• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    2024-05-25 14:39:28QiangFuJunWangChangfuSiandJiaweiLiu
    Computers Materials&Continua 2024年4期

    Qiang Fu ,Jun Wang,? ,Changfu Si and Jiawei Liu

    1College of Computer Science and Technology,Shenyang University of Chemical Technology,Shenyang,110142,China

    2College of Computer Science and Engineering,Northeastern University,Shenyang,110169,China

    ABSTRACT As industrialization and informatization become more deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Based on this model,the role of key nodes in the spread of malware is studied,a comparison experiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In other words,selective immunity to key nodes can effectively suppress the spread of malware and maintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.

    KEYWORDS Key nodes;dynamic model;industrial control network;simulation

    Nomenclature

    1 Introduction

    1.1 Motivation

    In the past decade,the number of industrial control security incidents has been increasing.In 2010,the Stuxnet worm targeted the Bushehr nuclear power plant in Iran [1].Since then,there have been many malware targeting Industrial Control System(ICS)networks,such as Night Dragon[2],Flame[3],Duqu/Duqu2.0[4],Blaster[5],and BlackEnergy[6].The typical Programmable Logic Controller(PLC)worm Blaster can only exist in PLC,and it has the potential to propagate via Siemens SIMATIC S7-1200’s control system.PLC Blaster can scan the ICS networks to find new targets,then it will attack PLCs and replicate in the infected PLCs.Some new types of malware can spread not only in Personal Computer(PC)networks but also in industrial control networks.In 2012,Russian security experts discovered the Flame virus spreading widely in the energy industry in the Middle East[7].In 2016,the Mirai botnet attack occurred,and in 2020[8],Israel’s water supply system was invaded by malware[9].Malware plays an important role in frequent industrial control security incidents,posing a huge threat to the security of industrial infrastructure.The industrial control network is generally composed of industrial control equipment with different characteristics,and it is often coupled and connected with other networks to form a complex network.Therefore,establishing a propagation model to describe the propagation behavior of malware in industrial control networks and proposing effective containment strategies have become an urgent problem that needs to be solved.

    At present,the vulnerabilities are used to spread the PLC worm in Supervisory Control and Data Acquisition(SCADA).Fovino et al.used the MalSim simulator to conduct similar attack experiments and achieved obvious attack effects [10].It is evident that defending against this malware variant poses greater challenges,and its potential for harm is considerably more severe.Some malware can spread across the network through the interaction of the subnets.Therefore,a coupled network can better describe the actual propagation behavior of malware.The industrial control coupled network is composed of two layers of subnets,and the network topology is shown in Fig.1.The upper subnet is a PC network composed of PCs and servers(the blue nodes),and the lower subnet is an ICS network composed of industrial control equipment (the purple nodes) such as SCADA,Object Linking and Embedding (OLE),OLE for Process Control (OPC),Human Machine Interface (HMI),and PLC.Different nodes in the network have different degrees,and a server host in the upper network will be connected to many PC hosts.Similarly,in the lower ICS network,the SCADA control center will collect data from a lot of PLCs for analysis and monitoring.The PLCs may be distributed in different sites,which means that SCADA will have a connection relationship with many PLCs.When the industrial controller communicates with equipment,it must pass through the OPC server,so the OPC server will also have a connection relationship with many industrial control equipment.An HMI is often connected to many industrial control equipment such as PLCs and displays the operating status of these PLCs.The general layout of an ICS has been summarized by Kheddar et al.,as it is shown in Fig.2[11].In other words,for an industrial control coupled network,the characteristics of different nodes are different.Certain nodes exhibit a high degree,whereas others possess a low degree.

    Figure 1: Topology of industrial control coupled network

    1.2 Related Works

    The amount of connected edges of different nodes in the network is different,such as the red nodes in Fig.1 are connected to more edges.Different hosts in the PC network have different degrees,and the Server will connect to a large number of hosts.For the industrial control equipment in the ICS network,SCADA will control the operation of many PLCs,and OPC and HMI will have a connection relationship with many PLCs.These characteristics make the coupled network look like a complex network.Some researchers have studied the attributes of pivotal nodes within intricate networks[12–14].This research considers the differences in the characteristics of nodes in the coupled network,group the nodes with degrees,and define some of the nodes with the highest degree as the key nodes.That is to say,when the malware spreads in the coupled network,the ability of different nodes to spread the malware is different.For example,in Fig.3,both node A and node B are infected,and the other nodes are susceptible.Node A is connected to seven susceptible nodes,and node B is connected to three susceptible nodes.Node A has a greater impact on malware propagation than node B.This research will discuss the effect of the key nodes on malware propagation in detail in Section 5.

    To study the effect of the key nodes on the malware dynamics in the industrial control coupled network,a dynamic model is proposed in the coupled network.The epidemic model is a method of quantitative research on the spread of infectious diseases because the spread of malware is very similar to the spread of infectious diseases[15],the epidemic model is used to study the propagation of malware.In the complex network,Rey et al.propose a malware propagation model based on random complex networks and cellular automata [16].Hosseini et al.establish a theoretical model for the spread of malware on scale-free networks and propose an ABM version of the model [17].Yuan simulate the propagation of worms in complex industrial networks based on the NS2 simulation system [18].Viswalingam et al.perform a new analysis of the SIR model in a two-layer coupled network [19].Dickison et al.study the SIR model in a two-layer coupled network and find that if the two subnets are strongly coupled,the malware can spread throughout the network,and if the network is weakly coupled,then the malware will only exist in one subnet[20].Masood et al.describe the characteristics of Stuxnet,and they investigate the spread of the virus in the regime of isolated industrial networks[21].Based on the difference between an intelligent device’s dissemination capacity and discriminant ability,Li et al.propose a dynamic malware propagation model in cyber physics systems [22].Shen et al.propose a two-layer malware model based on a hybrid patches distribution method [23].Based on an epidemic theory’s analysis framework and individual-group game theory,Wu et al.propose a virus spread model (STSIR) [24].Shen et al.present evolutionary privacy preservation learning strategies for an edge computing-based Internet of Things (IoT) data sharing scheme[25].Yu et al.propose an open-set solution called DC-IDS for Industrial Internet of Things(IIoT)based on deep reinforcement learning,and Deep Q-Network(DQN)is employed[26].Similarly,Shen et al.propose a heuristic learning intrusion detection system with DQN for edge-based Social Internet of Things (SIoT) networks [27],in addition,they propose a privacy-preservation signaling game for edge-computing-based IoT networks[28].The above studies provide an effective reference for getting deeper insights into the propagation of malware in the coupled network.However,most studies did not take into account the differences in characteristics between different nodes in the network.

