It can be seen from the Fig. 10 that the latency
of the system μ It will play a certain role in the
occurrence and spread of the disease. With the
extension of the incubation period and the large-scale
spread of the virus, the speed of its spread will
gradually accelerate. Over time, the number of the
largest infected nodules decreased, meaning that its
transmission range became smaller. Therefore, when
a network virus is infected, it will attack immediately,
without continuous waiting or lasting too long. Then,
it will be detected early, thus reducing the damage to
the system. Based on the results in FIG. 10, the
comparison records of detection results of several
common methods are shown in Table 2:
Table 2: Calculation results of model operation efficiency
Experimen
tal sample
data (PCs.)
This
method
(%)
Based on
artificial
immune
method (%)
Based on
data mining
method (%)
Machine
learning
based
method
(%)
100 99 91 88 87
200 99 90 86 85
300 98 90 87 83
300 98 90 88 85
400 99 89 85 83
500 97 88 84 81
600 97 89 85 82
700 97 87 84 82
800 97 89 85 81
900 98 88 83 81
1000 98 87 83 81
Average
value (%)
97.9 88.9 85.2 82.6
It can be seen from the table that the algorithm
is used to detect the virus intrusion propagation path
in multi hop cellular network, and the detection rate
reaches 97.9%; The artificial immune method is used
to identify the intrusion path of multi hop cellular
hybrid network, and the accuracy of identification is
88.9%; By using data mining technology, the virus
intrusion path of multi hop cellular hybrid network is
detected, and the recognition accuracy reaches
85.2%; The comparison with the above methods
shows that this method has a good recognition effect,
can detect the intrusion of virus and ensure the
security of the network.
4 CONCLUSIONS
In this paper, we study the repeated cases in the
process of network virus propagation, and use the
original network attack to express the transition rate
between various states, so as to obtain a new multi
hop cellular network virus propagation detection
model. From the simulation results, this model can
well reflect the spread of the virus, so as to ensure the
security of network operation.
ACKNOWLEDGEMENTS
This work is sponsored by: (1) the team for science
&technology and local development service of
Nantong Institute of Technology under Grant No.
KJCXTD312; (2) the science and technology
planning project of Nantong City under Grant
No.JCZ20172,JCZ20151,JCZ20141,JCZ21084,JCZ
21025,JCZ21033; (3)the second batch of industry
university cooperation collaborative education
projects of the Ministry of education in 2021 under
Grant No.202102594016.
REFERENCES
LIAN Jing, FANG Siyu, ZHOU Ya-u. (2020). Model
Predictive Control of the Fuel Cell Cathode System
Based on State Quantity Estimation. Computer
Simulation, 37(07):119-122.
Wang H, Li W. (2021). DDosTC: A transformer-based
network attack detection hybrid mechanism in SDN.
Sensors, 21(15): 5047.
Oliveira N, Praça I, Maia E, Sousa O. (2021). Intelligent
cyber attack detection and classification for network-
based intrusion detection systems. Applied Sciences,
11(4): 1674.
DU Chunhui. (2020). Optimization design of video
monitoring system on fully-mechanized mining face.
Industry and Mine Automation,46(8):94-100.
Ren H, Deng J, Xie X. (2022). Grnn: generative regression
neural network — a data leakage attack for federated
learning. ACM Transactions on Intelligent Systems and
Technology (TIST), 13(4): 1-24.
Kong X, Ge Z. (2021). Adversarial Attacks on Neural-
Network-Based Soft Sensors: Directly Attack Output.
IEEE Transactions on Industrial Informatics, 18(4):
2443-2451.
Zaripova D A.(2021). Network security issues and effective
protection against network attacks. International
Journal on Integrated Education, 4(2): 79-85.
Do Xuan C, Dao M H.(2021). A novel approach for APT
attack detection based on combined deep learning
model. Neural Computing and Applications,33(20):
13251-13264.
HU Liwei, FAN Zijian, ZHANG Suhang, et al.(2021). Risk
Propagation Mechanism and Application of Urban
Traffic Congestion Factors Based on Complex
Networks. Journal of Transportation Systems