Skip to main content
Log in

Optimal Dissemination Strategy of Security Patch Based on Differential Game in Social Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As one part of our life, there are many different types of security threats in social network, and the virtual assets of social networking users has become the attack target. It is of great importance to use security patches in social network to offset the security threats. However, the dissemination of security patches will bring challenges to energy consumptions and network resources which are limited in social networks. In this paper, we will construct a novel optimal dissemination strategy based on differential game to get the desired equilibrium between security risks and resource consumption. The optimal dissemination rate is obtained from the Nash equilibrium solution. Simulation analysis will be given to illustrate that resource consumption and virtual assets loss can be reduced based on the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Gao, H., Hu, J., Huang, T., Gao, H., Hu, J., Huang, T., et al. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56–63.

  2. Viswanath, B., Post, A., Gummadi, K. P., & Mislove, A. (2010). An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review, 40(4), 363–374.

    Article  Google Scholar 

  3. Mitchell, R., & Chen, R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.

    Article  Google Scholar 

  4. Limsaiprom, P., & Tantatsanawong, P. (2010). Social network anomaly and attack patterns analysis. In Networked computing (INC), 2010 6th international conference on (pp. 1–6).

  5. Atre, A., & Singh, R. (2016). A concept on intrusion detection system genetic algorithm, fuzzy logic and challenges—a review. International Journal of Scientific Research in Science, Engineering and Technology, 2(1), 287–289.

    Google Scholar 

  6. Okamura, H., Tokuzane, M., & Dohi, T. (2009). Optimal security patch release timing under non-homogeneous vulnerability-discovery processes. In 2009 20th international symposium on software reliability engineering (pp. 120–128).

  7. Kim, K. J., & Kim, M. (2017). A study of integrity on the security patches system using PM-FTS. Wireless Personal Communications, 94(2), 165–173.

    Article  Google Scholar 

  8. Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Wu, Q. (2010). A survey of game theory as applied to network security. In System sciences (HICSS), 2010 43rd Hawaii international conference on (pp. 1–10).

  9. Spyridopoulos, T., Karanikas, G., Tryfonas, T., & Oikonomou, G. (2013). A game theoretic defence framework against DoS/DDoS cyber attacks. Computers & Security, 38, 39–50.

    Article  Google Scholar 

  10. Zhang, K. (2015). Analysis method based on rough attack-defense Bayes game model. Analysis, 9(1), 109–118.

    Google Scholar 

  11. Raj, N. A. M., & Bala, P. M. (2016). An attack-defense stochastic game approach for malicious nodes in MANETs. Imperial Journal of Interdisciplinary Research, 2(4), 1035–1040.

    Google Scholar 

  12. Beres, Y., & Griffin, J. (2012). Optimizing network patching policy decisions. In IFIP international information security conference (pp. 424–442).

  13. Gallagher, J., Gonzalez, R., & Locasto, M. E. (2014). Verifying security patches. In Proceedings of the 2014 international workshop on privacy & security in programming (pp. 11–18).

  14. Tong, S. M., Huang, C. C., Lin, F. Y., & Sun, Y. (2016). Patching assignment optimization for security vulnerabilities. International Arab Journal of Information Technology (IAJIT)13(2), 267–273.

    Google Scholar 

  15. VojnoviĆ, M., & Ganesh, A. (2005). On the effectiveness of automatic patching. In Proceedings of the 2005 ACM workshop on Rapid malcode (pp. 41–50).

  16. Zhu, Z., Cao, G., Zhu, S., Ranjan, S., & Nucci, A. (2012). A social network based patching scheme for worm containment in cellular networks. In Handbook of optimization in complex networks (pp. 505–533). New York: Springer.

  17. Zhao, D., Peng, H., Li, L., Yang, Y., & Li, S. (2013). An efficient patch dissemination strategy for mobile networks. Mathematical Problems in Engineering, 497–504.

  18. Khouzani, M. H. R., Sarkar, S., & Altman, E. (2012). Optimal dissemination of security patches in mobile wireless networks. IEEE Transactions on Information Theory, 58(7), 4714–4732.

    Article  MathSciNet  MATH  Google Scholar 

  19. Eshghi, S., Khouzani, M. H. R., Sarkar, S., & Venkatesh, S. S. (2016). Optimal patching in clustered malware epidemics. IEEE/ACM Transactions on Networking (TON), 24(1), 283–298.

    Article  Google Scholar 

  20. Ioannidis, C., Pym, D., & Williams, J. (2012). Information security trade-offs and optimal patching policies. European Journal of Operational Research, 216(2), 434–444.

    Article  Google Scholar 

  21. Yeung, D. W., & Petrosjan, L. A. (2006). Cooperative stochastic differential games. Berlin: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Miao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Miao, L., Li, S. & Wang, Z. Optimal Dissemination Strategy of Security Patch Based on Differential Game in Social Network. Wireless Pers Commun 98, 237–249 (2018). https://doi.org/10.1007/s11277-017-4866-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4866-z

Keywords

Navigation