• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network

    2024-05-25 14:39:28QiangFuJunWangChangfuSiandJiaweiLiu
    Computers Materials&Continua 2024年4期

    Qiang Fu ,Jun Wang,? ,Changfu Si and Jiawei Liu

    1College of Computer Science and Technology,Shenyang University of Chemical Technology,Shenyang,110142,China

    2College of Computer Science and Engineering,Northeastern University,Shenyang,110169,China

    ABSTRACT As industrialization and informatization become more deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Based on this model,the role of key nodes in the spread of malware is studied,a comparison experiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In other words,selective immunity to key nodes can effectively suppress the spread of malware and maintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.

    KEYWORDS Key nodes;dynamic model;industrial control network;simulation

    Nomenclature

    1 Introduction

    1.1 Motivation

    In the past decade,the number of industrial control security incidents has been increasing.In 2010,the Stuxnet worm targeted the Bushehr nuclear power plant in Iran [1].Since then,there have been many malware targeting Industrial Control System(ICS)networks,such as Night Dragon[2],Flame[3],Duqu/Duqu2.0[4],Blaster[5],and BlackEnergy[6].The typical Programmable Logic Controller(PLC)worm Blaster can only exist in PLC,and it has the potential to propagate via Siemens SIMATIC S7-1200’s control system.PLC Blaster can scan the ICS networks to find new targets,then it will attack PLCs and replicate in the infected PLCs.Some new types of malware can spread not only in Personal Computer(PC)networks but also in industrial control networks.In 2012,Russian security experts discovered the Flame virus spreading widely in the energy industry in the Middle East[7].In 2016,the Mirai botnet attack occurred,and in 2020[8],Israel’s water supply system was invaded by malware[9].Malware plays an important role in frequent industrial control security incidents,posing a huge threat to the security of industrial infrastructure.The industrial control network is generally composed of industrial control equipment with different characteristics,and it is often coupled and connected with other networks to form a complex network.Therefore,establishing a propagation model to describe the propagation behavior of malware in industrial control networks and proposing effective containment strategies have become an urgent problem that needs to be solved.

    At present,the vulnerabilities are used to spread the PLC worm in Supervisory Control and Data Acquisition(SCADA).Fovino et al.used the MalSim simulator to conduct similar attack experiments and achieved obvious attack effects [10].It is evident that defending against this malware variant poses greater challenges,and its potential for harm is considerably more severe.Some malware can spread across the network through the interaction of the subnets.Therefore,a coupled network can better describe the actual propagation behavior of malware.The industrial control coupled network is composed of two layers of subnets,and the network topology is shown in Fig.1.The upper subnet is a PC network composed of PCs and servers(the blue nodes),and the lower subnet is an ICS network composed of industrial control equipment (the purple nodes) such as SCADA,Object Linking and Embedding (OLE),OLE for Process Control (OPC),Human Machine Interface (HMI),and PLC.Different nodes in the network have different degrees,and a server host in the upper network will be connected to many PC hosts.Similarly,in the lower ICS network,the SCADA control center will collect data from a lot of PLCs for analysis and monitoring.The PLCs may be distributed in different sites,which means that SCADA will have a connection relationship with many PLCs.When the industrial controller communicates with equipment,it must pass through the OPC server,so the OPC server will also have a connection relationship with many industrial control equipment.An HMI is often connected to many industrial control equipment such as PLCs and displays the operating status of these PLCs.The general layout of an ICS has been summarized by Kheddar et al.,as it is shown in Fig.2[11].In other words,for an industrial control coupled network,the characteristics of different nodes are different.Certain nodes exhibit a high degree,whereas others possess a low degree.

    Figure 1: Topology of industrial control coupled network

    1.2 Related Works

    The amount of connected edges of different nodes in the network is different,such as the red nodes in Fig.1 are connected to more edges.Different hosts in the PC network have different degrees,and the Server will connect to a large number of hosts.For the industrial control equipment in the ICS network,SCADA will control the operation of many PLCs,and OPC and HMI will have a connection relationship with many PLCs.These characteristics make the coupled network look like a complex network.Some researchers have studied the attributes of pivotal nodes within intricate networks[12–14].This research considers the differences in the characteristics of nodes in the coupled network,group the nodes with degrees,and define some of the nodes with the highest degree as the key nodes.That is to say,when the malware spreads in the coupled network,the ability of different nodes to spread the malware is different.For example,in Fig.3,both node A and node B are infected,and the other nodes are susceptible.Node A is connected to seven susceptible nodes,and node B is connected to three susceptible nodes.Node A has a greater impact on malware propagation than node B.This research will discuss the effect of the key nodes on malware propagation in detail in Section 5.

    To study the effect of the key nodes on the malware dynamics in the industrial control coupled network,a dynamic model is proposed in the coupled network.The epidemic model is a method of quantitative research on the spread of infectious diseases because the spread of malware is very similar to the spread of infectious diseases[15],the epidemic model is used to study the propagation of malware.In the complex network,Rey et al.propose a malware propagation model based on random complex networks and cellular automata [16].Hosseini et al.establish a theoretical model for the spread of malware on scale-free networks and propose an ABM version of the model [17].Yuan simulate the propagation of worms in complex industrial networks based on the NS2 simulation system [18].Viswalingam et al.perform a new analysis of the SIR model in a two-layer coupled network [19].Dickison et al.study the SIR model in a two-layer coupled network and find that if the two subnets are strongly coupled,the malware can spread throughout the network,and if the network is weakly coupled,then the malware will only exist in one subnet[20].Masood et al.describe the characteristics of Stuxnet,and they investigate the spread of the virus in the regime of isolated industrial networks[21].Based on the difference between an intelligent device’s dissemination capacity and discriminant ability,Li et al.propose a dynamic malware propagation model in cyber physics systems [22].Shen et al.propose a two-layer malware model based on a hybrid patches distribution method [23].Based on an epidemic theory’s analysis framework and individual-group game theory,Wu et al.propose a virus spread model (STSIR) [24].Shen et al.present evolutionary privacy preservation learning strategies for an edge computing-based Internet of Things (IoT) data sharing scheme[25].Yu et al.propose an open-set solution called DC-IDS for Industrial Internet of Things(IIoT)based on deep reinforcement learning,and Deep Q-Network(DQN)is employed[26].Similarly,Shen et al.propose a heuristic learning intrusion detection system with DQN for edge-based Social Internet of Things (SIoT) networks [27],in addition,they propose a privacy-preservation signaling game for edge-computing-based IoT networks[28].The above studies provide an effective reference for getting deeper insights into the propagation of malware in the coupled network.However,most studies did not take into account the differences in characteristics between different nodes in the network.

    Figure 2: General layout of an ICS[11]

    1.3 Contribution

    Building upon the aforementioned studies,a dynamic model is proposed in the industrial control network.The model includes a malware containment strategy that integrates detection,quarantine,and monitoring.On this basis,the role of key nodes in malware propagation is studied.By conducting comparative experiments on key nodes,it is concluded that infecting key nodes can significantly accelerate the speed of malware propagation.Therefore,immunizing key nodes is a more effective containment strategy.Based on detection,quarantine,and monitoring,selective immunity to key nodes can effectively suppress the spread of malware and maintain the stability of industrial control systems.The paper is organized as follows:Section 1 is the introduction;Section 2 is model formulation which describes how the model is proposed;Section 3 is the dynamics of the model,in this section,the basic reproduction number is obtained,and the dynamics of the model is analyzed;Section 4 shows the results of the simulation experiments;Section 5 shows the role of key nodes in malware propagation;Section 6 is Conclusion.

    Figure 3: The key nodes in the network

    2 Model Formulation

    To analyze the effect of the key nodes,an epidemic model within a coupled is proposed in a coupled network that combines both PC and ICS networks.It is assumed that the industrial control equipment(PLC,SCADA,OPC,and HMI) and in the coupled network,the proposed model considers PCs as the nodes,where the links depict communication connections between these nodes.The network size remains constant,and the nodes are categorized into two groups: PCs and industrial control equipment,with their respective network sizes beingNUandNL.

    2.1 Intrusion Detection System

    In the proposed model,an Intrusion Detection System(IDS)is used as a containment strategy.Different from passive defense methods,an IDS can actively discover abnormal intrusion behaviors in the network and give warnings,and it has been widely used in network security.With the development of intrusion detection technology,many different intrusion detection methods have emerged,which can be roughly divided into two categories: Misused intrusion detection and anomaly intrusion detection.

    Misused detection is also called feature-based intrusion detection[29].This method maintains a signature database that describes various known intrusions.It will extract the feature value of the data to be detected,and match the extracted feature value with the signature database.If the matching is successful,it is determined that an intrusion has occurred,otherwise,it is considered that no attack event has occurred.The advantage of this detection method is high detection accuracy,but it cannot detect unknown worm attacks.Anomaly detection is also called behavior-based intrusion detection.It uses the idea of contradiction.This method does not depend on a specific system,it can be flexibly adjusted according to the actual situation,and it can detect worm attacks that have never occurred before.However,this behavior also has deficiencies.It is easy to define normal network activities as intrusions,which means that there is a false alarm.

    Considering the effects of the intrusion detection methods,the dual intrusion detection method is used to detect worm attacks in the network.For the host in the PC network,anomaly intrusion detection is first used.If no abnormal behavior is found,it is considered that the host is not infected by the worm.If abnormal behavior is found,a second detection is performed.During the second detection,the frequency of abnormal behaviors is recorded.When the frequency is greater than the specified threshold,it is considered that worm attacks have occurred.For the industrial control equipment in the ICS network,the proposed model adopts anomaly intrusion detection to detect the traffic at first.If no abnormal behavior is found,it is considered that the industrial control equipment is not infected by the worm.If abnormal behavior is found,then it checks the operating status of the industrial control equipment.If the relevant value of the operating status of the equipment is within the legal range,it is considered that no attack event has occurred.Otherwise,it is determined that the device has been infected by malware.Thus the proposed model can ensure the normal operation of industrial control equipment to the greatest extent,and effectively detect malware attacks.

    2.2 Containment Strategy

    To suppress the spread of the malware,the general approach is to identify the hosts and industrial control equipment that have been infected,and then immunize the infected hosts and equipment.However,with the continuous increase of network bandwidth and the improvement of hacker technology,the spread of malware is getting faster and faster.A malware suppression strategy is proposed that integrates detection,quarantine,and monitoring to limit the spread of malware in ICS coupled network.

    Based on the IDS,the hosts and industrial control equipment infected by the worm can be discovered.For the hosts in the PC network,when the infected hosts are detected,they will be immediately quarantined from the network by powering off,which can effectively prevent it from continuing to infect other hosts.At the same time,it provides advanced protection for hosts in a susceptible state.When the hosts are quarantined,immediately patch it and install anti-virus software to make it immune.

    For the industrial control equipment,quarantine may cause a shutdown,which in turn affects the normal operation of the industrial production process.So the model filters the port traffic of industrial control equipment by a whitelist,which produces a similar quarantine effect.The specific method is to set up a whitelist for the industrial control equipment when the IDS finds that the port of the industrial control equipment generates abnormal traffic and determines that it is infected.The whitelist is set with strict filtering rules,and the generation rules are extracted from the historical traffic of the industrial control equipment.The rules only allow the normal part of the traffic in the industrial production process to pass,and filter out all other traffic.Although it will cause part of the normal traffic to be blocked and filtered,it effectively prevents the spread of malware in the industrial control network,and it can ensure the normal progress of the industrial production process,then the industrial control equipment will be patched to make them immune.

