Skip to main content

A Novel Dynamic Immunization Strategy for Computer Network Epidemics

  • Conference paper
Information Security Practice and Experience (ISPEC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3903))

Abstract

Current immunization strategies for computer network epidemics are based on the assumption that the vaccines are ready before the epidemics, and it is obviously unrealistic in computer network. Our study of the targeted immunization on Susceptible-Infected-Recovered (SIR) epidemiological model shows the efficiency of the targeted immunization decreases sharply with time gap between the vaccines and epidemics considered. We propose a two-phase propagating immunization strategy to suppress the computer network epidemics by the spreading of vaccines. During the two phases, the vaccines will go up the degree sequence in phase one and down the sequence in phase two, so the important nodes are protected and the revisit rate of the vaccines is reduced. The simulation results on the extended SIR model indicate our strategy can suppress the epidemics as effectively as the fastest anti-worm strategy, with an obvious lower spreading cost.

This paper is supported by National Special Fund for Ph.D program under grant 20050487040.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Code Red Worms, http://www.caida.org/analysis/security/code-red/

  2. Blaster Worms, http://www.cert.org/advisories/CA-2003-20.html

  3. Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: Proc. of the 11th USENIX Security Symposium (Security 2002), San Francisco (August 2002)

    Google Scholar 

  4. Sapphire Worm, http://www.caida.org/analysis/security/sapphire/

  5. Anderson, R.M., May, R.M.: Infectious Diseases in Humans. Oxford University Press, Oxford (1992)

    Google Scholar 

  6. May, R.M., Lloyd, A.L.: Infection Dynamics on Scale-free Networks. Physical Review E 64 (2001)

    Google Scholar 

  7. Dezso, Z., Barabasi, A.-L.: Halting Viruses in Scale-free Networks. Physical Review E 65, 055103 (2002)

    Google Scholar 

  8. Pastor-Satorras, R., Vespignani, A.: Epidemics and Immunization in Scale-free Networks. In: Handbook of Graphs and Networks: From the Genome to the Internet. Wiley-VCH, Berlin (2002)

    Google Scholar 

  9. Chen, L.-C., Carley, K.M.: The Impact of Countermeasure Spreading on the Propagation of Computer Viruses. IEEE Transactions on Systems, Man and Cybernetics, Part B: Cybernetics 34(2), 823–833 (2004)

    Article  Google Scholar 

  10. Castaneda, F., Sezer, E.C., Xu, J.: WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism. In: Proc. 2004 ACM Workshop Rapid Malcode (WORM 2004), pp. 83–93. ACM Press, New York (2004)

    Chapter  Google Scholar 

  11. Yook, S.-H., Jeong, H., Barabási, A.-L.: Modeling the Internet’s large-scale Topology. Proceedings of the National Academy of Sciences 99, 13382–13386 (2002)

    Article  Google Scholar 

  12. Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)

    Article  MathSciNet  Google Scholar 

  13. Ebel, H., Mielsch, L.-I., Bornholdt, S.: Scale-free topology of e-mail networks. Physical Review E 66, 035103 (2002)

    Google Scholar 

  14. Guardiola, X., Guimera, R., Arenas, A., Diaz-Guilera, A., Streib, D.: Macro- and microstructure of trust networks. LAN Amaral (2002), LANL archive: cond-mat/0206240

    Google Scholar 

  15. Barabási, A.-L., Albert, R., Jeong, H.: Mean-field theory for scale-free random networks. Physica A 272, 173–187 (1999)

    Article  Google Scholar 

  16. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  17. Hethcote, H.W.: The mathematics of infectious diseases. SIAM Review 42, 599–653 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  18. Cohen, R., Erez, K., ben-Avraham, D., Havlin, S.: Resilience of the Internet to random breakdown. Physics Review Letter 85, 4626 (2000)

    Article  Google Scholar 

  19. Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in scale-free Networks. Physics Review Letter 86, 3200 (2001)

    Article  Google Scholar 

  20. Pastor-Satorras, R., Vespignani, A.: Immunization of complex networks. Physical Review E 65, 036104 (2002)

    Google Scholar 

  21. Lloyd, A.L., May, R.M.: How Viruses Spread among Computers and People. Science 292, 1316 (2001)

    Article  Google Scholar 

  22. W32.Nachi.Worm, http://www.ccert.edu.cn/announce/show.php?handle=93

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tao, Z., Jin, H., Han, Z., Cheng, E. (2006). A Novel Dynamic Immunization Strategy for Computer Network Epidemics. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2006. Lecture Notes in Computer Science, vol 3903. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11689522_10

Download citation

  • DOI: https://doi.org/10.1007/11689522_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33052-3

  • Online ISBN: 978-3-540-33058-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics