi et al. | An SIS model with infective medium on complex networks | |
Paré et al. | Modeling, estimation, and analysis of epidemics over networks: An overview | |
Hosseini et al. | A model for malware propagation in scale-free networks based on rumor spreading process | |
Wang et al. | Differential evolution based on covariance matrix learning and bimodal distribution parameter setting | |
Ren et al. | A novel computer virus model and its dynamics | |
Li et al. | Analysis of epidemic spreading of an SIRS model in complex heterogeneous networks | |
Cheng et al. | Dynamical behaviors and control measures of rumor-spreading model in consideration of the infected media and time delay | |
CN107566387B (en) | Network defense action decision method based on attack and defense evolution game analysis | |
Zhang et al. | Optimal control strategy for a novel computer virus propagation model on scale-free networks | |
Zhu et al. | The dynamics analysis of a rumor propagation model in online social networks | |
Hosseini et al. | Malware propagation modeling considering software diversity and immunization | |
Rahman et al. | A predator-prey model with disease in prey | |
CN106599691B (en) | A kind of Computer Virus Spread based on complex network seeks source method | |
Shams | Using network properties to evaluate targeted immunization algorithms | |
Xiao et al. | Dynamical behavior for a stage-structured SIR infectious disease model | |
CN107844626B (en) | Virus propagation control method with multiple propagation rates | |
CN115935442A (en) | Block chain performance optimization method based on multi-agent deep reinforcement learning | |
Wu et al. | Epidemic waves of a spatial SIR model in combination with random dispersal and non-local dispersal | |
Liu et al. | An evolutionary game based particle swarm optimization algorithm | |
CN108667833B (en) | Communication system malicious software propagation modeling and optimal control method based on coupling | |
Zhou et al. | Complex dynamics and control strategies of SEIR heterogeneous network model with saturated treatment | |
Eroğlu et al. | Comparative analysis on fractional optimal control of an SLBS model | |
Mehta et al. | Mutation, sexual reproduction and survival in dynamic environments | |
Tsimring et al. | Modeling of contact tracing in social networks | |
Piqueira et al. | Malware propagation in clustered computer networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |