期刊鉴别 论文检测 免费论文 特惠期刊 学术答疑 发表流程

基于博弈论的网络服务提供商出口检测策略分析(2)

时间:2015-04-30 11:34 文章来源:http://www.lunwenbuluo.com 作者:卜俊蓉等 点击次数:

  4 结语 

  本文在文献[5]的基础上考虑计算机病毒的传播性态,研究ISP策略改变时对病毒传播以及ISP整体收益的影响。根据网络病毒的传播特性给出了一个网络病毒传播模型,并对ISP的期望收益进行量化,得到ISP与网络病毒的博弈模型。研究结果表明:在网络病毒传播过程中,ISP采取出口检测策略不仅能够使ISP对策略进行投资的相对风险降低,同时可以提高ISP整体的期望收益。研究结果可为ISP进行策略选择提供参考。 

  参考文献: 

  [1]KHOUZANI M H, SEN S, SHROFF N B. An economic analysis of regulating security investments in the Internet[C]// Proceedings of IEEE INFOCOM 2013. Piscataway: IEEE Press, 2013:818-826. 

  [2]ZHANG Y, TAN X, CUI X, et al. Network security situation awareness approach based on Markov game model[J]. Journal of Software,2011,22(3):499-502.(张勇,谭小彬,崔孝林,等.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2011,22(3):499-502.) 

  [3]ZHU J, SONG B, HUANG Q. Evolution game model of offensedefense for network security based on system security based on system dynamics[J].Journal on Communications, 2014,35(1):55-59.(朱建明,宋彪,黄启发.基于系统动力学的网络安全攻防演化博弈模型[J].通信学报,2014,35(1):55-59.) 

  [4]RELURA T C. Game theory of social distancing in response to an epidemic[J]. PLoS Computational Biology,2010,6(5):e1000793. 

  [5]KHOUZANI M H, SEN S, SHROFF N B. Managing the adoption of asymmetric bidirectional firewalls: seeding and mandating [C]// Proceedings of the 2012 IEEE Global Communications Conference. Piscataway: IEEE Press,2012:911-916. 

  [6]SONG L, HAN X. Evolution and control of computer virus[J]. Computer Engineering and Design,2011,32(7):2252-2255.(宋礼鹏,韩燮.计算机病毒的演化与控制[J].计算机工程与设计,2011,32(7):2252-2255.) 

  [7]LANG W, YANG D, LI H. Research on the SIRmodelbased data falsification attacks of wireless cognitive sensor networks in smart grids[J]. Netinfo Security,2012(1):14-16.(郎为民,杨德鹏,李虎生.基于SIR模型的智能电网WCSN数据伪造攻击研究[J].信息网络安全, 2012(1):14-16.) 

  [8]ZHOU T, HAN X, YAN X, et al. Statistical mechanics on temporal and spatial activities of human[J]. Journal of University of Electronic Science and Technology of China,2013, 42(4): 482(周涛, 韩筱璞, 闫小勇, 等. 人类行为时空特性的统计力学[J]. 电子科技大学学报, 2013, 42(4): 482.) 

  [9]SUN X, LIU Y, ZHU J, et al. Research on simulation and modeling of social network worm propagation[J]. Chinese Journal of Computers,2011,34(7):1253-1257.(孙鑫,刘衍珩,朱建启,李飞鹏.社交网络蠕虫仿真建模研究[J].计算机学报,2011,34(7):1253-1257.) 

  [10]KHOUZANI M H R, ALTMAN E, SARKAR S. Optimal quarantining of wireless malware through power control[C]// Proceedings of the 2009 IEEE Information Theory and Applications Workshop. Piscataway: IEEE Press, 2009: 301-310. 

  [11]FENICHEL E P, CASTILLOCHAVEZ C, CEDDIA M G, et al. Adaptive human behavior in epidemiological models[J]. Proceedings of the National Academy of Sciences,2011,108(15):6306-6311. 

  [12]KHOUZANI M H R, SARKAR S, ALTMAN E. Dispatch then stop: optimal dissemination of security patches in mobile wireless networks[C]// Proceedings of the 49th IEEE Conference on Decision and Control. Piscataway: IEEE Press, 2010: 2354-2359.


  •   论文部落提供核心期刊、国家级期刊、省级期刊、SCI期刊和EI期刊等咨询服务。
  •   论文部落拥有一支经验丰富、高端专业的编辑团队,可帮助您指导各领域学术文章,您只需提出详细的论文写作要求和相关资料。
  •  
  •   论文投稿客服QQ: 论文投稿2863358778 论文投稿2316118108
  •  
  •   论文投稿电话:15380085870
  •  
  •   论文投稿邮箱:lunwenbuluo@126.com

联系方式

  • 论文投稿客服QQ: 论文投稿2863358778
  • 论文投稿客服QQ: 论文投稿2316118108
  • 论文投稿电话:15380085870
  • 论文投稿邮箱:lunwenbuluo@126.com

热门排行

 
QQ在线咨询
咨询热线:
15380085870
微信号咨询:
lunwenbuluoli