Abstract
As one part of our life, there are many different types of security threats in social network, and the virtual assets of social networking users has become the attack target. It is of great importance to use security patches in social network to offset the security threats. However, the dissemination of security patches will bring challenges to energy consumptions and network resources which are limited in social networks. In this paper, we will construct a novel optimal dissemination strategy based on differential game to get the desired equilibrium between security risks and resource consumption. The optimal dissemination rate is obtained from the Nash equilibrium solution. Simulation analysis will be given to illustrate that resource consumption and virtual assets loss can be reduced based on the proposed scheme.
Similar content being viewed by others
References
Gao, H., Hu, J., Huang, T., Gao, H., Hu, J., Huang, T., et al. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56–63.
Viswanath, B., Post, A., Gummadi, K. P., & Mislove, A. (2010). An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review, 40(4), 363–374.
Mitchell, R., & Chen, R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.
Limsaiprom, P., & Tantatsanawong, P. (2010). Social network anomaly and attack patterns analysis. In Networked computing (INC), 2010 6th international conference on (pp. 1–6).
Atre, A., & Singh, R. (2016). A concept on intrusion detection system genetic algorithm, fuzzy logic and challenges—a review. International Journal of Scientific Research in Science, Engineering and Technology, 2(1), 287–289.
Okamura, H., Tokuzane, M., & Dohi, T. (2009). Optimal security patch release timing under non-homogeneous vulnerability-discovery processes. In 2009 20th international symposium on software reliability engineering (pp. 120–128).
Kim, K. J., & Kim, M. (2017). A study of integrity on the security patches system using PM-FTS. Wireless Personal Communications, 94(2), 165–173.
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Wu, Q. (2010). A survey of game theory as applied to network security. In System sciences (HICSS), 2010 43rd Hawaii international conference on (pp. 1–10).
Spyridopoulos, T., Karanikas, G., Tryfonas, T., & Oikonomou, G. (2013). A game theoretic defence framework against DoS/DDoS cyber attacks. Computers & Security, 38, 39–50.
Zhang, K. (2015). Analysis method based on rough attack-defense Bayes game model. Analysis, 9(1), 109–118.
Raj, N. A. M., & Bala, P. M. (2016). An attack-defense stochastic game approach for malicious nodes in MANETs. Imperial Journal of Interdisciplinary Research, 2(4), 1035–1040.
Beres, Y., & Griffin, J. (2012). Optimizing network patching policy decisions. In IFIP international information security conference (pp. 424–442).
Gallagher, J., Gonzalez, R., & Locasto, M. E. (2014). Verifying security patches. In Proceedings of the 2014 international workshop on privacy & security in programming (pp. 11–18).
Tong, S. M., Huang, C. C., Lin, F. Y., & Sun, Y. (2016). Patching assignment optimization for security vulnerabilities. International Arab Journal of Information Technology (IAJIT), 13(2), 267–273.
VojnoviĆ, M., & Ganesh, A. (2005). On the effectiveness of automatic patching. In Proceedings of the 2005 ACM workshop on Rapid malcode (pp. 41–50).
Zhu, Z., Cao, G., Zhu, S., Ranjan, S., & Nucci, A. (2012). A social network based patching scheme for worm containment in cellular networks. In Handbook of optimization in complex networks (pp. 505–533). New York: Springer.
Zhao, D., Peng, H., Li, L., Yang, Y., & Li, S. (2013). An efficient patch dissemination strategy for mobile networks. Mathematical Problems in Engineering, 497–504.
Khouzani, M. H. R., Sarkar, S., & Altman, E. (2012). Optimal dissemination of security patches in mobile wireless networks. IEEE Transactions on Information Theory, 58(7), 4714–4732.
Eshghi, S., Khouzani, M. H. R., Sarkar, S., & Venkatesh, S. S. (2016). Optimal patching in clustered malware epidemics. IEEE/ACM Transactions on Networking (TON), 24(1), 283–298.
Ioannidis, C., Pym, D., & Williams, J. (2012). Information security trade-offs and optimal patching policies. European Journal of Operational Research, 216(2), 434–444.
Yeung, D. W., & Petrosjan, L. A. (2006). Cooperative stochastic differential games. Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Miao, L., Li, S. & Wang, Z. Optimal Dissemination Strategy of Security Patch Based on Differential Game in Social Network. Wireless Pers Commun 98, 237–249 (2018). https://doi.org/10.1007/s11277-017-4866-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4866-z