    Figure 2: General layout of an ICS[11]

    1.3 Contribution

    Building upon the aforementioned studies,a dynamic model is proposed in the industrial control network.The model includes a malware containment strategy that integrates detection,quarantine,and monitoring.On this basis,the role of key nodes in malware propagation is studied.By conducting comparative experiments on key nodes,it is concluded that infecting key nodes can significantly accelerate the speed of malware propagation.Therefore,immunizing key nodes is a more effective containment strategy.Based on detection,quarantine,and monitoring,selective immunity to key nodes can effectively suppress the spread of malware and maintain the stability of industrial control systems.The paper is organized as follows:Section 1 is the introduction;Section 2 is model formulation which describes how the model is proposed;Section 3 is the dynamics of the model,in this section,the basic reproduction number is obtained,and the dynamics of the model is analyzed;Section 4 shows the results of the simulation experiments;Section 5 shows the role of key nodes in malware propagation;Section 6 is Conclusion.

    Figure 3: The key nodes in the network

    2 Model Formulation

    To analyze the effect of the key nodes,an epidemic model within a coupled is proposed in a coupled network that combines both PC and ICS networks.It is assumed that the industrial control equipment(PLC,SCADA,OPC,and HMI) and in the coupled network,the proposed model considers PCs as the nodes,where the links depict communication connections between these nodes.The network size remains constant,and the nodes are categorized into two groups: PCs and industrial control equipment,with their respective network sizes beingNUandNL.

    2.1 Intrusion Detection System

    In the proposed model,an Intrusion Detection System(IDS)is used as a containment strategy.Different from passive defense methods,an IDS can actively discover abnormal intrusion behaviors in the network and give warnings,and it has been widely used in network security.With the development of intrusion detection technology,many different intrusion detection methods have emerged,which can be roughly divided into two categories: Misused intrusion detection and anomaly intrusion detection.

    Misused detection is also called feature-based intrusion detection[29].This method maintains a signature database that describes various known intrusions.It will extract the feature value of the data to be detected,and match the extracted feature value with the signature database.If the matching is successful,it is determined that an intrusion has occurred,otherwise,it is considered that no attack event has occurred.The advantage of this detection method is high detection accuracy,but it cannot detect unknown worm attacks.Anomaly detection is also called behavior-based intrusion detection.It uses the idea of contradiction.This method does not depend on a specific system,it can be flexibly adjusted according to the actual situation,and it can detect worm attacks that have never occurred before.However,this behavior also has deficiencies.It is easy to define normal network activities as intrusions,which means that there is a false alarm.

    Considering the effects of the intrusion detection methods,the dual intrusion detection method is used to detect worm attacks in the network.For the host in the PC network,anomaly intrusion detection is first used.If no abnormal behavior is found,it is considered that the host is not infected by the worm.If abnormal behavior is found,a second detection is performed.During the second detection,the frequency of abnormal behaviors is recorded.When the frequency is greater than the specified threshold,it is considered that worm attacks have occurred.For the industrial control equipment in the ICS network,the proposed model adopts anomaly intrusion detection to detect the traffic at first.If no abnormal behavior is found,it is considered that the industrial control equipment is not infected by the worm.If abnormal behavior is found,then it checks the operating status of the industrial control equipment.If the relevant value of the operating status of the equipment is within the legal range,it is considered that no attack event has occurred.Otherwise,it is determined that the device has been infected by malware.Thus the proposed model can ensure the normal operation of industrial control equipment to the greatest extent,and effectively detect malware attacks.

    2.2 Containment Strategy

    To suppress the spread of the malware,the general approach is to identify the hosts and industrial control equipment that have been infected,and then immunize the infected hosts and equipment.However,with the continuous increase of network bandwidth and the improvement of hacker technology,the spread of malware is getting faster and faster.A malware suppression strategy is proposed that integrates detection,quarantine,and monitoring to limit the spread of malware in ICS coupled network.

    Based on the IDS,the hosts and industrial control equipment infected by the worm can be discovered.For the hosts in the PC network,when the infected hosts are detected,they will be immediately quarantined from the network by powering off,which can effectively prevent it from continuing to infect other hosts.At the same time,it provides advanced protection for hosts in a susceptible state.When the hosts are quarantined,immediately patch it and install anti-virus software to make it immune.

    For the industrial control equipment,quarantine may cause a shutdown,which in turn affects the normal operation of the industrial production process.So the model filters the port traffic of industrial control equipment by a whitelist,which produces a similar quarantine effect.The specific method is to set up a whitelist for the industrial control equipment when the IDS finds that the port of the industrial control equipment generates abnormal traffic and determines that it is infected.The whitelist is set with strict filtering rules,and the generation rules are extracted from the historical traffic of the industrial control equipment.The rules only allow the normal part of the traffic in the industrial production process to pass,and filter out all other traffic.Although it will cause part of the normal traffic to be blocked and filtered,it effectively prevents the spread of malware in the industrial control network,and it can ensure the normal progress of the industrial production process,then the industrial control equipment will be patched to make them immune.

    2.3 Intrusion Detection System

    Based on the proposed malware containment strategy,the SIQMR model is proposed to analyze the dynamic of malware.Within the PC network,the proposed model categorizes PCs into four compartments based on their conditions during malware attacks:susceptiblestate (SU,vulnerable PCs),infectedstate (IU,infected PCs),quarantinedstate (QU,quarantined PCs),andrecoveredstate(RU,recovered PCs).During each time step the susceptible PCs can become infected by other PCs at a rateβ11and industrial control equipment at a rateβ21,respectively.Susceptible and infected PCs can achieve recovery by employing anti-malware software or applying patches,with ratesμand?1,respectively.The probability to be recovered isγ1.Occasionally,the applied patches may be temporary and could result in a loss of function.In such cases,the previously recovered PCs might transition back to susceptible status at a rateη1.

    In the ICS network,the equipment can be segregated into four compartments based on their states:susceptiblestate (SL,susceptible industrial control equipment),infectedstate (IL,infected industrial control equipment),monitoringstate (ML,monitoring industrial control equipment),andrecoveredstate(RL,recovered industrial control equipment).The susceptible PLCs can be infected by the infected PCs and industrial control equipment at a rateβ12andβ22,respectively.When it is found that the industrial control equipment is infected,the port of the industrial control equipment is monitored through a whitelist,and the traffic is strictly filtered.The probability to be monitored and recovered are?2andγ2,respectively.The recovered industrial control equipment may change to be susceptible at a rateη2.

    The model is assumed into a heterogeneous coupled network,the node degree distribution follows a power law(P(k)=k-γ),the joint degree distribution isPU(i,j)andPL(k,l),and the marginal degree distributions arePU(i,j)=andPL(i,j)=.At timet,the count of common nodes and honeypots within the network with a degree ofkis:

    Then the following equations can be found:

    The assumption here is that node connectivity is independent,and the probability for susceptible PCs to interact with infected PCs is:

    and the probability of communicating with infected industrial control equipment is:

    Similarly,the probability for susceptible industrial control equipment to communicate with infected industrial control equipment is:

    and the probability of communicating with infected PCs is:

    According to the previously established transition relationships and formulations,the diagram depicting the states of nodes in the two-layer connected network is presented in Fig.4,and the model can be expressed as the model (8).In the proposed model,the total number of PCs and industrial control equipment remains constant.The symbols utilized in the model are detailed in the nomenclature.

    Figure 4: The transition diagram

    3 Equations and Mathematical Expressions

    In this section,the dynamic behaviors of model (8) are analyzed,and two important equilibria are identified:The disease-free equilibrium and the endemic equilibrium,which can indicate malware remains in epidemics or become extinct.This research then proceed to assess the local and global stability of these equilibria using the basic reproduction number,denoted asR0.

    3.1 Disease-Free Equilibrium

    The model Eq.(8)is set to be zero with(t)=0 for alliandj,and(t)=0 for allkandl.Then it has Θ11(t)=Θ12(t)=Θ21(t)=Θ22(t)=0,and

    3.2 Endemic Equilibrium

    The independence in the joint degree distributions is assumed as:

    Fis the rate of new occurring infections andVis the rate of transferring individuals out of the original group,Γis a complex matrix.The matrix(12)can be simplified to:

    Due to the independence of joint degree distributions in the model,matrix (13) can undergo further simplification to:

    then it can get the characteristic equation,

    The eigenvalues of the matrix are:

    Theorem.1If the basic reproduction numberR0<1,the disease-free equilibriumE0is local asymptotically stable;ifR0>1,E0is unstable.

    Proof.For a constant differential autonomous system,

    4 Simulation Experiments

    To test the efficacy of critical nodes and containment strategies,this research performs simulation experiments to simulate the malware propagation process within the industrial control network.In a discrete-time framework,simulation experiments are executed to collect a dataset representing the number of PCs (ICS equipment) in each state within the network,and the experimental results are drawn using MATLAB.

    The experiments are divided into three parts:Disease-free equilibrium,endemic equilibrium,and the effectiveness of key nodes.The coupled network is assumed to exhibit a scale-free structure,with node degrees following a power-low distribution.The power-law index is setγ=3.

    4.1 Disease-Free Equilibrium

    Fig.5 shows the trend of the number of infected hosts in the PC network,and the parameters for the disease-free equilibrium are listed in Table 1.In the initial phase of the simulation,due to the rapid spread of the malware,the number of infected hosts increases rapidly and reaches a peak att=21.Afterwards,the count of infected hosts quickly begins to decline due to the containment strategy,and finally,the number decreases to zero.When the PC network reaches a disease-free equilibrium,there are no infected hosts,that is,the malware is eliminated.The number of recovered hosts in the network accounts for about 80%,indicating that the hosts in the network have been immunized in a wide range.

    Table 1: Parameters for the disease-free equilibrium

    Figure 5: The propagation of PCs(disease-free equilibrium)

    Next,an experimental analysis of the malware propagation is conducted in the ICS network.In Fig.6,it is shown the propagation trend of the infected industrial control equipment.The number of monitored and recovered industrial control equipment increased and then decreased,and finally,the number became zero.The number of susceptible industrial control equipment reaches the minimum value of 800 att=40,then it starts to increase slowly.Finally,all industrial control equipment in the network is in a susceptible state.From the experimental results of the ICS network,it can be concluded that when the system is finally at a disease-free equilibrium,there is only susceptible industrial control equipment in the network.

    Figure 6: The propagation of industrial control equipment(disease-free equilibrium)

    4.2 Endemic Equilibrium

    The parameters corresponding to the endemic equilibrium are presented in Table 2.Fig.7 shows the curves of PC hosts in the PC network.In the beginning,a large number of susceptible PC hosts are infected,leading to a rapid rise in the number of infected hosts,reaching a peak aroundt=20.Afterward,due to the containment strategy,the infected PC hosts are monitored and then recovered.The number of infected PC hosts began to decrease and eventually became stable.When the system reaches a diseased equilibrium state,only 15%of the PC hosts are infected,and the number of recovered hosts accounts for 40%.The experimental results prove that the containment strategy effectively can limit the spread of malware in the network.

    Table 2: Parameters for the endemic equilibrium of the SIQMR model

    Fig.8 shows the propagation of the industrial control equipment in the ICS network.In the beginning,the susceptible industrial control equipment is quickly infected,the number increases rapidly and reaches a peak soon.Subsequently,the number of monitored and recovered industrial control equipment gradually increases,and the number of infected industrial control equipment begins to decrease.Finally,the industrial control equipment reaches a stable state.The figure illustrates that after the system is stabilized to an endemic equilibrium state,22%of the industrial control equipment is infected,while the proportion of monitored and recovered equipment is 35%and 30%,respectively.The simulation experiments have proved that the SIQMR model has a noteworthy inhibitory effect on the spread of malware in the industrial control network.

    Figure 7: The propagation of PCs(endemic equilibrium)

    Figure 8: The propagation of industrial control equipment(endemic equilibrium)

    4.3 Comparisons of Relevant Parameters

    To examine the impact of the parameters on malware propagation,some parameter comparative experiments are conducted on these parameters.Fig.9 shows the influence ofβ11andβ21on the speed of malware propagation.It can be seen from Fig.9 that whenβ21remains unchanged andβ11increases to three times the original,the number of infected hosts has increased significantly.Whenβ11remains unchanged andβ21is increased by three times,although the number of infected hosts will also increase,the increase is relatively small.It can be concluded that when the malware spreads in the industrial control coupled network,the influence of the infection rate(β11)within the subnet is greater than the infection rate(β21)which crosses the subnet.

    Fig.10 shows the influence of the quarantine rate?1of infected PCs (in the PC network) of infected PCs on malware propagation.In Fig.10a,it is apparent that the greater the quarantine rate?1of infected PCs,the smaller the number of infected PCs.It shows that improving the intrusion detection efficiency and timely isolating the infected PCs from the network can effectively suppress the propagation of malware.However,in Fig.10b,the quarantine rate?1of infected PCs has little influence on industrial control equipment.It means that changes in the quarantine rate can only affect the spread of malware within the same subnet.The same comparison on the monitored rate?2(in the ICS network)is conducted,it can get similar results,and it is shown in Fig.11.

    Figure 10: Comparison of infected hosts with different quarantine rates ?1

    Figure 11: Comparison of infected hosts with different monitored rates ?2

    5 Discussion about the Key Nodes

    To verify the duty of key nodes in the malware propagation,an experimental analysis is conducted on key nodes in the coupled network.The connection matrix of the industrial control coupled network is shown in Fig.12.The number “1”in the matrix means that two nodes are connected.Firstly,the degree of each node in the network is calculated according to the connection matrix and then sort all the nodes according to the degree.In this paper,the key nodes are the nodes with the larger degree value,and the sequence count of the key nodes in the network can be easily obtained according to the sorting result.

    Figure 12: Connection matrix of coupled network

    According to the theoretical analysis in Section 3,the greater the degree of a node,the more other nodes it can infect per unit time.The critical network node has a higher degree value.If the critical node is infected,the malware will erupt more quickly.Firstly,the key nodes in the two subnets are infected by malware.The experiment assumes that the number of key nodes in the PC network and the ICS network are both 20.Then in another experiment,40 nodes are randomly selected for infection,and compared the results of the two simulation experiments.

    So it can be concluded that infecting key nodes will cause the malware to infect the network at a faster rate.If a hacker obtains the topology data and attacks the key nodes (such as SCADA and HMI),then the malware will rapidly spread within the network and very little reaction time will be left for security personnel.Once a key node is infected,it will instantly infect many susceptible hosts and equipment,it is like a“superinfected node”.However,if the pivotal role of key nodes is used in the network,it can get a more effective malware containment strategy.The experimental analysis is conducted about the inhibitory effect of recovered key nodes.

    In Fig.13,the key nodes in the PC network and the ICS network are selectively immunized att=1,that is,implement measures such as early protection and patching on the key nodes.Then the same number of nodes are randomly selected for early protection and patching,and the outcomes of both experiments are contrasted.Fig.14 displays the comparative experimental consequences,it becomes evident that vaccinating pivotal nodes can lead to a further reduction in the count of infected nodes,effectively curbing malware propagation.

    Figure 13: Crucial infection and random infect

    Figure 14: Crucial immune and random immune

    Fig.15 shows the effect of immunizing key nodes at different times.It is clear that the earlier the key node immunization is adopted,the lower the count of infected hosts.Aftert=10,the sum of infected hosts remains nearly the same.It shows thatt=10 is a threshold,beforet=10,the earlier key node immunization is carried out,the more effective.

    To further verify this result,the crucial immune and random immune are compared att=10,the result is shown in Fig.16.It can be seen that att=10,there is no obvious difference between the effects of crucial immune and random immune.Therefore,the earlier the immunization of key nodes,the better.After the malware spreads in the network,selecting key nodes for immunization will not have a significant effect.

    In addition,a comparison experiment is conducted to validate the impact of the containment strategy,the SIQMR model is compared with the classic SIR model.The experimental findings are depicted in Fig.17.The number of infected equipment in the SIQMR model has been significantly reduced.Therefore,it can be proved that the containment strategy has an effective inhibitory effect on the spread of malware.

    Figure 15: Impact of the immune time

    Figure 16: Crucial immune and random immune at t=10

    Figure 17: Comparison between SIR model and SIQMR model

    6 Conclusion

    In industrial environments,the industrial control network is often connected to other networks.To understand how malware spreads in this network,this research proposes a malware propagation model with a containment strategy.This strategy involves quarantining PCs and monitoring industrial control equipment.By analyzing the dynamics of the malware system,the proposed model identifies a disease-free equilibrium and an endemic equilibrium and calculate the basic reproduction number.Then simulation experiments are conducted to study the spread of malware and analyze the impact of various parameters.Additionally,this research examines the role of key nodes in the interconnected network.The findings lead to the following conclusions:

    1.Key nodes are crucial in the network.If attackers target and infect these key nodes,the malware can rapidly propagate to numerous PC hosts and industrial control equipment.

    2.Key nodes can be effectively utilized to suppress malware.Immunizing key nodes in advance can effectively inhibit the spread of malware.

    3.Timely immunization of key nodes is crucial.Once the threshold is exceeded,immunizing key nodes becomes almost ineffective.

    The analysis provides valuable insights for suppressing malware in industrial control networks,highlighting the importance of quarantine and monitoring as containment strategies.This research also recommends leveraging key nodes for defense against malware.Comparative experiments validate the viewpoints.The future research is to incorporate dynamic network topology structures and parameters that align better with real-world scenarios.Furthermore,actual industrial datasets will be used to verify the reliability of the proposed model.

    Acknowledgement:This paper was supported by Scientific Research Project of Liaoning Province Education Department,and Liaoning Province Nature Fund Project.The authors also acknowledge with thanks to the“Ditecting Laboratory”of Northeastern University.

    Funding Statement:This paper was supported by Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781,and Liaoning Province Nature Fund Project,Code:No.2022-MS-291.

    Author Contributions:The authors confirm contribution to the paper as follows: Study conception and design: Q.Fu,J.Wang;analysis and interpretation of results: C.Si,J.Wang;draft manuscript preparation:Q.Fu,J.Liu.