    2.3 Intrusion Detection System

    Based on the proposed malware containment strategy,the SIQMR model is proposed to analyze the dynamic of malware.Within the PC network,the proposed model categorizes PCs into four compartments based on their conditions during malware attacks:susceptiblestate (SU,vulnerable PCs),infectedstate (IU,infected PCs),quarantinedstate (QU,quarantined PCs),andrecoveredstate(RU,recovered PCs).During each time step the susceptible PCs can become infected by other PCs at a rateβ11and industrial control equipment at a rateβ21,respectively.Susceptible and infected PCs can achieve recovery by employing anti-malware software or applying patches,with ratesμand?1,respectively.The probability to be recovered isγ1.Occasionally,the applied patches may be temporary and could result in a loss of function.In such cases,the previously recovered PCs might transition back to susceptible status at a rateη1.

    In the ICS network,the equipment can be segregated into four compartments based on their states:susceptiblestate (SL,susceptible industrial control equipment),infectedstate (IL,infected industrial control equipment),monitoringstate (ML,monitoring industrial control equipment),andrecoveredstate(RL,recovered industrial control equipment).The susceptible PLCs can be infected by the infected PCs and industrial control equipment at a rateβ12andβ22,respectively.When it is found that the industrial control equipment is infected,the port of the industrial control equipment is monitored through a whitelist,and the traffic is strictly filtered.The probability to be monitored and recovered are?2andγ2,respectively.The recovered industrial control equipment may change to be susceptible at a rateη2.

    The model is assumed into a heterogeneous coupled network,the node degree distribution follows a power law(P(k)=k-γ),the joint degree distribution isPU(i,j)andPL(k,l),and the marginal degree distributions arePU(i,j)=andPL(i,j)=.At timet,the count of common nodes and honeypots within the network with a degree ofkis:

    Then the following equations can be found:

    The assumption here is that node connectivity is independent,and the probability for susceptible PCs to interact with infected PCs is:

    and the probability of communicating with infected industrial control equipment is:

    Similarly,the probability for susceptible industrial control equipment to communicate with infected industrial control equipment is:

    and the probability of communicating with infected PCs is:

    According to the previously established transition relationships and formulations,the diagram depicting the states of nodes in the two-layer connected network is presented in Fig.4,and the model can be expressed as the model (8).In the proposed model,the total number of PCs and industrial control equipment remains constant.The symbols utilized in the model are detailed in the nomenclature.

    Figure 4: The transition diagram

    3 Equations and Mathematical Expressions

    In this section,the dynamic behaviors of model (8) are analyzed,and two important equilibria are identified:The disease-free equilibrium and the endemic equilibrium,which can indicate malware remains in epidemics or become extinct.This research then proceed to assess the local and global stability of these equilibria using the basic reproduction number,denoted asR0.

    3.1 Disease-Free Equilibrium

    The model Eq.(8)is set to be zero with(t)=0 for alliandj,and(t)=0 for allkandl.Then it has Θ11(t)=Θ12(t)=Θ21(t)=Θ22(t)=0,and

    3.2 Endemic Equilibrium

    The independence in the joint degree distributions is assumed as:

    Fis the rate of new occurring infections andVis the rate of transferring individuals out of the original group,Γis a complex matrix.The matrix(12)can be simplified to:

    Due to the independence of joint degree distributions in the model,matrix (13) can undergo further simplification to:

    then it can get the characteristic equation,

    The eigenvalues of the matrix are:

    Theorem.1If the basic reproduction numberR0<1,the disease-free equilibriumE0is local asymptotically stable;ifR0>1,E0is unstable.

    Proof.For a constant differential autonomous system,

    4 Simulation Experiments

    To test the efficacy of critical nodes and containment strategies,this research performs simulation experiments to simulate the malware propagation process within the industrial control network.In a discrete-time framework,simulation experiments are executed to collect a dataset representing the number of PCs (ICS equipment) in each state within the network,and the experimental results are drawn using MATLAB.

    The experiments are divided into three parts:Disease-free equilibrium,endemic equilibrium,and the effectiveness of key nodes.The coupled network is assumed to exhibit a scale-free structure,with node degrees following a power-low distribution.The power-law index is setγ=3.

    4.1 Disease-Free Equilibrium

    Fig.5 shows the trend of the number of infected hosts in the PC network,and the parameters for the disease-free equilibrium are listed in Table 1.In the initial phase of the simulation,due to the rapid spread of the malware,the number of infected hosts increases rapidly and reaches a peak att=21.Afterwards,the count of infected hosts quickly begins to decline due to the containment strategy,and finally,the number decreases to zero.When the PC network reaches a disease-free equilibrium,there are no infected hosts,that is,the malware is eliminated.The number of recovered hosts in the network accounts for about 80%,indicating that the hosts in the network have been immunized in a wide range.

    Table 1: Parameters for the disease-free equilibrium

    Figure 5: The propagation of PCs(disease-free equilibrium)

    Next,an experimental analysis of the malware propagation is conducted in the ICS network.In Fig.6,it is shown the propagation trend of the infected industrial control equipment.The number of monitored and recovered industrial control equipment increased and then decreased,and finally,the number became zero.The number of susceptible industrial control equipment reaches the minimum value of 800 att=40,then it starts to increase slowly.Finally,all industrial control equipment in the network is in a susceptible state.From the experimental results of the ICS network,it can be concluded that when the system is finally at a disease-free equilibrium,there is only susceptible industrial control equipment in the network.

    Figure 6: The propagation of industrial control equipment(disease-free equilibrium)

    4.2 Endemic Equilibrium

    The parameters corresponding to the endemic equilibrium are presented in Table 2.Fig.7 shows the curves of PC hosts in the PC network.In the beginning,a large number of susceptible PC hosts are infected,leading to a rapid rise in the number of infected hosts,reaching a peak aroundt=20.Afterward,due to the containment strategy,the infected PC hosts are monitored and then recovered.The number of infected PC hosts began to decrease and eventually became stable.When the system reaches a diseased equilibrium state,only 15%of the PC hosts are infected,and the number of recovered hosts accounts for 40%.The experimental results prove that the containment strategy effectively can limit the spread of malware in the network.

    Table 2: Parameters for the endemic equilibrium of the SIQMR model

    Fig.8 shows the propagation of the industrial control equipment in the ICS network.In the beginning,the susceptible industrial control equipment is quickly infected,the number increases rapidly and reaches a peak soon.Subsequently,the number of monitored and recovered industrial control equipment gradually increases,and the number of infected industrial control equipment begins to decrease.Finally,the industrial control equipment reaches a stable state.The figure illustrates that after the system is stabilized to an endemic equilibrium state,22%of the industrial control equipment is infected,while the proportion of monitored and recovered equipment is 35%and 30%,respectively.The simulation experiments have proved that the SIQMR model has a noteworthy inhibitory effect on the spread of malware in the industrial control network.

    Figure 7: The propagation of PCs(endemic equilibrium)

    Figure 8: The propagation of industrial control equipment(endemic equilibrium)

    4.3 Comparisons of Relevant Parameters

    To examine the impact of the parameters on malware propagation,some parameter comparative experiments are conducted on these parameters.Fig.9 shows the influence ofβ11andβ21on the speed of malware propagation.It can be seen from Fig.9 that whenβ21remains unchanged andβ11increases to three times the original,the number of infected hosts has increased significantly.Whenβ11remains unchanged andβ21is increased by three times,although the number of infected hosts will also increase,the increase is relatively small.It can be concluded that when the malware spreads in the industrial control coupled network,the influence of the infection rate(β11)within the subnet is greater than the infection rate(β21)which crosses the subnet.

    Fig.10 shows the influence of the quarantine rate?1of infected PCs (in the PC network) of infected PCs on malware propagation.In Fig.10a,it is apparent that the greater the quarantine rate?1of infected PCs,the smaller the number of infected PCs.It shows that improving the intrusion detection efficiency and timely isolating the infected PCs from the network can effectively suppress the propagation of malware.However,in Fig.10b,the quarantine rate?1of infected PCs has little influence on industrial control equipment.It means that changes in the quarantine rate can only affect the spread of malware within the same subnet.The same comparison on the monitored rate?2(in the ICS network)is conducted,it can get similar results,and it is shown in Fig.11.

    Figure 10: Comparison of infected hosts with different quarantine rates ?1

    Figure 11: Comparison of infected hosts with different monitored rates ?2

    5 Discussion about the Key Nodes

    To verify the duty of key nodes in the malware propagation,an experimental analysis is conducted on key nodes in the coupled network.The connection matrix of the industrial control coupled network is shown in Fig.12.The number “1”in the matrix means that two nodes are connected.Firstly,the degree of each node in the network is calculated according to the connection matrix and then sort all the nodes according to the degree.In this paper,the key nodes are the nodes with the larger degree value,and the sequence count of the key nodes in the network can be easily obtained according to the sorting result.

    Figure 12: Connection matrix of coupled network

    According to the theoretical analysis in Section 3,the greater the degree of a node,the more other nodes it can infect per unit time.The critical network node has a higher degree value.If the critical node is infected,the malware will erupt more quickly.Firstly,the key nodes in the two subnets are infected by malware.The experiment assumes that the number of key nodes in the PC network and the ICS network are both 20.Then in another experiment,40 nodes are randomly selected for infection,and compared the results of the two simulation experiments.

    So it can be concluded that infecting key nodes will cause the malware to infect the network at a faster rate.If a hacker obtains the topology data and attacks the key nodes (such as SCADA and HMI),then the malware will rapidly spread within the network and very little reaction time will be left for security personnel.Once a key node is infected,it will instantly infect many susceptible hosts and equipment,it is like a“superinfected node”.However,if the pivotal role of key nodes is used in the network,it can get a more effective malware containment strategy.The experimental analysis is conducted about the inhibitory effect of recovered key nodes.

    In Fig.13,the key nodes in the PC network and the ICS network are selectively immunized att=1,that is,implement measures such as early protection and patching on the key nodes.Then the same number of nodes are randomly selected for early protection and patching,and the outcomes of both experiments are contrasted.Fig.14 displays the comparative experimental consequences,it becomes evident that vaccinating pivotal nodes can lead to a further reduction in the count of infected nodes,effectively curbing malware propagation.

    Figure 13: Crucial infection and random infect

    Figure 14: Crucial immune and random immune

    Fig.15 shows the effect of immunizing key nodes at different times.It is clear that the earlier the key node immunization is adopted,the lower the count of infected hosts.Aftert=10,the sum of infected hosts remains nearly the same.It shows thatt=10 is a threshold,beforet=10,the earlier key node immunization is carried out,the more effective.

    To further verify this result,the crucial immune and random immune are compared att=10,the result is shown in Fig.16.It can be seen that att=10,there is no obvious difference between the effects of crucial immune and random immune.Therefore,the earlier the immunization of key nodes,the better.After the malware spreads in the network,selecting key nodes for immunization will not have a significant effect.

    In addition,a comparison experiment is conducted to validate the impact of the containment strategy,the SIQMR model is compared with the classic SIR model.The experimental findings are depicted in Fig.17.The number of infected equipment in the SIQMR model has been significantly reduced.Therefore,it can be proved that the containment strategy has an effective inhibitory effect on the spread of malware.

