Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Simulation system and simulation method of social network service malicious code propagation

A social network and malicious code technology, applied in the field of social network malicious code propagation model simulation system, can solve problems such as large consumption of system resources, and achieve the effect of good universality and accurate description

Active Publication Date: 2014-11-12
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the test bed technology can verify the processing process of a single node, it usually only handles small and medium-sized networks due to the excessive consumption of system resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simulation system and simulation method of social network service malicious code propagation
  • Simulation system and simulation method of social network service malicious code propagation
  • Simulation system and simulation method of social network service malicious code propagation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The technical scheme of the present invention will be described in detail below in conjunction with the drawings:

[0070] The simulation system of the present invention is such as figure 1 As shown, the system is implemented based on MapReduce technology. Virtualization technology is used at the hardware layer, virtual hosts are used to replace traditional physical hosts, and multiple virtual hosts are constructed and connected by Ethernet. In the storage module, a distributed storage environment is used to store the inputted social network graph topology data. Based on the MapReduc deployment of a distributed computing environment, the social network worm propagation is divided into three subtask modules: initial infection, propagation infection and statistical calculation, and the mapping and protocol calculation modules are defined for the three pre-divided tasks, and then according to The defined task sequence is submitted to the underlying distributed computing envi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a simulation system and a simulation method of a social network service malicious code propagation model. The method includes that by the aid of a server, a plurality of virtual machines are constructed and connected with one another through networks; a social network chart is generated according to topological data of a social network service; primary infection node information is obtained by means of the calculation of the virtual machines according to a set malicious code primary infection strategy; and new nodes which are infected after once propagation are obtained by means of the calculation of the virtual machines according to a given propagation infection decision rule, successor nodes of primary infection nodes and properties of the nodes, new nodes which are infected by next propagation are obtained according to successor nodes of the new nodes, and such circulation continues until no new nodes are infected after any propagation. According to the simulation system and the simulation method of the social network service malicious code propagation model, various possible variables in the social network service malicious code propagation model are contained, by means of a distributed computation mode, the social network service malicious code propagation model is checked and corrected, and the prevention of the social network service malicious code propagation is greatly facilitated.

Description

Technical field [0001] The invention belongs to the technical field of network security, and specifically relates to a simulation system and a simulation method of a social network malicious code propagation model. Background technique [0002] The large-scale popularity of social networks (Social Network Service, SNS) has made it a target for many criminals, using it as a way to obtain private information and a main platform for the spread of malicious code. According to a survey by the security software company Webroot, users of social networking sites are more likely to encounter security threats such as loss of financial information, theft of identity information, and malware infection. [0003] The malicious code of the social network broke out many times, causing a huge impact: the first SNS worm, the Samy worm, broke out on MySpace in 2005, which infected millions of users within 20 hours; in 2008, Koobface adopted social engineering methods. It quickly broke out on Faceboo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F9/455
Inventor 王蕊贾晓启和亮
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products