Malicious software propagation control method and device based on ternary association graph detection

A malicious software and control method technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of not providing control measures, not providing multiple quantification of various driving factors, not extracting related factors, etc., to achieve accurate control Effect

Active Publication Date: 2020-06-02
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some scholars extract different malware characteristics for propagation analysis. The advantage is that they can analyze the malware propagation mode from different angles, so as to predict the malware propagation trend, but they have not extracted the relevant factors.
Some scholars quantify the influence and driving force of malware propagation through network topology, user behavior or propagation path, but the quality of index quantification has a direct impact on the propagation results, and these studies have not provided a suitable method for multiple drivers. multivariate quantification
There are also some scholars who have considered the polymorphism of malicious software. For example, the Chinese invention patent CN108667833A applied by Zhang Yuanchao et al. provides a coupling-based communication system malware propagation modeling and optimal control method, which focuses on simultaneous propagation in computer networks. The one-way coupling between the two malicious software A and B, using the SIS model to establish the respective propagation dynamic models of A and B, although this method has a certain analysis of the propagation dynamics, it lacks the extraction and analysis of multivariate effective features
In addition, malware is a constantly evolving process in the process of spreading, and no effective control measures are provided for the constantly evolving situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious software propagation control method and device based on ternary association graph detection
  • Malicious software propagation control method and device based on ternary association graph detection
  • Malicious software propagation control method and device based on ternary association graph detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are only part of the embodiments of the present invention, and Not all examples.

[0030] It can be understood that the malicious software propagation control method and device in this embodiment can be implemented in various network terminal devices, and can also be implemented in network background servers, such as social application servers, social message management servers, etc., without other limitations In a case where the malware propagation control method in the embodiment of the present invention can be implemented by a malware propagation control device.

[0031] In one embodiment, such as figure 1 As shown, a malware propagation control method based on triple corre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security control, and particularly relates to a malicious software propagation control method and device based on ternary association graph detection. The method comprises the following steps: acquiring data source information of malicious software, a user node and a propagation path, and preprocessing the data source information; establishing a ternary association graph; based on a weight matrix of edges in the ternary association graph, calculating scores of malicious software, propagation paths and user nodes according to a cross iterative scoring mechanism; performing unified quantification by using multiple linear regression scores, and calculating the influence of the user nodes; establishing an infectious disease SIHR propagation model based on the score value and a hotspot infection driving mechanism, and calculating a propagation state and a propagation trend of a driving factor pair; and according to a result of the propagation model, cutting off a malicious software propagation path at the next moment, and isolating user nodes. According to the method disclosed in the invention, the malicious software is broadcasted, the propagation path of the malicious software is effectively cut off, and infected users are isolated, so that the safety of the users is improved.

Description

technical field [0001] The invention belongs to the technical field of network security control, in particular to the analysis of malicious software propagation in the Internet, and in particular to a method and device for controlling the propagation of malicious software based on ternary correlation graph detection. Background technique [0002] With the rapid development of network technology in the past few decades, malicious software like viruses and worms is a serious threat to the reliability, integrity and availability of computers. For example, malware can spread through the Internet and infect millions of computers and mobile phones. Malware often spreads through diffusion or infection in the network, which will cause huge loss of the network. Therefore, in today's increasingly sophisticated network attacks and Internet security threats, the analysis of malware propagation is particularly important. It has a positive effect on the public sector's control of network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/145
Inventor 李暾朱洋甫吴欣虹刘宴兵肖云鹏
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products