    Figure 15: Impact of the immune time

    Figure 16: Crucial immune and random immune at t=10

    Figure 17: Comparison between SIR model and SIQMR model

    6 Conclusion

    In industrial environments,the industrial control network is often connected to other networks.To understand how malware spreads in this network,this research proposes a malware propagation model with a containment strategy.This strategy involves quarantining PCs and monitoring industrial control equipment.By analyzing the dynamics of the malware system,the proposed model identifies a disease-free equilibrium and an endemic equilibrium and calculate the basic reproduction number.Then simulation experiments are conducted to study the spread of malware and analyze the impact of various parameters.Additionally,this research examines the role of key nodes in the interconnected network.The findings lead to the following conclusions:

    1.Key nodes are crucial in the network.If attackers target and infect these key nodes,the malware can rapidly propagate to numerous PC hosts and industrial control equipment.

    2.Key nodes can be effectively utilized to suppress malware.Immunizing key nodes in advance can effectively inhibit the spread of malware.

    3.Timely immunization of key nodes is crucial.Once the threshold is exceeded,immunizing key nodes becomes almost ineffective.

    The analysis provides valuable insights for suppressing malware in industrial control networks,highlighting the importance of quarantine and monitoring as containment strategies.This research also recommends leveraging key nodes for defense against malware.Comparative experiments validate the viewpoints.The future research is to incorporate dynamic network topology structures and parameters that align better with real-world scenarios.Furthermore,actual industrial datasets will be used to verify the reliability of the proposed model.

    Acknowledgement:This paper was supported by Scientific Research Project of Liaoning Province Education Department,and Liaoning Province Nature Fund Project.The authors also acknowledge with thanks to the“Ditecting Laboratory”of Northeastern University.

    Funding Statement:This paper was supported by Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781,and Liaoning Province Nature Fund Project,Code:No.2022-MS-291.

    Author Contributions:The authors confirm contribution to the paper as follows: Study conception and design: Q.Fu,J.Wang;analysis and interpretation of results: C.Si,J.Wang;draft manuscript preparation:Q.Fu,J.Liu.

    Availability of Data and Materials:This article does not involve data availability and this section is not applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    老师上课跳d突然被开到最大视频| 国产成人a∨麻豆精品| 日本色播在线视频| 菩萨蛮人人尽说江南好唐韦庄 | 男人舔女人下体高潮全视频| eeuss影院久久| 成人av一区二区三区在线看| 97人妻精品一区二区三区麻豆| 亚洲成人中文字幕在线播放| 天堂动漫精品| 国产精品,欧美在线| 午夜激情欧美在线| 亚洲精品在线观看二区| 国产色爽女视频免费观看| 国产人妻一区二区三区在| 99热只有精品国产| 日韩欧美 国产精品| 男插女下体视频免费在线播放| 我的老师免费观看完整版| av中文乱码字幕在线| 亚洲最大成人手机在线| 欧美成人a在线观看| 日韩制服骚丝袜av| 亚洲国产日韩欧美精品在线观看| 99国产精品一区二区蜜桃av| 亚洲成人久久性| 国产精品久久久久久久久免| 午夜a级毛片| 精品一区二区三区视频在线| 精品午夜福利在线看| 日韩,欧美,国产一区二区三区 | 亚洲18禁久久av| 亚洲美女搞黄在线观看 | 国产精品嫩草影院av在线观看| 日日摸夜夜添夜夜爱| 欧洲精品卡2卡3卡4卡5卡区| 91久久精品国产一区二区成人| 亚洲专区国产一区二区| 成人综合一区亚洲| 久久精品国产鲁丝片午夜精品| 亚洲精品国产av成人精品 | 一区二区三区高清视频在线| 麻豆一二三区av精品| av黄色大香蕉| 免费在线观看成人毛片| 午夜免费激情av| 欧美日韩乱码在线| 日韩制服骚丝袜av| а√天堂www在线а√下载| 插阴视频在线观看视频| aaaaa片日本免费| 欧美成人精品欧美一级黄| 一本精品99久久精品77| 亚洲精华国产精华液的使用体验 | 国产av麻豆久久久久久久| 床上黄色一级片| 3wmmmm亚洲av在线观看| 22中文网久久字幕| 99视频精品全部免费 在线| 看十八女毛片水多多多| 亚洲天堂国产精品一区在线| 午夜免费激情av| 免费看美女性在线毛片视频| 日日撸夜夜添| 欧美+亚洲+日韩+国产| 高清毛片免费看| 久久人人爽人人片av| 国产精品女同一区二区软件| 最近在线观看免费完整版| 嫩草影视91久久| 观看免费一级毛片| 99热这里只有精品一区| 性色avwww在线观看| 成年女人永久免费观看视频| 22中文网久久字幕| 国产一级毛片七仙女欲春2| 精品国内亚洲2022精品成人| 欧美另类亚洲清纯唯美| 成年免费大片在线观看| av女优亚洲男人天堂| 国产精品三级大全| 午夜福利在线观看吧| 久久久a久久爽久久v久久| 国产人妻一区二区三区在| 久久精品综合一区二区三区| 国内揄拍国产精品人妻在线| 深夜a级毛片| 老熟妇乱子伦视频在线观看| 精品福利观看| 国产一级毛片七仙女欲春2| 五月伊人婷婷丁香| av在线天堂中文字幕| 成人无遮挡网站| 免费搜索国产男女视频| 国产日本99.免费观看| 色尼玛亚洲综合影院| 国产色婷婷99| 插阴视频在线观看视频| 嫩草影院入口| 国产成人影院久久av| 熟女人妻精品中文字幕| 亚洲第一电影网av| 亚洲欧美日韩东京热| 麻豆久久精品国产亚洲av| 国产午夜精品久久久久久一区二区三区 | 韩国av在线不卡| 成人综合一区亚洲| 国产精品1区2区在线观看.| 午夜福利在线观看免费完整高清在 | 欧美xxxx性猛交bbbb| 在线看三级毛片| 国产aⅴ精品一区二区三区波| 国产精品99久久久久久久久| 男女啪啪激烈高潮av片| 亚洲熟妇中文字幕五十中出| 午夜免费激情av| 国产91av在线免费观看| 亚洲av成人精品一区久久| 伦理电影大哥的女人| 麻豆久久精品国产亚洲av| 日本五十路高清| 国产探花极品一区二区| aaaaa片日本免费| 免费观看的影片在线观看| 日韩成人av中文字幕在线观看 | 精品久久久久久久久亚洲| 搡老熟女国产l中国老女人| 级片在线观看| 久99久视频精品免费| 18禁裸乳无遮挡免费网站照片| 黑人高潮一二区| 亚洲国产日韩欧美精品在线观看| 99热全是精品| 少妇熟女欧美另类| 精品久久久久久久末码| 精品国产三级普通话版| 亚洲精品在线观看二区| 一进一出抽搐gif免费好疼| 寂寞人妻少妇视频99o| 全区人妻精品视频| 国产精品一区二区性色av| 国产精品综合久久久久久久免费| 午夜福利高清视频| ponron亚洲| 国产成年人精品一区二区| 嫩草影院入口| 一本精品99久久精品77| 国产午夜福利久久久久久| 五月伊人婷婷丁香| 毛片一级片免费看久久久久| 午夜福利成人在线免费观看| 久久精品国产亚洲av涩爱 | 国内精品宾馆在线| 99热网站在线观看| 五月伊人婷婷丁香| 亚洲美女黄片视频| 免费av不卡在线播放| av专区在线播放| 老师上课跳d突然被开到最大视频| 亚洲不卡免费看| 久久99热6这里只有精品| 日本一二三区视频观看| 六月丁香七月| 夜夜爽天天搞| 久久6这里有精品| 欧美性感艳星| 乱人视频在线观看| 亚洲国产精品成人久久小说 | 亚洲国产日韩欧美精品在线观看| 久久欧美精品欧美久久欧美| 亚洲性夜色夜夜综合| 久99久视频精品免费| 成人综合一区亚洲| 国产精品综合久久久久久久免费| 国产亚洲91精品色在线| 亚洲av免费高清在线观看| 日本三级黄在线观看| 又爽又黄a免费视频| 女生性感内裤真人,穿戴方法视频| 精品久久久久久久久久免费视频| 国产精品久久电影中文字幕| 久久久久性生活片| av在线老鸭窝| 亚洲国产日韩欧美精品在线观看| 精品福利观看| 国产真实伦视频高清在线观看| 欧美一区二区国产精品久久精品| 给我免费播放毛片高清在线观看| 欧美高清性xxxxhd video| 国产精品一区二区三区四区免费观看 | 成人午夜高清在线视频| 亚洲五月天丁香| 欧美丝袜亚洲另类| av专区在线播放| 日本黄大片高清| 欧美又色又爽又黄视频| 国产一区二区激情短视频| 