Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (7): 2125-2131.DOI: 10.11772/j.issn.1001-9081.2021040625
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Received:
2021-04-20
Revised:
2021-07-11
Accepted:
2021-07-14
Online:
2022-07-15
Published:
2022-07-10
Contact:
Jianguo REN
About author:
LI Hanlun, born in 1993, M. S. candidate. His research interests include propagation model, complex networks.
Supported by:
通讯作者:
任建国
作者简介:
李汉伦(1993—),男,江苏徐州人,硕士研究生,主要研究方向:传播模型、复杂网络;
基金资助:
CLC Number:
Hanlun LI, Jianguo REN. Malware propagation model based on characteristic behavior detection in P2P networks[J]. Journal of Computer Applications, 2022, 42(7): 2125-2131.
李汉伦, 任建国. P2P网络中基于特征行为检测的恶意代码传播模型[J]. 《计算机应用》唯一官方网站, 2022, 42(7): 2125-2131.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021040625
1 | NASEER M, RUSDI J F, SHANONO N M, et al. Malware detection: issues and challenges[J]. Journal of Physics: Conference Series, 2021, 1807(1): No.012011. 10.1088/1742-6596/1807/1/012011 |
2 | 冯朝胜,秦志光,劳伦斯·库珀特,等. P2P文件共享网络中被动蠕虫传播建模与分析[J]. 电子科技大学学报, 2009,38 (2):262-265, 273. 10.3969/j.issn.1001-0548.2009.02.25 |
FENG C S, QIN Z G, CUTHBET L, et al. Propagation modeling and analysis of passive worms in peer-to-peer file-sharing networks[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(2): 262-265, 273. 10.3969/j.issn.1001-0548.2009.02.25 | |
3 | MOHAMMED A A, KADHIM D J. Analysis of threats and security issues evaluation in mobile P2P networks[J]. International Journal of Electrical and Computer Engineering, 2020, 10(6): 6435-6445. 10.11591/ijece.v10i6.pp6435-6445 |
4 | DEHKORDI M J, SADEGHIYAN B. An effective node-removal method against P2P botnets[J]. Computer Networks, 2020, 182: No.107488. 10.1016/j.comnet.2020.107488 |
5 | 廖军. 基于P2P的恶意代码检测及防御技术研究[D]. 成都:电子科技大学, 2014:27-30. |
LIAO J. Research of P2P-based malicious code detection and protection technology[D]. Chengdu: University of Electronic Science and Technology of China, 2014:27-30. | |
6 | 关欣,朱冰,陈震,等. 基于特征码病毒扫描技术的研究[J]. 信息网络安全, 2013, 13(4):8-13. 10.3969/j.issn.1671-1122.2013.04.003 |
GUAN X, ZHU B, CHEN Z, et al. Study on virus signatures based on matching in virus-detecting technologies[J]. Netinfo Security, 2013, 13(4): 8-13. 10.3969/j.issn.1671-1122.2013.04.003 | |
7 | 高宇,莫有权,李庆荣,等. 基于分布式结构的网络恶意代码智能分析系统[J]. 计算机应用与软件, 2010, 27(5):121-124. 10.3969/j.issn.1000-386X.2010.05.036 |
GAO Y, MO Y Q, LI Q R, et al. Distributed structure-based intelligent network malicious code analysing system[J]. Computer Applications and Software, 2010, 27(5): 121-124. 10.3969/j.issn.1000-386X.2010.05.036 | |
8 | 王平,方滨兴,云晓春,等. 基于用户习惯的蠕虫的早期发现[J]. 通信学报, 2006, 27(2):56-65. 10.3321/j.issn:1000-436X.2006.02.009 |
WANG P, FANG B X, YUN X C, et al. User-habit based early warning of worm[J]. Journal on Communication, 2006, 27(2): 56-65. 10.3321/j.issn:1000-436X.2006.02.009 | |
9 | 吴国政,秦志光. 基于节点自杀的对等网络蠕虫防治方法[J]. 电子科技大学学报, 2012, 41(1):125-130. 10.3969/j.issn.1001-0548.2012.01.024 |
WU G Z, QIN Z G. Suicide based P2P worms defensive approach[J]. Journal of University of Electronic Science and Technology of China, 2012,41 (1): 125-130. 10.3969/j.issn.1001-0548.2012.01.024 | |
10 | 谢承灏,董健全. P2P文件共享系统中的恶意代码防治策略[J]. 计算机工程与应用, 2006, 42(24):152-156. 10.3321/j.issn:1002-8331.2006.24.046 |
XIE C H, DONG J Q. A malware defence strategy in file-sharing system[J]. Computer Engineering and Applications, 2006, 42(24): 152-156. 10.3321/j.issn:1002-8331.2006.24.046 | |
11 | YANG R, WANG B H, REN J, et al. Epidemic spreading on heterogeneous networks with identical infectivity[J]. Physics Letters A, 2006, 364(3/4): 189-193. 10.1016/j.physleta.2006.12.021 |
12 | HETHCOTE H W. The mathematics of infectious diseases[J]. SIAM Review, 2000, 42(4): 599-653. 10.1137/s0036144500371907 |
13 | 徐文雄,张仲华. 具有预防接种免疫力的双线性传染率SIR流行病模型全局稳定性[J]. 大学数学, 2003, 19(6):76-80. 10.3969/j.issn.1672-1454.2003.06.019 |
XU W X, ZHANG Z H. Global stability of SIR epidemiological model with vaccinal immunity and bilinear incidence rates[J]. College Mathematics, 2003, 19(6): 76-80. 10.3969/j.issn.1672-1454.2003.06.019 | |