    Availability of Data and Materials:This article does not involve data availability and this section is not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜激情久久久久久久| 亚洲av男天堂| 国产欧美日韩综合在线一区二区| www.精华液| 高清不卡的av网站| 免费黄色在线免费观看| 熟妇人妻不卡中文字幕| 国产一区二区三区综合在线观看| 亚洲天堂av无毛| av一本久久久久| 老司机亚洲免费影院| 日日啪夜夜爽| 亚洲第一区二区三区不卡| 亚洲欧洲国产日韩| 中文字幕av电影在线播放| 99热全是精品| 尾随美女入室| 亚洲av欧美aⅴ国产| 99久久中文字幕三级久久日本| 日日爽夜夜爽网站| 久久久久久人妻| 国产探花极品一区二区| 日本色播在线视频| 久久97久久精品| 成人二区视频| av有码第一页| 久久久精品国产亚洲av高清涩受| 99久久综合免费| 国产欧美日韩一区二区三区在线| 女性生殖器流出的白浆| 亚洲激情五月婷婷啪啪| 久久午夜综合久久蜜桃| 亚洲欧美精品综合一区二区三区 | 国产有黄有色有爽视频| 一本—道久久a久久精品蜜桃钙片| 亚洲国产欧美网| www.自偷自拍.com| 叶爱在线成人免费视频播放| 亚洲一级一片aⅴ在线观看| 91精品伊人久久大香线蕉| 一级黄片播放器| 亚洲精品久久成人aⅴ小说| 亚洲欧美一区二区三区黑人 | 人妻 亚洲 视频| 性高湖久久久久久久久免费观看| 永久网站在线| 国产成人精品福利久久| 久久久久久久久久久免费av| 久久鲁丝午夜福利片| 电影成人av| 天天操日日干夜夜撸| 国产成人精品久久二区二区91 | 亚洲精华国产精华液的使用体验| 十八禁网站网址无遮挡| 成人免费观看视频高清| 中文字幕人妻丝袜制服| 日韩一本色道免费dvd| 一级,二级,三级黄色视频| 国产精品无大码| 日本wwww免费看| 男女高潮啪啪啪动态图| 亚洲婷婷狠狠爱综合网| 香蕉精品网在线| 91精品三级在线观看| 2022亚洲国产成人精品| av国产精品久久久久影院| 午夜精品国产一区二区电影| 色94色欧美一区二区| 亚洲欧洲国产日韩| 在现免费观看毛片| 天天影视国产精品| 国产免费福利视频在线观看| 多毛熟女@视频| 国产成人aa在线观看| 考比视频在线观看| 欧美日韩综合久久久久久| 亚洲人成电影观看| 亚洲精品av麻豆狂野| 18禁动态无遮挡网站| 欧美日本中文国产一区发布| av片东京热男人的天堂| 99久久精品国产国产毛片| 亚洲国产毛片av蜜桃av| 麻豆av在线久日| 激情五月婷婷亚洲| 亚洲精品成人av观看孕妇| 两个人免费观看高清视频| 91午夜精品亚洲一区二区三区| 夜夜骑夜夜射夜夜干| 婷婷成人精品国产| 国产欧美亚洲国产| 一级毛片 在线播放| 国产在视频线精品| 赤兔流量卡办理| 这个男人来自地球电影免费观看 | 久久精品夜色国产| 久久久久精品人妻al黑| 日韩不卡一区二区三区视频在线| av国产久精品久网站免费入址| 亚洲少妇的诱惑av| 亚洲一码二码三码区别大吗| 激情五月婷婷亚洲| 亚洲成人一二三区av| 免费大片黄手机在线观看| 又大又黄又爽视频免费| 在线 av 中文字幕| 午夜免费观看性视频| 亚洲av中文av极速乱| 丰满乱子伦码专区| 国产欧美日韩一区二区三区在线| 久久国产精品大桥未久av| 色吧在线观看| a级毛片黄视频| 两个人免费观看高清视频| 久久99精品国语久久久| 一区二区三区四区激情视频| 午夜影院在线不卡| 亚洲精品自拍成人| av在线播放精品| 乱人伦中国视频| 国产熟女欧美一区二区| 啦啦啦在线观看免费高清www| 国产成人aa在线观看| 国产精品二区激情视频| 日本wwww免费看| 我要看黄色一级片免费的| 欧美97在线视频| 一级,二级,三级黄色视频| 国产综合精华液| 老熟女久久久| 亚洲欧美精品自产自拍| 久久久久久久精品精品| 亚洲国产成人一精品久久久| 欧美av亚洲av综合av国产av | 国产一区二区在线观看av| 国产精品人妻久久久影院| 我的亚洲天堂| 午夜老司机福利剧场| 亚洲精品成人av观看孕妇| 亚洲国产毛片av蜜桃av| 欧美精品一区二区免费开放| 美女福利国产在线| 欧美97在线视频| 在线观看免费日韩欧美大片| 亚洲色图综合在线观看| 少妇人妻精品综合一区二区| 中文字幕人妻丝袜一区二区 | 看免费av毛片| videos熟女内射| 久久99一区二区三区| av一本久久久久| 中文字幕亚洲精品专区| 亚洲av欧美aⅴ国产| 在线观看美女被高潮喷水网站| 免费黄网站久久成人精品| 免费观看在线日韩| 久久综合国产亚洲精品| 亚洲第一av免费看| 国产精品国产三级专区第一集| 亚洲,一卡二卡三卡| 新久久久久国产一级毛片| 亚洲一码二码三码区别大吗| 91精品国产国语对白视频| 免费黄频网站在线观看国产| 国产精品成人在线| 精品少妇内射三级| 1024香蕉在线观看| 十分钟在线观看高清视频www| 人妻少妇偷人精品九色| 人人妻人人澡人人爽人人夜夜| 久久久久国产一级毛片高清牌| 久久久久国产精品人妻一区二区| 夫妻性生交免费视频一级片| 搡老乐熟女国产| 久久久久久久大尺度免费视频| 人体艺术视频欧美日本| 多毛熟女@视频| 国产欧美日韩一区二区三区在线| 欧美精品一区二区大全| 免费观看性生交大片5| av在线老鸭窝| 亚洲美女黄色视频免费看| 9191精品国产免费久久| 在线观看人妻少妇| 伦理电影大哥的女人| 99久久中文字幕三级久久日本| 久久 成人 亚洲| 黑人巨大精品欧美一区二区蜜桃| 丝袜人妻中文字幕| 最近手机中文字幕大全| 老汉色av国产亚洲站长工具| 777米奇影视久久| 三级国产精品片| 国产成人精品在线电影| 欧美另类一区| 乱人伦中国视频| 日韩av在线免费看完整版不卡| 美女福利国产在线| 亚洲男人天堂网一区| 七月丁香在线播放| 亚洲精品国产av蜜桃| 亚洲精品aⅴ在线观看| 看免费av毛片| 日韩在线高清观看一区二区三区| 少妇的丰满在线观看| 韩国高清视频一区二区三区| 精品福利永久在线观看| 亚洲综合精品二区| 大香蕉久久网| 久久午夜综合久久蜜桃| 国产淫语在线视频| 日韩不卡一区二区三区视频在线| 妹子高潮喷水视频| 欧美精品人与动牲交sv欧美| av国产久精品久网站免费入址| 久久久欧美国产精品| 日本wwww免费看| 一级黄片播放器| 国产精品av久久久久免费| 中国国产av一级| 男女午夜视频在线观看| 免费观看a级毛片全部| 超碰成人久久| 人人妻人人澡人人爽人人夜夜| 91久久精品国产一区二区三区| 亚洲伊人色综图| 丝袜人妻中文字幕| 亚洲欧美中文字幕日韩二区| 欧美日韩综合久久久久久| 9色porny在线观看| 80岁老熟妇乱子伦牲交| 亚洲综合色惰| 999精品在线视频| 亚洲欧美精品自产自拍| 日韩欧美精品免费久久| 在线精品无人区一区二区三| 免费av中文字幕在线| 欧美成人午夜免费资源| 美女主播在线视频| 国产乱来视频区| 国产熟女欧美一区二区| av卡一久久| 国产精品不卡视频一区二区| 夫妻午夜视频| av线在线观看网站| 国产熟女午夜一区二区三区| 美女国产高潮福利片在线看| 精品国产露脸久久av麻豆| 校园人妻丝袜中文字幕| 国产伦理片在线播放av一区| 欧美少妇被猛烈插入视频| 久久精品国产a三级三级三级| 免费人妻精品一区二区三区视频| 超碰成人久久| 成人亚洲精品一区在线观看| 中文字幕最新亚洲高清| 亚洲欧美色中文字幕在线| 亚洲色图 男人天堂 中文字幕| 国产精品久久久久久精品电影小说| 伦理电影大哥的女人| 国产精品一区二区在线不卡| 日韩电影二区| 日本vs欧美在线观看视频| 亚洲av综合色区一区| 久久99一区二区三区| 精品少妇内射三级| 女人久久www免费人成看片| 亚洲内射少妇av| 亚洲图色成人| 青草久久国产| 97精品久久久久久久久久精品| 久久久久久久久久人人人人人人| 中文字幕av电影在线播放| 日韩在线高清观看一区二区三区| 欧美另类一区| 日韩欧美一区视频在线观看| av又黄又爽大尺度在线免费看| 久久久久久久大尺度免费视频| freevideosex欧美| 少妇 在线观看| 国产免费福利视频在线观看| 夜夜骑夜夜射夜夜干| 五月开心婷婷网| 制服人妻中文乱码| 蜜桃在线观看..| 国产精品人妻久久久影院| www.自偷自拍.com| 免费播放大片免费观看视频在线观看| 美女视频免费永久观看网站| 在线观看免费日韩欧美大片| 三级国产精品片| 人成视频在线观看免费观看| 日本欧美国产在线视频| 亚洲第一区二区三区不卡| 亚洲国产欧美网| 亚洲国产日韩一区二区| 啦啦啦中文免费视频观看日本| 蜜桃在线观看..| 国产激情久久老熟女| 国产亚洲精品第一综合不卡| 国产成人免费观看mmmm| av线在线观看网站| 国产麻豆69| 亚洲精品中文字幕在线视频| 两性夫妻黄色片| 久久精品夜色国产| 亚洲av中文av极速乱| 久久久久精品性色| 国产成人精品久久二区二区91 | 日韩一区二区三区影片| 永久免费av网站大全| 日韩欧美精品免费久久| 99国产综合亚洲精品| 最近中文字幕高清免费大全6| 国产又色又爽无遮挡免| 一级毛片电影观看| 午夜福利一区二区在线看| 日韩中文字幕视频在线看片| 一个人免费看片子| 成人国语在线视频| 老女人水多毛片| 视频区图区小说| 亚洲成人一二三区av| 免费高清在线观看视频在线观看| 水蜜桃什么品种好| 日韩av在线免费看完整版不卡| 亚洲一区中文字幕在线| 在线看a的网站| 高清欧美精品videossex| 国产av精品麻豆| 日日爽夜夜爽网站| 日韩熟女老妇一区二区性免费视频| 日本爱情动作片www.在线观看| 亚洲欧美成人精品一区二区| 国产精品一区二区在线不卡| 欧美老熟妇乱子伦牲交| 国产日韩一区二区三区精品不卡| 人妻一区二区av| 国产高清国产精品国产三级| 亚洲精品aⅴ在线观看| 国产免费一区二区三区四区乱码| 国产白丝娇喘喷水9色精品| 最近中文字幕高清免费大全6| 国产成人一区二区在线| 久久99热这里只频精品6学生| 久久av网站| 精品一区在线观看国产| 日韩在线高清观看一区二区三区| 亚洲情色 制服丝袜| 18+在线观看网站| 久久久精品94久久精品| 久久这里有精品视频免费| 777米奇影视久久| 国产又爽黄色视频| av网站在线播放免费| 国产免费又黄又爽又色| 欧美日韩亚洲国产一区二区在线观看 | 大香蕉久久成人网| 建设人人有责人人尽责人人享有的| 日韩av在线免费看完整版不卡| 九色亚洲精品在线播放| 这个男人来自地球电影免费观看 | 国产成人一区二区在线| av在线播放精品| 在线天堂中文资源库| 人人澡人人妻人| 99re6热这里在线精品视频| 国产日韩一区二区三区精品不卡| 亚洲在久久综合| 国产精品一区二区在线不卡| 中文字幕人妻丝袜一区二区 | 晚上一个人看的免费电影| 日本av免费视频播放| 激情视频va一区二区三区| 日产精品乱码卡一卡2卡三| 精品少妇一区二区三区视频日本电影 | 国产高清不卡午夜福利| 丰满迷人的少妇在线观看| 丝袜喷水一区| 久久久久久人人人人人| 国产一区有黄有色的免费视频| 制服丝袜香蕉在线| 精品少妇久久久久久888优播| 美女午夜性视频免费| 最新的欧美精品一区二区| 亚洲成人手机| 在线观看免费视频网站a站| 国产极品粉嫩免费观看在线| 秋霞在线观看毛片| 人成视频在线观看免费观看| 一本大道久久a久久精品| 美女高潮到喷水免费观看| 精品久久蜜臀av无| 久久精品夜色国产| 亚洲久久久国产精品| 两性夫妻黄色片| 我要看黄色一级片免费的| 国产精品二区激情视频| 国产精品亚洲av一区麻豆 | 精品少妇久久久久久888优播| 天天躁狠狠躁夜夜躁狠狠躁| 婷婷色麻豆天堂久久| 色播在线永久视频| 少妇的逼水好多| 美女国产视频在线观看| 韩国av在线不卡| 美女脱内裤让男人舔精品视频| 美女xxoo啪啪120秒动态图| 男人添女人高潮全过程视频| 日韩伦理黄色片| 日韩一区二区三区影片| 日本午夜av视频| 纯流量卡能插随身wifi吗| 国产精品秋霞免费鲁丝片| 精品人妻一区二区三区麻豆| 啦啦啦在线观看免费高清www| 久久这里有精品视频免费| 搡老乐熟女国产| 精品少妇黑人巨大在线播放| 精品少妇内射三级| 你懂的网址亚洲精品在线观看| 免费在线观看视频国产中文字幕亚洲 | av天堂久久9| 亚洲成av片中文字幕在线观看 | 亚洲精品一二三| 黑人欧美特级aaaaaa片| 国产精品.