Study on Security Risk Propagation of Immune Mechanism under Complex Network Background

被引:0
|
作者
Lu Cailin [1 ]
机构
[1] Jinzhong Univ, Sch Informat Technol & Engn, Jinzhong, Shanxi, Peoples R China
关键词
complex networks; security risks; stochastic immune mechanism propagation model; acquaintance immune mechanism propagation model;
D O I
10.14257/ijsia.2016.10.9.32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The economic situation highlights the significant role of the application of computer in human society since the 21st century, especially since 2015. This thesis probes into the security risk propagation of immune mechanism under complex network background. Focusing on the issue of network security under network background, the thesis deploys the analysis by adopting the mechanism model of immune mechanism, immunizing parts of the nodes, establishing stochastic immune mechanism of security risk and introducing stochastic immune mechanism propagation model of security risk. To further study the security risk propagation of immune mechanism under complex network background, the thesis presents the model rules, introduces the security risk acquaintance immune mechanism and establishes models of acquaintances immune mechanism. Finally, attributing to the simulation experiments, the simulation results, the characteristics of security risk propagation model, and the study of stochastic immune mechanism propagation model and acquaintance immune mechanism stochastic model, the thesis reaches the conclusion that at the initial stage of propagation, the die-out rate of the security risk is inversely proportional to the propagation rate.
引用
收藏
页码:331 / 342
页数:12
相关论文
共 50 条
  • [21] Research on the Application of Computer Information Technology in Network Security under the Background of "Big Data"
    Ying, Liu
    2018 7TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2018), 2019, : 210 - 214
  • [22] A Study on the Adaptability of Immune models for Wireless Sensor Network Security
    Alaparthy, Vishwa T.
    Amouri, Amar
    Morgera, Salvatore D.
    POSTPROCEEDINGS OF THE 9TH ANNUAL INTERNATIONAL CONFERENCE ON BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA 2018), 2018, 145 : 13 - 19
  • [23] Computer Network Information System Security Prevention Methods under the Background of Big Data
    Cai, Zhongmin
    Li, Chenglong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [24] Research on the Construction of Legal System of Network Security Management under the Background of Information Age
    Yu Yueyang
    2018 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND INFORMATION TECHNOLOGY (ICEMIT 2018), 2018, : 675 - 678
  • [25] A Network Security Risk Fuzzy Clustering Assessment Model Based on Weighted Complex Network
    Zhou Jian
    Zhai Qun
    Tao Jianping
    COMPUTING AND INTELLIGENT SYSTEMS, PT III, 2011, 233 : 143 - +
  • [26] A Network Security Risk Fuzzy Clustering Assessment Model Based on Weighted Complex Network
    Jian, Zhou
    Qun, Zhai
    Tao Jianping
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 139 - 142
  • [27] Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology
    Liu, Fong-Hao
    Lee, Wei-Tsong
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2010, 13 (01): : 79 - 87
  • [28] Study on the identification and localization of corn stalk under complex background
    Zhao Jinxiang
    Sun Chuanwei
    Chang Xiaowei
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION, CYBERNETICS AND COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2017, : 290 - 294
  • [29] Study on the cascade classifier in target detection under complex background
    Gao Wen
    Tang Yang
    Zhu Ming
    ACTA PHYSICA SINICA, 2014, 63 (09)
  • [30] A modified deep neural network enables identification of foliage under complex background
    Zhu, Xiaolong
    Zuo, Junhao
    Ren, Honge
    CONNECTION SCIENCE, 2020, 32 (01) : 1 - 15