Font Size: a A A

Research On Optimization Algorithm Of Computer Virus Propagation Model Based On Network Attack

Posted on:2018-03-11Degree:MasterType:Thesis
Country:ChinaCandidate:H Y PeiFull Text:PDF
GTID:2358330515499249Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of computer technology and the increasing popularity of the Internet,our study,daily life and work are highly dependent on computer and the Internet.But the several outbreak of computer viruses bring us,the consequences of disaster.So how to control the spread of computer viruses has become a common concern for society and academic circles.The rapid development of anti virus software and firewall technology are powerful to fight the spread of computer virus.The main contents of this paper are summarized as follows:1,the first part is the introduction,mainly introduces the research background,research purpose and significance,domestic and foreign research status,developmenttrends,as well as some of the contents of this article.2,the preparation of knowledge.Introduces the main mathematical knowledge used in this paper,this chapter introduces the concept of computer virus propagation model used in power system and some theorems,introduces the dynamic system of three tuple,balance and so on;to explain what is globally asymptotically stable,introduced by constructing a Lyapunov function to prove the global asymptotic stability of the equilibrium point is.3,the third chapter with delay for a kind of improved algorithm,the appropriate objective function,is the most infected computer,and the whole process is the minimum budget,using the gradient descent method,calculate the objective function for the gradient formula of position variables,and the attacking effect maximization is studied.The number of computers in each state is studied in the case of artificial control of computer virus spreading and no control of computer virus transmission.4,In the third chapter,the fourth chapter is based on the 4 chapter,we consider the cost as a function of time variation,and study the effect of the attack.5,summary and outlook.
Keywords/Search Tags:Time-delay, Computer virus, optimum control, network attack
PDF Full Text Request
Related items