Font Size: a A A

The Study Of Trust Node Interaction On The Multiple Social Network

Posted on:2017-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:S X XiongFull Text:PDF
GTID:2348330503984915Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Along with continuous development of network technology and diversification of network application, dissemination of information has become more difficult to control. Base on social network information propagation, this paper establish a trusted central node extract model in the network, and apply this model to multi-layer network transmission to make information flow more security, regularity and controlled. As for the increasingly important security problems existed in the network, the thesis is replied on the “Analysis of Information flow behavior in the Network”(No. 61373160), supported by the National Natural Science Fundation of China to establish an abstract nulti-layer network model with the network trust and an defense strategy through researching on multi-layer network behavior. The main results and contributions of this dissertation are as follows.(1) The Center node selection strategy are devisedResource supply relationship is employed to abstract and unify information flow behavior between the service modes, and establish a way to describing information resources between nodes. Base on nodes interaction behavior and state, analyzing the location relationship between network nodes, modeling the interactive system throught the adjacent nodes, resources and propagation path property, to extract the center node and establish a central node extract strategy.(2) The confidence feedback mechanism is foundedOn account of the established Central nodes of the selected policy, researching the information dissemination campaign features and summarizing information general rule. By the rule of information interaction center node trust value assignment and make the center node trust security features. Base on the dissemination of information of trust central node, according to the network security theory, node selection strategy add feedback mechanism to a trusted mechanism and analysing the change characteristics.(3) The nformation cross-layer communication model is builtBy establishing a trusted central node selection strategy, timing feedback mechanism and cross-layer propagation path algorithm, using probability analysis of information communication technology, buliding multilayer network cross-layer propagation prediction algorithm, shorten the time of transmission of information flow, improving the coverage of immunization strategies, so as to build a multi-layer network propagation prediction model.At last, the dissertation is summed up, and the direction for further research is pointed out.
Keywords/Search Tags:complex network, multi-layer network, trust security, information flow, cross-layer transmission
PDF Full Text Request
Related items