麻豆国产av国片精品| 精品久久久久久久久久免费视频| 亚洲第一区二区三区不卡| 一区福利在线观看| 欧美成人a在线观看| 成人鲁丝片一二三区免费| 国产精品野战在线观看| 成人av一区二区三区在线看| 国产精品,欧美在线| 最后的刺客免费高清国语| 免费黄网站久久成人精品| 久久精品国产亚洲av涩爱 | 日韩成人伦理影院| 99久久久亚洲精品蜜臀av| 黑人高潮一二区| 国产亚洲精品久久久com| 久久人妻av系列| 国产成人精品久久久久久| 村上凉子中文字幕在线| 男人舔女人下体高潮全视频| 99热这里只有是精品在线观看| 最近在线观看免费完整版| 午夜亚洲福利在线播放| 久久精品国产亚洲av香蕉五月| 欧美日韩一区二区视频在线观看视频在线 | 国产成年人精品一区二区| 床上黄色一级片| 亚洲av成人av| 69人妻影院| 别揉我奶头~嗯~啊~动态视频| 色视频www国产| 久久久a久久爽久久v久久| 亚洲电影在线观看av| 亚州av有码| 免费观看的影片在线观看| 国产精品一区二区免费欧美| 国产精品一区二区性色av| 亚洲av免费在线观看| 99久国产av精品国产电影| 日本三级黄在线观看| 精品福利观看| 99热只有精品国产| 最近在线观看免费完整版| 午夜精品一区二区三区免费看| 日本黄大片高清| 亚洲内射少妇av| 狂野欧美白嫩少妇大欣赏| 麻豆一二三区av精品| 自拍偷自拍亚洲精品老妇| 嫩草影院新地址| 成人亚洲精品av一区二区| 成年版毛片免费区| 神马国产精品三级电影在线观看| 午夜亚洲福利在线播放| 中出人妻视频一区二区| 亚洲精品一卡2卡三卡4卡5卡| 久久婷婷人人爽人人干人人爱| 欧美在线一区亚洲| 在线播放国产精品三级| 亚洲中文字幕日韩| 国产一区亚洲一区在线观看| 国产麻豆成人av免费视频| 午夜日韩欧美国产| 亚洲一区二区三区色噜噜| 国产蜜桃级精品一区二区三区| 露出奶头的视频| 99热这里只有是精品50| 高清毛片免费观看视频网站| av在线播放精品| 一级毛片我不卡| 成人鲁丝片一二三区免费| 俺也久久电影网| 91在线精品国自产拍蜜月| 亚洲无线在线观看| 天美传媒精品一区二区| 日韩av在线大香蕉| 激情 狠狠 欧美| 一区二区三区免费毛片| 欧美极品一区二区三区四区| 亚洲电影在线观看av| 久久婷婷人人爽人人干人人爱| 可以在线观看的亚洲视频| 中文资源天堂在线| 人人妻人人澡人人爽人人夜夜 | 亚洲精品日韩av片在线观看| 美女xxoo啪啪120秒动态图| 日韩欧美国产在线观看| 国产探花在线观看一区二区| 成熟少妇高潮喷水视频| 国产精品1区2区在线观看.| 国产一区亚洲一区在线观看| 性色avwww在线观看| 久久久久久久亚洲中文字幕| 日本免费一区二区三区高清不卡| 一夜夜www| 可以在线观看毛片的网站| 亚洲国产精品sss在线观看| 久久久国产成人免费| h日本视频在线播放| 午夜a级毛片| aaaaa片日本免费| 国产精品不卡视频一区二区| 免费av毛片视频| 97热精品久久久久久| 99久国产av精品| 成熟少妇高潮喷水视频| 精品国内亚洲2022精品成人| 日本黄大片高清| 国产精品精品国产色婷婷| 舔av片在线| 91久久精品国产一区二区三区| 欧美丝袜亚洲另类| 日本一本二区三区精品| 中出人妻视频一区二区| 中文亚洲av片在线观看爽| 免费看美女性在线毛片视频| 啦啦啦啦在线视频资源| 欧美不卡视频在线免费观看| 国产欧美日韩精品亚洲av| 麻豆乱淫一区二区| 成人欧美大片| 欧美三级亚洲精品| 欧美性猛交╳xxx乱大交人| 亚洲一区高清亚洲精品| 亚洲国产精品合色在线| 免费av毛片视频| 别揉我奶头~嗯~啊~动态视频| 尾随美女入室| 久久亚洲精品不卡| 男人的好看免费观看在线视频| 大又大粗又爽又黄少妇毛片口| 亚洲av中文av极速乱| 日本免费a在线| 中文字幕免费在线视频6| 成年版毛片免费区| 久久中文看片网| 久99久视频精品免费| 九九在线视频观看精品| 国产精华一区二区三区| 在线天堂最新版资源| 97热精品久久久久久| 国产黄片美女视频| 亚洲精品久久国产高清桃花| 成人特级黄色片久久久久久久| 男女视频在线观看网站免费| av天堂中文字幕网| 欧美成人一区二区免费高清观看| 免费av不卡在线播放| 男女视频在线观看网站免费| 变态另类成人亚洲欧美熟女| 亚洲欧美清纯卡通| 国产毛片a区久久久久| 91在线精品国自产拍蜜月| 亚洲,欧美,日韩| 舔av片在线| 亚洲精华国产精华液的使用体验 | 精品免费久久久久久久清纯| 日韩精品中文字幕看吧| 亚洲国产精品成人综合色| 熟妇人妻久久中文字幕3abv| 最近视频中文字幕2019在线8| 久久久a久久爽久久v久久| 高清日韩中文字幕在线| 久久久久久久亚洲中文字幕| 亚洲熟妇熟女久久| 午夜久久久久精精品| 九九久久精品国产亚洲av麻豆| 亚洲精品乱码久久久v下载方式| 精品久久久久久久久亚洲| 成熟少妇高潮喷水视频| 精品一区二区免费观看| 又黄又爽又刺激的免费视频.| 亚洲一级一片aⅴ在线观看| 99久久成人亚洲精品观看| 搡女人真爽免费视频火全软件 | 国产男靠女视频免费网站| 美女 人体艺术 gogo| 大型黄色视频在线免费观看| 97超级碰碰碰精品色视频在线观看| av中文乱码字幕在线| 成年免费大片在线观看| 黄片wwwwww| 成年av动漫网址| 婷婷六月久久综合丁香| 一本精品99久久精品77| 国产精品一及| 精品国内亚洲2022精品成人| 久久久久久大精品| 久久久久免费精品人妻一区二区| 亚洲av一区综合| 一个人看视频在线观看www免费| 99在线人妻在线中文字幕| 国产欧美日韩精品一区二区| 我要看日韩黄色一级片| 特级一级黄色大片| 岛国在线免费视频观看| 小说图片视频综合网站| 禁无遮挡网站| 91久久精品电影网| 欧美色欧美亚洲另类二区| 无遮挡黄片免费观看| 晚上一个人看的免费电影| 日韩精品有码人妻一区| av黄色大香蕉| 国产高清视频在线观看网站| 少妇的逼水好多| 久久综合国产亚洲精品| 久久久久国产精品人妻aⅴ院| 亚洲aⅴ乱码一区二区在线播放| 