An approach to finding the cost-effective immunization targets for information assurance

被引:6
作者
Liu, Guannan [1 ]
Zhang, Jin [2 ]
Chen, Guoqing [1 ]
机构
[1] Tsinghua Univ, Sch Econ & Management, Dept Management Sci & Engn, Beijing 100084, Peoples R China
[2] Renmin Univ China, Sch Business, Dept Management Sci & Engn, Beijing 100872, Peoples R China
基金
中国国家自然科学基金;
关键词
Information assurance; Network immunization; Savability; Cost-effective immunization targets (CEIT); SECURITY;
D O I
10.1016/j.dss.2014.08.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information assurance is increasing in importance as threats abound in the highly connected world of e-business. For enterprises, the goal is to achieve a secure information environment in a cost-effective manner. This paper focuses on the issue of how to cost-effectively immunize an enterprise's network to prevent threats (e.g., virus, rumor) from invading and spreading. An approach, namely Cost-Effective Immunization Targets (CEIT) is proposed as a means to identify the cost-effective immunization targets and provide direct cost/benefit trade-off solutions for practitioners. In the approach, a novel concept, savability, is introduced as an extension of return on security investment (ROSI), with the reduced expected infection probability as mitigated risks through immunization. Meanwhile, a bond percolation process, which can be done in just a single graph traversal, is incorporated to simplify the estimation of expected infection probability in place of repeated diffusion simulations. Theoretical analysis proves that the proposed approach can approximate the optimal solutions within a definite lower bound. Finally, experiments on real-world information network datasets reveal that the algorithm CEIT outperforms other immunization strategies in both homogeneous and heterogeneous cost cases. Further, a case study indicates that the CEIT-identified immunization targets are more likely to 'save' the important nodes with high potential infection loss, avoiding redundant immunization. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:40 / 52
页数:13
相关论文
共 45 条
  • [1] Error and attack tolerance of complex networks
    Albert, R
    Jeong, H
    Barabási, AL
    [J]. NATURE, 2000, 406 (6794) : 378 - 382
  • [2] The economics of information security
    Anderson, Ross
    Moore, Tyler
    [J]. SCIENCE, 2006, 314 (5799) : 610 - 613
  • [3] [Anonymous], J R SOC INTERFACE
  • [4] [Anonymous], INF SEC BREACH SURV
  • [5] [Anonymous], 2010 IEEE 10 INT C D
  • [6] [Anonymous], 2013, INFORM SYST RES, V24, P128, DOI DOI 10.1287/isre.1120.0461
  • [7] [Anonymous], Proceedings of the 20th international conference on World wide web, DOI DOI 10.1145/1963405.1963504
  • [8] [Anonymous], P 5 ANN WORKSH EC IN
  • [9] [Anonymous], 2011, P 20 INT C WORLD WID, DOI [10.1145/1963405.1963499, DOI 10.1145/1963405.1963499]
  • [10] [Anonymous], 2004, COMPUTER VIRUS PREVA