Recommendation of important nodes in deployment optimization model of defense strategy
-
Published:2015
Issue:5
Volume:64
Page:050502
-
ISSN:1000-3290
-
Container-title:Acta Physica Sinica
-
language:
-
Short-container-title:Acta Phys. Sin.
Author:
Yang Xiong ,Huang De-Cai ,Zhang Zi-Ke , , ,
Abstract
Current network security defense strategy focuses on deploying to high degree nodes where there are mainly two aspects of the problem: One is that the high-degree nodes are not the backbone nodes for the network communication in many occasions; another is that these nodes are not always the most effective ones for forwarding and propagation information. With the disadvantage of current network defense strategy deployment, this paper tends to improve the traditional diffusion model of malicious program propagation and measure the importance of network nodes by using intermediate hops, then the important node for recommended deployment technology based on betweenness center control and closeness center control model is put forward. Experimental results show that the nodes with high betweenness centrality and low closeness centrality as compared with the high degree nodes can more effectively quarantine the spreading of the worms whether in scale-free network or in small world network. Meanwhile, the clustering behavior of a network will also play a certain negative impact on the spread of malicious programs.
Publisher
Acta Physica Sinica, Chinese Physical Society and Institute of Physics, Chinese Academy of Sciences
Subject
General Physics and Astronomy
Reference15 articles.
1. Zou C C, Towsley D, Gong W B 2007 IEEE Trans. Dependable Sec. Comput. 4 105
2. Fan X, Xiang Y 2010 Future Gener. Comput.Syst. 26 1433
3. Yan G H, Chen G L, Eidenbenz S, Li N 2011 Proceedings of the 2011 ACM Symposium on Information, Computer and Communications Security Hong Kong, China, March 22-24 2011 p196
4. Xing Q B, Zhang Y B, Liang Z N 2011 Chin. Phys. B 20 120201
5. Song Y R, Jiang G P, Gong Y W 2012 Chin. Phys. B 21 010205
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献