14 | REN J G, YANG X F, ZHU Q Y, et al. A novel computer virus model and its dynamics[J]. Nonlinear Analysis: Real World Applications, 2012, 13(1): 376-384. 10.1016/j.nonrwa.2011.07.048 |
15 | 付伟,王静,潘晓中,等. 动态同质网络上的SIR谣言传播模型[J]. 计算机应用, 2018, 38(7):1951-1955, 1966. |
FU W, WANG J, PAN X Z, et al. SIR rumor propagation model on dynamic homogeneity network[J]. Journal of Computer Applications, 2018, 38(7): 1951-1955, 1966. | |
16 | JACKSON M, CHEN-CHARPENTIER B M. Modeling plant virus propagation with delays[J]. Journal of Computational and Applied Mathematics, 2017, 309: 611-621. 10.1016/j.cam.2016.04.024 |
17 | LA SALLE J P. The Stability of Dynamical Systems[M]. Philadelphia, PA: Society for Industrial and Applied Mathematics, 1976: 7-34. 10.1137/1.9781611970432 |
18 | CLARK R N. The Routh-Hurwitz stability criterion, revisited[J]. IEEE Control Systems Magazine, 1992, 12(3): 119-120. 10.1109/37.165530 |
19 | LAVRETSKY E, WISE K A. Lyapunov stability of motion[M]// Robust and Adaptive Control: With Aerospace Applications. London: Springer, 2013: 225-261. 10.1007/978-1-4471-4396-3_8 |
20 | XIAO X, FU P, DOU C S, et al. Design and analysis of SEIQR worm propagation model in mobile Internet[J]. Communications in Nonlinear Science and Numerical Simulation, 2017, 43: 341-350. 10.1016/j.cnsns.2016.07.012 |
[1] | Yaping DENG, Yingjiang LI. Review of YOLO algorithm and its applications to object detection in autonomous driving scenes [J]. Journal of Computer Applications, 2024, 44(6): 1949-1958. |
[2] | Min SUN, Qian CHENG, Xining DING. CBAM-CGRU-SVM based malware detection method for Android [J]. Journal of Computer Applications, 2024, 44(5): 1539-1545. |
[3] | Yudong PANG, Zhixing LI, Weijie LIU, Tianhao LI, Ningning WANG. Small target detection model in overlooking scenes on tower cranes based on improved real-time detection Transformer [J]. Journal of Computer Applications, 2024, 44(12): 3922-3929. |
[4] | Qiangqiang QIN, Junguo LIAO, Yixun ZHOU. Small object detection algorithm based on split mixed attention [J]. Journal of Computer Applications, 2023, 43(11): 3579-3586. |
[5] | Mo LI, Tianliang LU, Ziheng XIE. Android malware family classification method based on code image integration [J]. Journal of Computer Applications, 2022, 42(5): 1490-1499. |
[6] | JIANG Qianyu, WANG Fengying, JIA Lipeng. Malware detection method based on perceptual hash algorithm and feature fusion [J]. Journal of Computer Applications, 2021, 41(3): 780-785. |
[7] | CHEN Fang, LIU Xiaorui, YANG Mingye. Face recognition security system based on liveness detection and authentication [J]. Journal of Computer Applications, 2020, 40(12): 3666-3672. |
[8] | LIU Feng. Stability analysis of a drug abuse epidemic model [J]. Journal of Computer Applications, 2019, 39(5): 1534-1539. |
[9] | CHEN Guangxi, WANG Jiaxin, HUANG Yong, ZHAN Yijun, ZHAN Baoying. Pedestrian detection method based on cascade networks [J]. Journal of Computer Applications, 2019, 39(1): 186-191. |
[10] | CAI Xiumei, LIU Chao, HUANG Xianying, LIU Xiaoyang, YANG Hongyu. Ignorant-Lurker-Disseminator-Removed propagation model of spam information on Internet [J]. Journal of Computer Applications, 2018, 38(8): 2316-2322. |
[11] | LUO Shiqi, TIAN Shengwei, YU Long, YU Jiong, SUN Hua. Android malware detection based on texture fingerprint and malware activity vector space [J]. Journal of Computer Applications, 2018, 38(4): 1058-1063. |
[12] | XIE Lixia, LI Shuang. Android malware detection model based on Bagging-SVM [J]. Journal of Computer Applications, 2018, 38(3): 818-823. |
[13] | RAN Maojie, LIU Chao, HUANG Xianying, LIU Xiaoyang, YANG Hongyu, ZHANG Guangjian. Rumor spread model considering difference of individual interest degree and refutation mechanism [J]. Journal of Computer Applications, 2018, 38(11): 3312-3318. |
[14] | LUO Wenshuang, CAO Tianjie. Malware detection approach based on non-user operating sequence [J]. Journal of Computer Applications, 2018, 38(1): 56-60. |
[15] | SU Zhida, ZHU Yuefei, LIU Long. Android malware application detection using deep learning [J]. Journal of Computer Applications, 2017, 37(6): 1650-1656. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||