- 2
- 0
- 约9.27万字
- 约 108页
- 2019-05-03 发布于上海
- 举报
IV
IV
Abstract
With the applying of the information technology, tremendous changes have taken place in the ways of human working, living and thinking.It helps to advance the development of human society and civilization, leads people into a new era - the information age.People enjoy the enormous benefits of information resources also need to face a severe test of information security has brought. The task of information security is to protect the information resources from accidental or unauthorized disclosure, modification and destruction.
Computer Viruses have become a serious threat to computer systems and computer networks already. The propagation methods of computer viruses show a trend of diversification and complication. In order to grasp the law of the computer viruses spreading, stop the propagation of viruses, achieve the rational allocation of resources against the threat of computer viruses and more accurate judge of virus program, researches have been done in following aspects:
A computer virus propagation model is proposed to describe those viruses spreading through the P2P file-sharing network. This model takes the files in the network as subjects instead of the computers, which always been used in the traditional models. It introduces the notion of hot degree of file accessing and file-type suitability degree over the sharing files to illustrate the virus propagation more specifically. Valuable conclusions have been gained from the model. And the simulation data of this model accords with the actual statistical data very well.
The rapid development of the computer networks also brings out a great number of network viruses. The advantages of the computer networks including connectivity and collaboration should be make full use in the fighting against network viruses. But
PAGE
PAGE VI
the existing isolation methods mainly focusing on protecting the specific sub-network do not full fill the taskes of preventing the web-wide network viruses. The netwo
您可能关注的文档
- 计算机图形艺术在油画创作中的运用-美术(油画)专业论文.docx
- 脊柱结核与化脓性脊柱炎CT鉴别诊断-影像医学与核医学专业论文.docx
- 环境在线监测技术在炼化企业的研究与应用-化学工程专业论文.docx
- 脊柱平衡参数与成人脊柱侧凸患者临床症状及生存质量的相关性分析-外科学(骨外)专业论文.docx
- 黄河三角洲地区民歌探究-音乐学专业论文.docx
- 环氧氯丙烷改性PAMAM的制备及其在染整中的应用-纺织化学与染整工程专业论文.docx
- 鸡ANXA2基因在卵泡发育中的表达及调控研究-生物学专业论文.docx
- 集成器件的高功率微波效应研究与相应防护集成电路系统设计专业论文.docx
- 级联型多电平逆变器控制策略的研究-电气工程专业论文.docx
- 积分方程(组)的蒙特卡罗求解方法-金融数学与金融工程专业论文.docx
- 黄斑蓝子鱼高效低成本海藻饲料的研究-海洋生物学专业论文.docx
- 火电能量系统投资技术经济分析方法研究-动力工程专业论文.docx
- 计算机性能计数器监控设计与实现-软件工程专业论文.docx
- 黄山杜鹃地理分布模拟及I SSR遗传多样性研究-园林植物与观赏园艺专业论文.docx
- 计算机辅助男西装纸样参数化设计的方法-软件工程专业论文.docx
- 火电机组无除氧器热力系统的分析计算-热能工程专业论文.docx
- 鲫鱼货架期预测模型的研究食品科学与工程;食品科学专业论文.docx
- 环形栅器件建模分析-物理电子学专业论文.docx
- 脊髓小脑性共济失调3型一家系的临床及电生理特征分析-神经病学专业论文.docx
- 继电保护综合测试系统软件平台开发-水利水电工程专业论文.docx
原创力文档

文档评论(0)