Skip to main content

Selective Attack in Virus Propagation Processes

  • Conference paper
ICT Innovations 2010 (ICT Innovations 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 83))

Included in the following conference series:

  • 864 Accesses

Abstract

Computer viruses are still one of the main security threats in the Internet. For virus outbreaks prevention, we need to fully understand their spreading dynamics and how it can be affected. Many viruses include inter-human contacts in their spreading and observations have shown that these inter-contact times are often heavy-tail distributed. The contacts between humans form a logical network over which viruses spread and the topology of this network plays important role in the spreading dynamics. The rapidity of spreading also depends on the location of initially infected nodes in the network. By selectively infecting the most influential nodes in the network the virus outbreak can grow faster. We analyze this effect for networks with different topologies, by using nodes selection based on several node centrality measures and the k-medoids graph clustering algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cohen, F.: Computer Viruses. PhD Thesis, University of Southern California (1985)

    Google Scholar 

  2. Cohen, F.: Computer viruses: theory and experiments. Computers&Security 6, 22–35 (1987)

    Google Scholar 

  3. The WildList Organization International, http://www.wildlist.org

  4. Wang, P., González, M.C., Hidalgo, C.A., Barabási, A.-L.: Understanding the Spreading Patterns of Mobile Phone Viruses. Science 324, 1071–1076 (2009)

    Article  Google Scholar 

  5. Hu, H., Myers, S., Colizza, V., Vespignani, A.: WiFi networks and malware epidemiology. Proc. of the National Academy of Sciences 106, 1318–1323 (2009)

    Article  Google Scholar 

  6. Virus Bulletin, http://www.virusbtn.com

  7. Barabasi, A.L.: Modeling bursts and heavy tails in human dynamics. Phys. Rev. E 73 (2006)

    Google Scholar 

  8. Vazquez, A.: Impact of memory on human dynamics. Physica A: Statistical and Theoretical Physics 373, 747–752 (2007)

    Article  Google Scholar 

  9. Dewes, C., Wichmann, A., Feldmann, A.: An analysis of Internet chat systems. In: Proc. of the 2003 ACM/SIGCOMM Internet Measurement Conference, pp. 51–64 (2003)

    Google Scholar 

  10. Vazquez, A., Racz, B., Lukacs, A., Barabasi, A.L.: Impact of Non-Poissonian Activity Patterns on Spreading Processes. Physical Review Letters 98 (2007)

    Google Scholar 

  11. Mirchev, M., Kocarev, L.: Non-Poisson Processes of Email Virus Propagation. In: ICT Innovations 2009, pp. 187–196. Springer, Heidelberg (2009)

    Google Scholar 

  12. Zou, C., Towsley, D., Gong, W.: Email Virus Propagation Modeling and Analysis. Technical Report TR-CSE-03-04. Univ. of Massachusetts. Amherst (2003)

    Google Scholar 

  13. Ebel, H., Mielsch, L.-I., Bornholdt, S.: Scale-free topology of e-mail networks. Physical Review E 66 (2002)

    Google Scholar 

  14. Smith, R.D.: Instant Messaging as a Scale-Free Network. cond-mat/0206378v2 (2002)

    Google Scholar 

  15. Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86(14), 3200–3203 (2001)

    Article  Google Scholar 

  16. Albert, R., Barabasi, A.-L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74, 47–97 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  17. Dodds, P.S., Muhamad, R., Watts, D.J.: An Experimental Study of Search in Global Social. Science 301, 827–829 (2003)

    Article  Google Scholar 

  18. Canright, G.S., Engø-Monsen, K.: Spreading on Networks: A Topographic View. Complexus 3, 131–146 (2006)

    Article  MATH  Google Scholar 

  19. Erdos, P., Renyi, A.: On random graphs. Publicationes Mathematicae 6, 290–297 (1959)

    MathSciNet  MATH  Google Scholar 

  20. Watts, D.J., Strogatz, S.H.: Collective dynamics of small-world networks. Nature 393 (1998)

    Google Scholar 

  21. Barabási, A.-L., Albert, R.: Emergence of scaling in random networks. Science 286, 509–512 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  22. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45(2), 167–256 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  23. Erramilli, A., Roughan, M., Veitch, D., Willinger, W.: Self-Similar Traffic and Network Dynamics. Proc. of the IEEE 90(5), 800–819 (2002)

    Article  Google Scholar 

  24. Erramilli, A., Singh, R.P., Pruthi, P.: An application of deterministic chaotic maps to model packet traffic. Queueing Systems 20, 171–206 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  25. Freeman, L.: Centrality in Social Networks. Social Networks 1, 215–239 (1979)

    Article  Google Scholar 

  26. Kaufman, L., Rousseeuw, P.: Finding groups in data: An introduction to cluster analysis. In: Applied Probability and Statistics. Wiley, New York (1990)

    Google Scholar 

  27. MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proc. of the 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281–297 (1967)

    Google Scholar 

  28. Rattigan, M.J., Maier, M., Jensen, D.: Graph Clustering with Network Structure Indices. In: Proceedings of the 24th International Conference on Machine Learning, vol. 277, pp. 783–790 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mirchev, M., Mishkovski, I., Kocarev, L. (2011). Selective Attack in Virus Propagation Processes. In: Gusev, M., Mitrevski, P. (eds) ICT Innovations 2010. ICT Innovations 2010. Communications in Computer and Information Science, vol 83. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19325-5_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19325-5_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19324-8

  • Online ISBN: 978-3-642-19325-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics