Research and Control of Computer Virus Network Transmission

被引:0
|
作者
Nan, Jiang [1 ]
机构
[1] Inner Mongolia Univ Nationalities, Tongliao, Peoples R China
来源
AGRO FOOD INDUSTRY HI-TECH | 2017年 / 28卷 / 01期
关键词
Computer virus; network communication; mathematical model; infection control; SPREAD; MODEL;
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
With the development and advantages of network and information technology, the security of computer and network systems is threatened by viruses that are spreading over the Internet. Therefore, the study on the control of computer virus network transmission has become a major concern. In this context, the development process of a computer virus was investigated, and then the research progress of the computer virus propagation model both locally and abroad was analyzed. The loss caused by a computer virus to the society and the economy was also pointed out, and the development trend of the virus infection rate in recent years was examined. In addition, the computer virus defense technology was evaluated, and the transmission mode of computer virus was investigated. The mathematical model of computer virus network transmission based on the SIS model of biological virus transmission was constructed. Then, the model was simulated and analyzed under different models of both local and wide area networks. Results suggest that the initial period of the computer virus infection is the most vulnerable period and is most favorable to controlling the computer virus. These results provide a favorable reference for controlling the computer virus network transmission.
引用
收藏
页码:462 / 466
页数:5
相关论文
共 50 条
  • [31] Research on computer virus and law prevention
    [J]. Li, Zhaoxia, 1600, TeknoScienze, Viale Brianza,22, Milano, 20127, Italy (28):
  • [32] Research on Computer Virus and Law Prevention
    Li, Zhaoxia
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 457 - 461
  • [33] ADAPTIVE-PRIORITY CONTROL ALGORITHM FOR INFORMATION-TRANSMISSION IN THE ELECTRONIC-COMPUTER NETWORK
    BUKCHIN, AM
    [J]. AVTOMATIKA, 1982, (02): : 76 - 79
  • [34] Research on system of gear transmission computer imitation
    Wang, CY
    Zhang, ZH
    Yang, XT
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MECHANICAL TRANSMISSIONS, 2001, : 459 - 461
  • [35] URGE NATIONAL COMPUTER RESEARCH NETWORK
    不详
    [J]. RESEARCH-TECHNOLOGY MANAGEMENT, 1988, 31 (06) : 5 - 5
  • [36] Research the Computer Forensics Based on Network
    Hu Jingfang
    Li Busheng
    [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2282 - 2285
  • [37] Research on Computer Network Security and Protection
    Liang, Tiantian
    [J]. 2014 2ND INTERNATIONAL CONFERENCE IN HUMANITIES, SOCIAL SCIENCES AND GLOBAL BUSINESS MANAGEMENT (ISSGBM 2014), VOL 29, 2014, 29 : 244 - 247
  • [38] Computer Network Security Analysis and Research
    Cui, Limei
    [J]. PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 945 - 947
  • [39] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [40] The Reform and Research of Computer Network Courses
    Wang, Qiong
    An, Li
    Zhao, Yongmei
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (ICTCS 2018), 2018, : 8 - 11