计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 280-284.doi: 10.11896/jsjkx.210500043

• 大数据&数据科学 • 上一篇    下一篇

基于网络媒体的非线性动力学信息传播模型

杜鸿毅, 杨华, 刘艳红, 杨鸿鹏   

  1. 山西农业大学信息科学与工程学院 山西 晋中 030801
  • 出版日期:2022-06-10 发布日期:2022-06-08
  • 通讯作者: 杨华(yanghua@sxau.edu.cn)
  • 作者简介:(1450385199@qq.com)
  • 基金资助:
    国家自然科学基金(31671571)

Nonlinear Dynamics Information Dissemination Model Based on Network Media

DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng   

  1. College of Information Science and Engineering,Shanxi Agricultural University,Jinzhong,Shanxi 030801,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:DU Hong-yi,born in 1995,postgra-duate.His main research interests include greenhouse environmental control and security of computer network.
    YANG Hua,born in 1974,Ph.D,professor.His main research interests include network security,computer control and control and filtering of nonlinear stochastic systems.
  • Supported by:
    National Natural Science Foundation of China(31671571).

摘要: 针对目前已有网络信息传播模型都假设信息网络中所有已感染节点都会感染易感染节点,不能客观地反映信息传播具有时效性的问题,文中基于平均场理论,从信息传播的宏观角度出发,提出了一个新的网络媒体信息传播动力学模型。根据网络信息传播的实际情况,所提模型假设只有新感染的节点才会感染信息网络中易感染节点,而且易感染节点有两种途径变为已感染节点,一种是社交网络中已感染节点的传播,另一种是用户随机浏览。进一步地,基于图论理论将模型中节点的状态及其转换关系抽象为加权有向图,并且基于贝叶斯定理,将节点间的状态转换表示为概率事件,给出了事件发生的概率表达式,进而确定了状态转化关系矩阵。最后,运用高斯-赛德尔迭代法对模型进行数值求解,数值仿真结果表明,在线媒体信息传播具有时效性,热点事件会在一天之内达到传播高峰,之后传播范围迅速下降。紧接着,运用百度指数热点事件的统计数据对模型进行有效性验证,结果表明,所提模型比传统模型能更准确地反映网络信息的扩散趋势。

关键词: 动力学模型, 动态隔离, 网络安全, 网络病毒传播

Abstract: Existing network information propagation models that suppose all infected nodes are capable of infecting susceptible nodes,it cannot reflect objectively the fact that information propagation is time-efficient.For this problem,based on mean field theory,from the macro perspective of information dissemination,a novel dynamical model of network media information dissemination is proposed in this paper.According to real situation,the model assumes that only newly infected nodes will infect susceptible nodes in the social network,and there are two ways for susceptible nodes to become infected nodes,one is the spread of infection in social networks,the other is random browsing.Furthermore,based on graph theory,the states of nodes in the model and their transition relations are abstracted as weighted directed graphs.Based on Bayes' theorem,the state transitions between nodes are expressed as probability events,and the probability expression of event occurrence is given.Then the state transformation relationship matrix is determined.Finally,the model is solved using Gauss-Seidel iterative method.Numerical simulation results show that the dissemination of online media information is time-sensitive.Hot events will reach a peak of diffusion in a day,and then the range of diffusion will decline rapidly.Then the statistical data of the hot event from Baidu index is used to verify the validity of the model.The results show that the proposed model can reflect the spreading trend of network information more accurately than existing models.

Key words: Dynamic quarantine, Dynamical model, Network security, Network virus propagation

中图分类号: 

  • TP309
[1] ARNABOLDI V,CONTI M,PASSARELLA A,et al.On line social networks and information diffusion:the role of ego networks[J].Online Social Networks & Media,2017,1(6):44-55.
[2] JIN L,CHEN Y,WANG T,et al.Understanding user behavior in online social networks:A survey[J].IEEE Communications Magazine,2013,51(9):144-150.
[3] LI Y M,SHIU Y L.A diffusion mechanism for social advertising over microblogs[J].Decision Support Systems,2012,54:9-22.
[4] ZHOU D H,HAN W B.DiffRank:A Novel Algorithm for Information Diffusion Detection in Social Networks[J].Chinese Journal of Computers,2014,37(4):884-893.
[5] LIU X Y,HE D B.Research on of Competitive Nonlinear Dynamic Information Diffusion Modeling in Online Social Network[J].Chinese Journal of Computers,2019,42(9):1-20.
[6] SANG C Y,LI T,TIAN S.SFTRD:A novel ingormation propagation model in heterogeneous networks:Modeling and restraining strategy[J].Physica A,2019,524:475-490.
[7] CHIASSERINI C F,GARETTO M,LEONARDI E.Social network de-anonymization under scale-free user relations[J].IEEE/ACM Transactions on Networking,2016,24(6):3756-3769.
[8] KO H,LEE J,PACK S.An opportunistic push scheme for online social networking services in heterogeneous wireless networks[J].IEEE Transactions on Network & Service Management,2017,14(2):416-428.
[9] MA Z E,ZHOU Y C.Mathematical modelling and study on infectious disease dynamics [M].Beijing:Science Press,2004:3-10.
[10] LIU D,YIN Y W,SONG M.Microblog Information Diffusion:Simulation Based on SIR Model[J].Journal of Beijing Univer-sity of Posts and Telecommunications(Social Sciences Edition),2014,16(3):28-33.
[11] WAN Y H,WANG X C.Rumor spreading model with conformity effect[J].Journal of Computer Applications,2016,36(9):2381-2385.
[12] HU X,LI W G,HU Q,et al.SIRS Model and Stability Based on Open Cyber Ecosystem[C]//2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Disco-very.2018.
[13] PIQUEIRA J R C,ARAUJO V O A.Modified epidemiological model for computer viruses[J].Applied Mathematics and Computation,2009,213:355-360.
[14] ZHENG Z R,GUO F,WANG Z F,et al.Study on Microblog Propagation Model Based on Aanlysis of User Behavior[J].Computer Science,2016,43(12):41-46.
[15] CHEN K Y.Empirical analysis of novel coronavirus outbreak based on SEIR model[J].Statistics and Management,2020,35(6):31-38.
[16] YUAN H,CHEN G Q.Network virus-epidemic model with the point-to-group information propagation[J].Applied Mathema-tics and Computation,2008,206:357-367.
[17] SONG L P,ZHANG R P.Dynamical analysis for a malwarepropagation model in wireless sensor network[J].Journal of Measurement of Science and Instrumentation,2016,7(2):136-144.
[18] ZHU G H,JIANG G P,XIA L L.Rumor spreading model considering conformity phenomena in complex social networks[J].Computer Science,2016,43(2):135-139.
[19] CUI Z L,QIAN X D.Research on optimization of blockchain social Network Information Transmission Model[J].Computer Engineering and Applications,2021,57(7):59-69.
[1] 柳杰灵, 凌晓波, 张蕾, 王博, 王之梁, 李子木, 张辉, 杨家海, 吴程楠.
基于战术关联的网络安全风险评估框架
Network Security Risk Assessment Framework Based on Tactical Correlation
计算机科学, 2022, 49(9): 306-311. https://doi.org/10.11896/jsjkx.210600171
[2] 王磊, 李晓宇.
基于随机洋葱路由的LBS移动隐私保护方案
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
计算机科学, 2022, 49(9): 347-354. https://doi.org/10.11896/jsjkx.210800077
[3] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
[4] 吕鹏鹏, 王少影, 周文芳, 连阳阳, 高丽芳.
基于进化神经网络的电力信息网安全态势量化方法
Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network
计算机科学, 2022, 49(6A): 588-593. https://doi.org/10.11896/jsjkx.210200151
[5] 邓凯, 杨频, 李益洲, 杨星, 曾凡瑞, 张振毓.
一种可快速迁移的领域知识图谱构建方法
Fast and Transmissible Domain Knowledge Graph Construction Method
计算机科学, 2022, 49(6A): 100-108. https://doi.org/10.11896/jsjkx.210900018
[6] 陶礼靖, 邱菡, 朱俊虎, 李航天.
面向网络安全训练评估的受训者行为描述模型
Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment
计算机科学, 2022, 49(6A): 480-484. https://doi.org/10.11896/jsjkx.210800048
[7] 张师鹏, 李永忠.
基于降噪自编码器和三支决策的入侵检测方法
Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions
计算机科学, 2021, 48(9): 345-351. https://doi.org/10.11896/jsjkx.200500059
[8] 周仕承, 刘京菊, 钟晓峰, 卢灿举.
基于深度强化学习的智能化渗透测试路径发现
Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning
计算机科学, 2021, 48(7): 40-46. https://doi.org/10.11896/jsjkx.210400057
[9] 李贝贝, 宋佳芮, 杜卿芸, 何俊江.
DRL-IDS:基于深度强化学习的工业物联网入侵检测系统
DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things
计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021
[10] 陈海彪, 黄声勇, 蔡洁锐.
一个基于智能电网的跨层路由的信任评估协议
Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid
计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169
[11] 王金恒, 单志龙, 谭汉松, 王煜林.
基于遗传优化PNN神经网络的网络安全态势评估
Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network
计算机科学, 2021, 48(6): 338-342. https://doi.org/10.11896/jsjkx.201200239
[12] 张凯, 刘京菊.
基于吸收Markov链的网络入侵路径分析方法
Attack Path Analysis Method Based on Absorbing Markov Chain
计算机科学, 2021, 48(5): 294-300. https://doi.org/10.11896/jsjkx.200700108
[13] 陈明豪, 祝跃飞, 芦斌, 翟懿, 李玎.
基于Attention-CNN的加密流量应用类型识别
Classification of Application Type of Encrypted Traffic Based on Attention-CNN
计算机科学, 2021, 48(4): 325-332. https://doi.org/10.11896/jsjkx.200900155
[14] 刘全明, 李尹楠, 郭婷, 李岩纬.
基于Borderline-SMOTE和双Attention的入侵检测方法
Intrusion Detection Method Based on Borderline-SMOTE and Double Attention
计算机科学, 2021, 48(3): 327-332. https://doi.org/10.11896/jsjkx.200600025
[15] 蒋建峰, 孙金霞, 尤澜涛.
基于粒子群优化算法的无线传感网络安全分簇策略
Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network
计算机科学, 2021, 48(11A): 452-455. https://doi.org/10.11896/jsjkx.210900131
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!