The Impact of Search Engines on Virus Propagation

被引:0
作者
Fu, Cai
Ke, Zhaokang
Zhang, Yunhe [1 ]
Chen, Xiwu
Cao, Liqing
Yin, Mingjun
机构
[1] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
关键词
Search engine; virus propagation; dynamic method; community networks; COMPLEX NETWORKS; CONTAINMENT; HIV;
D O I
10.1142/S0218126621502303
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of computers and the development of information engineering, the emergence of search engines makes it possible to get the information needed from big data quickly and efficiently. However, in recent years, a multiplicity of new viruses have been propagated by search engines. Many researchers choose to cut off the source of virus propagation, ignoring the virus immunization strategy based on the search engine. In this paper, we analyze the impact of search engines on virus propagation. First, considering the immune effect and cost, two kinds of immune mechanisms based on the search engine that have greater practicability are defined. Second, immune mechanisms based on the search engine are theoretically analyzed by the iteration method and the dynamic method. The results show that this immunization strategy can slow down or eliminate the propagation of a virus to a certain extent. Third, three real social network data sets are used to simulate and analyze the immune mechanism. We find that when the proportion of nodes being infected and the proportion of infected nodes being identified by the search engine satisfy a certain relationship, our immune mechanism can inhibit the spread of viruses, which confirms our theoretical analysis results.
引用
收藏
页数:18
相关论文
共 45 条
[1]   Statistical mechanics of complex networks [J].
Albert, R ;
Barabási, AL .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :47-97
[2]  
ANDERSON R M, 1991
[3]  
[Anonymous], 2015, ARXIV150403342, DOI DOI 10.1016/J.OSNEM.2017.09.001
[4]  
[Anonymous], 2013, 22 USENIX SEC S USEN
[5]  
Aoki K., 2011, 2011 International Workshop on Cyberspace Safety and Security, P1, DOI 10.1109/CSS.2011.6058563
[6]  
Badra M., 2007, P 3 INT C MOBILE MUL, P1
[7]   Complex networks: Structure and dynamics [J].
Boccaletti, S. ;
Latora, V. ;
Moreno, Y. ;
Chavez, M. ;
Hwang, D. -U. .
PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS, 2006, 424 (4-5) :175-308
[8]  
Borgolte Kevin., 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security, P109
[9]   Efficient immunization strategies for computer networks and populations [J].
Cohen, R ;
Havlin, S ;
ben-Avraham, D .
PHYSICAL REVIEW LETTERS, 2003, 91 (24)
[10]   Analyzing and modeling real-world phenomena with complex networks: a survey of applications [J].
Costa, Luciano da Fontoura ;
Oliveira, Osvaldo N., Jr. ;
Travieso, Gonzalo ;
Rodrigues, Francisco Aparecido ;
Villas Boas, Paulino Ribeiro ;
Antiqueira, Lucas ;
Viana, Matheus Palhares ;
Correa Rocha, Luis Enrique .
ADVANCES IN PHYSICS, 2011, 60 (03) :329-412