×

A novel computer virus propagation model under security classification. (English) Zbl 1412.68017

Summary: In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.

MSC:

68M10 Network design and communication in computer systems

Software:

Sancus
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Kephart, J. O.; White, S. R., Directed-graph epidemiological models of computer viruses, Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
[2] Kjaergaard, M.; Brander, S.; Poulsen, F. M., Small but slow world: how network topology and burstiness slow down spreading, Physical Review E, 83, 83, 602-608 (2010)
[3] Castellano, C.; Pastor-Satorras, R., Thresholds for epidemic spreading in networks, Physical Review Letters, 105, 21 (2010) · doi:10.1103/PhysRevLett.105.218701
[4] Zhu, G.; Fu, X.; Chen, G., Global attractivity of a network-based epidemic SIS model with nonlinear infectivity, Communications in Nonlinear Science and Numerical Simulation, 17, 6, 2588-2594 (2012) · Zbl 1243.92048 · doi:10.1016/j.cnsns.2011.08.039
[5] Yang, L.-X.; Yang, X.; Liu, J.; Zhu, Q.; Gan, C., Epidemics of computer viruses: a complex-network approach, Applied Mathematics and Computation, 219, 16, 8705-8717 (2013) · Zbl 1288.92025 · doi:10.1016/j.amc.2013.02.031
[6] Yang, L.-X.; Yang, X., The spread of computer viruses over a reduced scale-free network, Physica A: Statistical Mechanics and Its Applications, 396, 173-184 (2014) · Zbl 1395.34058 · doi:10.1016/j.physa.2013.11.026
[7] Yang, L.-X.; Draief, M.; Yang, X., The impact of the network topology on the viral prevalence: a node-based approach, PLoS ONE, 10, 9 (2015) · doi:10.1371/journal.pone.0134507
[8] Mishra, B. K.; Haldar, K.; Sinha, D. N., Impact of information based classification on network epidemics, Scientific Reports, 6 (2016) · doi:10.1038/srep28289
[9] Fu, Z.; Sun, X.; Liu, Q.; Zhou, L.; Shu, J., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing, IEICE Transactions on Communications, E98B, 1, 190-200 (2015) · doi:10.1587/transcom.e98.b.190
[10] Liu, Q.; Cai, W.; Shen, J.; Fu, Z.; Liu, X.; Linge, N., A speculative approach to spatial‐temporal efficiency with multi‐objective optimization in a heterogeneous cloud environment, Security and Communication Networks, 9, 17, 4002-4012 (2016) · doi:10.1002/sec.1582
[11] Juve, G.; Deelman, E., Wrangler: Virtual cluster provisioning for the cloud, Proceedings of 20th ACM International Symposium on High-Performance Parallel and Distributed Computing, HPDC’11 · doi:10.1145/1996130.1996173
[12] Zeng, L. H.; Zhang, B. F.; Zhang, L. H., Virtual cluster constructing based on cloud computing platform, Microelectronics Computer, 27, 8, 31-39 (2010)
[13] Gan, C.; Yang, X.; Zhu, Q., Propagation of computer virus under the influences of infected external computers and removable storage media: modeling and analysis, Nonlinear Dynamics, 78, 2, 1349-1356 (2014) · doi:10.1007/s11071-014-1521-z
[14] Gan, C.; Yang, X., Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread, Communications in Nonlinear Science and Numerical Simulation, 22, 1-3, 611-622 (2014)
[15] Gan, C.; Yang, X.; Liu, W.; Zhu, Q., A propagation model of computer virus with nonlinear vaccination probability, Communications in Nonlinear Science and Numerical Simulation, 19, 1, 92-100 (2014) · doi:10.1016/j.cnsns.2013.06.018
[16] Gan, C., Modeling and analysis of the effect of network eigenvalue on viral spread, Nonlinear Dynamics, 84, 3, 1727-1733 (2016) · Zbl 1354.35062 · doi:10.1007/s11071-016-2600-0
[17] Amador, J.; Artalejo, J. R., Stochastic modeling of computer virus spreading with warning signals, Journal of the Franklin Institute. Engineering and Applied Mathematics, 350, 5, 1112-1138 (2013) · Zbl 1293.93539 · doi:10.1016/j.jfranklin.2013.02.008
[18] Liu, W.; Zhong, S., Web malware spread modelling and optimal control strategies, Scientific Reports, 7 (2017) · doi:10.1038/srep42308
[19] Yuan, H.; Liu, G.; Chen, G., On modeling the crowding and psychological effects in network-virus prevalence with nonlinear epidemic model, Applied Mathematics and Computation, 219, 5, 2387-2397 (2012) · Zbl 1308.92106 · doi:10.1016/j.amc.2012.07.059
[20] Qiu, L.; Zhang, Y.; Wang, F.; Mahajan, H. R.; Kyung, M., Trusted computer system evaluation criteria, Classified Information, 2007
[21] Noorman, J.; Agten, P.; Daniels, W., Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base, Proceedings of the Usenix Conference on Security
[22] Yang, L.-X.; Yang, X., The effect of infected external computers on the spread of viruses: a compartment modeling study, Physica A. Statistical Mechanics and Its Applications, 392, 24, 6523-6535 (2013) · Zbl 1395.34063 · doi:10.1016/j.physa.2013.08.024
[23] Thieme, H. R., Asymptotically autonomous differential equations in the plane, The Rocky Mountain Journal of Mathematics, 24, 1, 351-380 (1994) · Zbl 0811.34036 · doi:10.1216/rmjm/1181072470
[24] Robinson, R. C., An Introduction to Dynamical System: Continuous and Discrete (2004), New Jersey, NJ, USA: Prentice Hall, New Jersey, NJ, USA · Zbl 1073.37001
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.