Abstract
Current immunization strategies for computer network epidemics are based on the assumption that the vaccines are ready before the epidemics, and it is obviously unrealistic in computer network. Our study of the targeted immunization on Susceptible-Infected-Recovered (SIR) epidemiological model shows the efficiency of the targeted immunization decreases sharply with time gap between the vaccines and epidemics considered. We propose a two-phase propagating immunization strategy to suppress the computer network epidemics by the spreading of vaccines. During the two phases, the vaccines will go up the degree sequence in phase one and down the sequence in phase two, so the important nodes are protected and the revisit rate of the vaccines is reduced. The simulation results on the extended SIR model indicate our strategy can suppress the epidemics as effectively as the fastest anti-worm strategy, with an obvious lower spreading cost.
This paper is supported by National Special Fund for Ph.D program under grant 20050487040.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Code Red Worms, http://www.caida.org/analysis/security/code-red/
Blaster Worms, http://www.cert.org/advisories/CA-2003-20.html
Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: Proc. of the 11th USENIX Security Symposium (Security 2002), San Francisco (August 2002)
Sapphire Worm, http://www.caida.org/analysis/security/sapphire/
Anderson, R.M., May, R.M.: Infectious Diseases in Humans. Oxford University Press, Oxford (1992)
May, R.M., Lloyd, A.L.: Infection Dynamics on Scale-free Networks. Physical Review EÂ 64 (2001)
Dezso, Z., Barabasi, A.-L.: Halting Viruses in Scale-free Networks. Physical Review EÂ 65, 055103 (2002)
Pastor-Satorras, R., Vespignani, A.: Epidemics and Immunization in Scale-free Networks. In: Handbook of Graphs and Networks: From the Genome to the Internet. Wiley-VCH, Berlin (2002)
Chen, L.-C., Carley, K.M.: The Impact of Countermeasure Spreading on the Propagation of Computer Viruses. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics 34(2), 823–833 (2004)
Castaneda, F., Sezer, E.C., Xu, J.: WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism. In: Proc. 2004 ACM Workshop Rapid Malcode (WORM 2004), pp. 83–93. ACM Press, New York (2004)
Yook, S.-H., Jeong, H., Barabási, A.-L.: Modeling the Internet’s large-scale Topology. Proceedings of the National Academy of Sciences 99, 13382–13386 (2002)
Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)
Ebel, H., Mielsch, L.-I., Bornholdt, S.: Scale-free topology of e-mail networks. Physical Review EÂ 66, 035103 (2002)
Guardiola, X., Guimera, R., Arenas, A., Diaz-Guilera, A., Streib, D.: Macro- and microstructure of trust networks. LAN Amaral (2002), LANL archive: cond-mat/0206240
Barabási, A.-L., Albert, R., Jeong, H.: Mean-field theory for scale-free random networks. Physica A 272, 173–187 (1999)
Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)
Hethcote, H.W.: The mathematics of infectious diseases. SIAM Review 42, 599–653 (2000)
Cohen, R., Erez, K., ben-Avraham, D., Havlin, S.: Resilience of the Internet to random breakdown. Physics Review Letter 85, 4626 (2000)
Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in scale-free Networks. Physics Review Letter 86, 3200 (2001)
Pastor-Satorras, R., Vespignani, A.: Immunization of complex networks. Physical Review EÂ 65, 036104 (2002)
Lloyd, A.L., May, R.M.: How Viruses Spread among Computers and People. Science 292, 1316 (2001)
W32.Nachi.Worm, http://www.ccert.edu.cn/announce/show.php?handle=93
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tao, Z., Jin, H., Han, Z., Cheng, E. (2006). A Novel Dynamic Immunization Strategy for Computer Network Epidemics. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2006. Lecture Notes in Computer Science, vol 3903. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11689522_10
Download citation
DOI: https://doi.org/10.1007/11689522_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33052-3
Online ISBN: 978-3-540-33058-5
eBook Packages: Computer ScienceComputer Science (R0)