{"title":"The Spread of Malicious Software Research and Prevention","authors":"Y. Jiang, Wang Li","doi":"10.1109/ETCS.2010.96","DOIUrl":null,"url":null,"abstract":"Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, describes the characteristics of their behavior, focused on the spread of malicious software models, including the SI model, SIS model and the SIR model, the model adopted by the master The spread of malicious software and route of transmission, and then studied the response to stop the malicious software, including the pre-defense, and defense in the matter after the repair, and Practice has proved that this method is very effective to guard against malicious software.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.96","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, describes the characteristics of their behavior, focused on the spread of malicious software models, including the SI model, SIS model and the SIR model, the model adopted by the master The spread of malicious software and route of transmission, and then studied the response to stop the malicious software, including the pre-defense, and defense in the matter after the repair, and Practice has proved that this method is very effective to guard against malicious software.