Network virus-epidemic model with the point-to-group information propagation. (English) Zbl 1162.68404

Summary: Epidemiology is one of the major issues in studying the spread of computer network viruses. In this paper, a new network virus-epidemic model, namely e-SEIR, is discussed. Unlike other existing computer virus propagation models, e-SEIR takes three important network environment factors into consideration, they are (1) multi-state antivirus, (2) latent period before the infected host becomes infectious and (3) point-to-group information propagation mode. Furthermore, several related dynamics properties are investigated, along with the analysis of how to control the network computer virus prevalence based on the equilibrium stability. The simulation results show that the proposed model can serve as a basis for understanding and simulating virus epidemics in network.


68N99 Theory of software
Full Text: DOI


[1] Anderson, R. M.; May, R. M., Infectious Diseases of Humans: Dynamics and Control (1992), Oxford University Press: Oxford University Press USA
[2] Britton, Nicholas F., Essential Mathematical Biology (2003), Springer-Verlag: Springer-Verlag London · Zbl 1037.92001
[3] Zou, C. C.; Gong, W.; Towsley, D., Worm propagation modeling and analysis under dynamic quarantine defense, (Proceedings of the ACM CCS Workshop on Rapid Malcode (2003), ACM), 51-60, October
[4] Chen, T.; Jamil, N., Effectiveness of quarantine in worm epidemics, (IEEE International Conference on Communications 2006 (2006), IEEE), 2142-2147, June
[5] Datta, S.; Wang, H., The effectiveness of vaccinations on the spread of email-borne computer viruses, (IEEE CCECE/CCGEI (2005), IEEE), 219-223, May
[6] Hethcote, H. W.; Van Den Driessche, P., Some epidemiological models with nonlinear incidence, Journal of Mathematical Biology, 29, 271-287 (1991) · Zbl 0722.92015
[7] Keeling, M. J.; Eames, K. T.D., Networks and epidemic models, Journal of the Royal Society Interface, 2, 4, 295-307 (2005)
[8] Kephart, J. O.; White, S. R.; Chess, D. M., Computers and epidemiology, IEEE Spectrum, 30, 20-26 (1993)
[9] J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses, in: IEEE Symposium on Security and Privacy, 1991, pp. 343-361.; J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses, in: IEEE Symposium on Security and Privacy, 1991, pp. 343-361.
[10] Kephart, J. O.; R White, S., Measuring and modeling computer virus prevalence, (IEEE Computer Security Symposium on Research in Security and Privacy (1993), IEEE), 2-15
[11] Korobeinikov, Andrei, Global properties of infectious disease models with nonlinear incidence, Bulletin of Mathematical Biology, 69, 1871-1886 (2007) · Zbl 1298.92101
[12] Kuperman, M.; Abramson, G., Small world effect in an epidemiological model, Physical Review Letters, 86, 13, 2909-2912 (2001)
[13] Li, M. Y.; Muldowney, James S.; Van Den Driessche, P., Global stability of SEIRS models in epidemiology, Canadian Applied Mathematics Quarterly, 7, 4, 409-425 (1999) · Zbl 0976.92020
[14] Madar, N.; Kalisky, T.; Cohen, R.; Ben Avraham, D.; Havlin, S., Immunization and epidemic dynamics in complex networks, European Physical Journal B, 38, 269-276 (2004)
[15] May, R. M.; Lloyd, A. L., Infection dynamics on scale-free networks, Physical Review E, 64, 066112, 1-3 (2001)
[16] Merkin, D. R.; Rakhmilevich, D., Introduction to the Theory of Stability (1997), Springer: Springer New York
[17] Liu, Wei Min; Levin, Simon A.; Iwasa, Yoh, Influence of nonlinear incidence rates upon the behavior of sirs epidemiological models, Journal of Mathematical Biology, 23, 187-204 (1986) · Zbl 0582.92023
[18] Mishra, Bimal Kumar; Jha, Navnit, Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Applied Mathematics and Computation, 190, 2, 1207-1212 (2007), July · Zbl 1117.92052
[19] Mishra, Bimal Kumar; Saini, Dinesh Kumar, SEIRS epidemic model with delay for transmission of malicious objects in computer network, Applied Mathematics and Computation, 188, 2, 1476-1482 (2007) · Zbl 1118.68014
[20] Moore, D.; Shannon, C.; Voelker, G. M.; Savage, S., Internet quarantine: requirements for containing self-propagating code, (Proceedings of IEEE INFOCOM2003 (2003), IEEE), April
[21] Pastor-Satorras, R.; Vespignani, A., Epidemics and immunization in scale-free networks, Handbook of Graphs and Networks: From the Genome to the Internet (2002), Wiley-VCH: Wiley-VCH Berlin
[22] Piqueira, J. R.C.; Navarro, B. F.; Monteiro, L. H.A., Epidemiological models applied to viruses in computer networks, Journal of Computer Science, 1, 1, 31-34 (2005)
[23] Robinson, R. C., An Introduction to Dynamical System: Continuous and Discrete (2004), Prentice Hall: Prentice Hall USA · Zbl 1073.37001
[24] Sun, Chengjun; Lin, Yiping; Tang, Shoupeng, Global stability for an special SEIR epidemic model with nonlinear incidence rates, Chaos Solitons and Fractals, 33, 290-297 (2007) · Zbl 1152.34357
[25] Wang, Y.; Wang, C. X., Modeling the effects of timing parameters on virus propagation, (The 2003 ACM Workshop on Rapid Malcode (2003), ACM), 61-66, October
[26] Ma.M. Williamson, J. Leill, An epidemiological model of virus spread and cleanup, 2003. <http://www.hpl.hp.com/techreports/>; Ma.M. Williamson, J. Leill, An epidemiological model of virus spread and cleanup, 2003. <http://www.hpl.hp.com/techreports/>
[27] Xu, Wenxiong; Zhang, Zhonghua, Global stability of SIR epidemiological model with vaccinal immunity and bilinear incidence rate, College Mathematics, 19, 6, 76-80 (2003), (in Chinese)
[28] Zou, C. C.; Gong, W. B.; Towsley, D.; Gao, L. X., The monitoring and early detection of internet worms, IEEE/ACM Transactions on Networking, 13, 5, 961-974 (2005)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.