The Impact of Search Engines on Virus Propagation

被引:0
作者
Fu, Cai
Ke, Zhaokang
Zhang, Yunhe [1 ]
Chen, Xiwu
Cao, Liqing
Yin, Mingjun
机构
[1] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
关键词
Search engine; virus propagation; dynamic method; community networks; COMPLEX NETWORKS; CONTAINMENT; HIV;
D O I
10.1142/S0218126621502303
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of computers and the development of information engineering, the emergence of search engines makes it possible to get the information needed from big data quickly and efficiently. However, in recent years, a multiplicity of new viruses have been propagated by search engines. Many researchers choose to cut off the source of virus propagation, ignoring the virus immunization strategy based on the search engine. In this paper, we analyze the impact of search engines on virus propagation. First, considering the immune effect and cost, two kinds of immune mechanisms based on the search engine that have greater practicability are defined. Second, immune mechanisms based on the search engine are theoretically analyzed by the iteration method and the dynamic method. The results show that this immunization strategy can slow down or eliminate the propagation of a virus to a certain extent. Third, three real social network data sets are used to simulate and analyze the immune mechanism. We find that when the proportion of nodes being infected and the proportion of infected nodes being identified by the search engine satisfy a certain relationship, our immune mechanism can inhibit the spread of viruses, which confirms our theoretical analysis results.
引用
收藏
页数:18
相关论文
共 45 条
[31]   Efficient immunization strategies on complex networks [J].
Nian, Fuzhong ;
Wang, Xingyuan .
JOURNAL OF THEORETICAL BIOLOGY, 2010, 264 (01) :77-83
[32]   Epidemic Threshold for the Susceptible-Infectious-Susceptible Model on Random Networks [J].
Parshani, Roni ;
Carmi, Shai ;
Havlin, Shlomo .
PHYSICAL REVIEW LETTERS, 2010, 104 (25)
[33]   Immunization of complex networks [J].
Pastor-Satorras, R ;
Vespignani, A .
PHYSICAL REVIEW E, 2002, 65 (03) :1-036104
[34]   Modeling and automated containment of worms [J].
Sellke, Sarah H. ;
Shroff, Ness B. ;
Bagchi, Saurabh .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) :71-86
[35]   A Large-Scale Empirical Study of Conficker [J].
Shin, Seungwon ;
Gu, Guofei ;
Reddy, Narasimha ;
Lee, Christopher P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :676-690
[36]   Targeted Cyberattacks: A Superset of Advanced Persistent Threats [J].
Sood, Aditya K. ;
Enbody, Richard J. .
IEEE SECURITY & PRIVACY, 2013, 11 (01) :54-61
[37]  
Soska K, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P625
[38]   Simulation of an SEIR infectious disease model on the dynamic contact network of conference attendees [J].
Stehle, Juliette ;
Voirin, Nicolas ;
Barrat, Alain ;
Cattuto, Ciro ;
Colizza, Vittoria ;
Isella, Lorenzo ;
Regis, Corinne ;
Pinton, Jean-Francois ;
Khanafer, Nagham ;
Van den Broeck, Wouter ;
Vanhems, Philippe .
BMC MEDICINE, 2011, 9
[39]   A Tensor-Based Big-Data-Driven Routing Recommendation Approach for Heterogeneous Networks [J].
Wang, Xiaokang ;
Yang, Laurence T. ;
Kuang, Liwei ;
Liu, Xingang ;
Zhang, Qingxia ;
Deen, M. Jamal .
IEEE NETWORK, 2019, 33 (01) :64-69
[40]   Modeling and Analysis on the Propagation Dynamics of Modern Email Malware [J].
Wen, Sheng ;
Zhou, Wei ;
Zhang, Jun ;
Xiang, Yang ;
Zhou, Wanlei ;
Jia, Weijia ;
Zou, Cliff C. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) :361-374