久久久| 国产免费一区二区三区四区乱码| 高清黄色对白视频在线免费看| 亚洲综合精品二区| 久久久久久久久久久免费av| 2021少妇久久久久久久久久久| 制服丝袜香蕉在线| 99热全是精品| 国产极品粉嫩免费观看在线| 天天躁狠狠躁夜夜躁狠狠躁| 伦理电影免费视频| 日本黄色日本黄色录像| 好男人视频免费观看在线| 永久网站在线| 亚洲三区欧美一区| 少妇人妻 视频| 亚洲国产毛片av蜜桃av| 国产人伦9x9x在线观看 | 天天躁日日躁夜夜躁夜夜| 久久99一区二区三区| 久久人人爽人人片av| 69精品国产乱码久久久| 久久久a久久爽久久v久久| 国产亚洲欧美精品永久| 亚洲,欧美精品.| 一二三四中文在线观看免费高清| 午夜福利在线观看免费完整高清在| 国产精品免费视频内射| 欧美日韩视频精品一区| 极品少妇高潮喷水抽搐| 国产男女内射视频| 国产探花极品一区二区| 国产免费一区二区三区四区乱码| 看十八女毛片水多多多| 国产成人免费无遮挡视频| 人体艺术视频欧美日本| 水蜜桃什么品种好| 成人国语在线视频| 午夜免费观看性视频| 我的亚洲天堂| 精品国产露脸久久av麻豆| 国产 精品1| 亚洲熟女精品中文字幕| 高清在线视频一区二区三区| 欧美国产精品一级二级三级| 九草在线视频观看| 高清欧美精品videossex| 亚洲激情五月婷婷啪啪| 精品99又大又爽又粗少妇毛片| 一级毛片 在线播放| 午夜福利一区二区在线看| 最近中文字幕高清免费大全6| 最近中文字幕2019免费版| a级毛片黄视频| 国产一区二区三区av在线| 高清在线视频一区二区三区| 男女高潮啪啪啪动态图| 老汉色av国产亚洲站长工具| 免费在线观看视频国产中文字幕亚洲 | av卡一久久| 高清黄色对白视频在线免费看| 日韩中文字幕欧美一区二区 | 日本色播在线视频| 国产精品麻豆人妻色哟哟久久| 91久久精品国产一区二区三区| 黄色一级大片看看| 国产精品嫩草影院av在线观看| 只有这里有精品99| 国产亚洲精品第一综合不卡| 国产高清国产精品国产三级| 欧美最新免费一区二区三区| 老司机影院成人| 欧美亚洲 丝袜 人妻 在线| 久久久久久人妻| 欧美日韩亚洲国产一区二区在线观看 | 天天躁日日躁夜夜躁夜夜| 国产精品 国内视频| 晚上一个人看的免费电影| 可以免费在线观看a视频的电影网站 | 美女高潮到喷水免费观看| 亚洲av免费高清在线观看| 青草久久国产| 国产一区有黄有色的免费视频| 久久影院123| 大香蕉久久网| 欧美日韩精品网址| 视频区图区小说| 日韩一区二区视频免费看| 久久久久久久精品精品| 国产免费福利视频在线观看| 亚洲精品中文字幕在线视频| 各种免费的搞黄视频| 黄片小视频在线播放| 亚洲国产最新在线播放| 精品福利永久在线观看| 久久久久久人妻| 色哟哟·www| 精品酒店卫生间| 亚洲第一av免费看| 国产精品 欧美亚洲| 免费大片黄手机在线观看| 国产片特级美女逼逼视频| 日本午夜av视频| 日韩视频在线欧美| xxxhd国产人妻xxx| 国产成人精品无人区| 国产无遮挡羞羞视频在线观看| 国产精品亚洲av一区麻豆 | 国产精品一国产av| 天天影视国产精品| 久久青草综合色| 大话2 男鬼变身卡| 欧美成人精品欧美一级黄| 国产一区亚洲一区在线观看| 高清视频免费观看一区二区| 最近手机中文字幕大全| 制服诱惑二区| 久久狼人影院| 啦啦啦视频在线资源免费观看| 在线看a的网站| 中文字幕制服av| 色哟哟·www| 久久久国产精品麻豆| 日韩 亚洲 欧美在线| 成人国产麻豆网| 少妇的逼水好多| 99九九在线精品视频| 亚洲精品视频女| 国产日韩欧美亚洲二区| 在线观看国产h片| 日本免费在线观看一区| 另类精品久久| 2018国产大陆天天弄谢| 国产精品.久久久| 97精品久久久久久久久久精品| 少妇人妻久久综合中文| a级片在线免费高清观看视频| 天天躁日日躁夜夜躁夜夜| 街头女战士在线观看网站| 日本91视频免费播放| 亚洲av电影在线观看一区二区三区| 日本免费在线观看一区| 晚上一个人看的免费电影| 色哟哟·www| 久久久久久久久久人人人人人人| 久久久精品区二区三区| 欧美精品国产亚洲| 九草在线视频观看| 少妇 在线观看| 十分钟在线观看高清视频www| 99国产精品免费福利视频| 亚洲国产色片| 菩萨蛮人人尽说江南好唐韦庄| 亚洲国产精品999| 不卡av一区二区三区| 99热国产这里只有精品6| 免费看不卡的av| 99久久精品国产国产毛片| 美女主播在线视频| 亚洲人成网站在线观看播放| av电影中文网址| 观看av在线不卡| 日韩一区二区视频免费看| 午夜91福利影院| 国产精品成人在线| 日韩精品免费视频一区二区三区| 午夜日韩欧美国产| 久久99精品国语久久久| 亚洲三级黄色毛片| 王馨瑶露胸无遮挡在线观看| 只有这里有精品99| 男女无遮挡免费网站观看| 大片免费播放器 马上看| 街头女战士在线观看网站| 久久精品熟女亚洲av麻豆精品| av国产久精品久网站免费入址| 亚洲美女黄色视频免费看| 叶爱在线成人免费视频播放| 国产一级毛片在线| 欧美中文综合在线视频| 久久国产精品大桥未久av| 999精品在线视频| 欧美少妇被猛烈插入视频| 免费女性裸体啪啪无遮挡网站| 久久久久久久国产电影| 成人18禁高潮啪啪吃奶动态图| 国产成人精品无人区| 女人高潮潮喷娇喘18禁视频| 欧美日韩视频高清一区二区三区二|