日韩精品中文字幕看吧| 一本久久中文字幕| 国内少妇人妻偷人精品xxx网站| 最近的中文字幕免费完整| 国产av在哪里看| 一级av片app| 在线观看一区二区三区| 又爽又黄a免费视频| 国产一区亚洲一区在线观看| 波多野结衣巨乳人妻| 99九九线精品视频在线观看视频| 国产精品乱码一区二三区的特点| 97热精品久久久久久| 国产一级毛片七仙女欲春2| 精品人妻熟女av久视频| 精品人妻视频免费看| 午夜精品国产一区二区电影 | 天堂√8在线中文| 国产av麻豆久久久久久久| 噜噜噜噜噜久久久久久91| 亚洲无线观看免费| 深爱激情五月婷婷| 免费一级毛片在线播放高清视频| 色综合色国产| 中文字幕av成人在线电影| 国产私拍福利视频在线观看| 美女 人体艺术 gogo| 国产熟女欧美一区二区| 嫩草影院新地址| 免费人成在线观看视频色| 黄片wwwwww| 国产精品美女特级片免费视频播放器| 成年版毛片免费区| 久久精品国产亚洲av香蕉五月| 99久国产av精品国产电影| 国产精品国产高清国产av| 日本精品一区二区三区蜜桃| 欧美色视频一区免费| av福利片在线观看| 国国产精品蜜臀av免费| 国内久久婷婷六月综合欲色啪| 午夜福利在线在线| 午夜福利视频1000在线观看| 免费看光身美女| 欧美最黄视频在线播放免费| 天美传媒精品一区二区| 精品一区二区三区av网在线观看| 日产精品乱码卡一卡2卡三| 女人十人毛片免费观看3o分钟| 久久久久久伊人网av| 麻豆精品久久久久久蜜桃| 欧美三级亚洲精品| 久久6这里有精品| 尾随美女入室| 男女做爰动态图高潮gif福利片| 女人被狂操c到高潮| 不卡一级毛片| 性色avwww在线观看| 白带黄色成豆腐渣| 亚洲七黄色美女视频| 久久鲁丝午夜福利片| 日本爱情动作片www.在线观看 | 偷拍熟女少妇极品色| 色5月婷婷丁香| 欧美日韩乱码在线| 搡老熟女国产l中国老女人| 亚洲无线在线观看| 欧美高清成人免费视频www| 欧美性感艳星| 内射极品少妇av片p| 亚洲七黄色美女视频| 特级一级黄色大片| 日韩强制内射视频| 又爽又黄a免费视频| 国产真实伦视频高清在线观看| 久久久国产成人精品二区| 成人av一区二区三区在线看| 亚洲av第一区精品v没综合| 成人高潮视频无遮挡免费网站| 日日干狠狠操夜夜爽| 久久久久国产精品人妻aⅴ院| 校园人妻丝袜中文字幕| 欧美绝顶高潮抽搐喷水| 一区二区三区高清视频在线| 最近在线观看免费完整版| 亚洲电影在线观看av| 亚洲精品国产av成人精品 | 春色校园在线视频观看| 你懂的网址亚洲精品在线观看 | 男人舔女人下体高潮全视频| 亚洲第一电影网av| 亚州av有码| 青春草视频在线免费观看| 精品久久久久久久久av| 国产激情偷乱视频一区二区| 精品久久久久久久久av| 在线国产一区二区在线| 97在线视频观看| 国产在线男女| 亚洲熟妇中文字幕五十中出| 黄色欧美视频在线观看| 国产成人福利小说| 美女被艹到高潮喷水动态| 淫秽高清视频在线观看| 18+在线观看网站| 欧美一区二区亚洲| 亚洲精华国产精华液的使用体验 | 我要搜黄色片| 搞女人的毛片| 我要搜黄色片| 国产成人freesex在线 | 久久久久国产精品人妻aⅴ院| 亚洲aⅴ乱码一区二区在线播放| 久久鲁丝午夜福利片| av视频在线观看入口| 国产精品乱码一区二三区的特点| 岛国在线免费视频观看| 亚洲av五月六月丁香网| 卡戴珊不雅视频在线播放| 亚洲精品一卡2卡三卡4卡5卡| 中国美女看黄片| 欧美日韩综合久久久久久| 成人无遮挡网站| 全区人妻精品视频| 欧美xxxx性猛交bbbb| 亚洲美女视频黄频| 人人妻人人看人人澡| 午夜福利在线观看吧| 久久久午夜欧美精品| 尤物成人国产欧美一区二区三区| 最近视频中文字幕2019在线8| 国产视频一区二区在线看| 97超级碰碰碰精品色视频在线观看| 亚洲av.av天堂| 免费av观看视频| 亚洲高清免费不卡视频| 婷婷精品国产亚洲av在线| 午夜久久久久精精品| 18禁在线播放成人免费| 亚洲第一区二区三区不卡| 一级av片app| 国产亚洲91精品色在线| 日韩精品中文字幕看吧| 日韩 亚洲 欧美在线| 久久精品国产亚洲av香蕉五月| 在线国产一区二区在线| 久久久久九九精品影院| 成人三级黄色视频| 欧美潮喷喷水| 久久天躁狠狠躁夜夜2o2o| 亚洲激情五月婷婷啪啪| 午夜久久久久精精品| 免费大片18禁| 国产免费一级a男人的天堂| 亚洲av电影不卡..在线观看| 免费高清视频大片| 日韩,欧美,国产一区二区三区 | 国产亚洲av嫩草精品影院| 国产精品久久久久久亚洲av鲁大| 中文在线观看免费www的网站| 嫩草影院精品99| 欧美日韩综合久久久久久| 美女高潮的动态| 国产欧美日韩精品亚洲av| 老熟妇乱子伦视频在线观看| 一级黄片播放器| 久久久久久久久久黄片| 久久久久国产网址| 久久精品夜色国产| 美女黄网站色视频| 久久鲁丝午夜福利片| 熟女人妻精品中文字幕| 亚洲av.av天堂| 两性午夜刺激爽爽歪歪视频在线观看| 在线免费十八禁| 一区福利在线观看| 精品久久久久久久人妻蜜臀av| 午夜老司机福利剧场| 午夜影院日韩av| 免费观看精品视频网站| 亚洲精品影视一区二区三区av| 免费看a级黄色片| 人妻丰满熟妇av一区二区三区| 一个人观看的视频www高清免费观看| 人人妻,人人澡人人爽秒播| 亚洲人成网站高清观看| 日韩av在线大香蕉| 亚洲精品一区av在线观看| 日韩大尺度精品在线看网址| 六月丁香七月| 国产午夜精品久久久久久一区二区三区 | 国产精品一区二区免费欧美| 日韩成人av中文字幕在线观看 | 免费看日本二区| 久久久久久国产a免费观看| 熟女电影av网| 成熟少妇高潮喷水视频| 国产一区二区三区在线臀色熟女| 国产一级毛片七仙女欲春2| 亚洲美女搞黄在线观看 | 插逼视频在线观看| 精品午夜福利视频在线观看一区| 女生性感内裤真人,穿戴方法视频| 在线观看免费视频日本深夜| 91精品国产九色| 久久久久久大精品| 不卡一级毛片| 亚洲国产精品国产精品| 最近中文字幕高清免费大全6|