Considering Quarantine in the SIRA Malware Propagation Model

被引:21
作者
Piqueira, Jose Roberto C. [1 ]
Batistela, Cristiane M. [1 ]
机构
[1] Univ Sao Paulo, Escola Politecn, Ave Prof Luciano Gualberto,Travessa 3,158, BR-05508900 Sao Paulo, SP, Brazil
关键词
COMPUTER VIRUS; MATHEMATICAL-THEORY; MALICIOUS OBJECTS; TRANSMISSION;
D O I
10.1155/2019/6467104
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As the beginning of the 21st century was marked by a strong development in data science and, consequently, in computer networks, models for designing preventive actions against intruding, data stealing, and destruction became mandatory. Following this line, several types of epidemiological models have been developed and improved, considering different operational approaches. The development of the research line using traditional SIR(Susceptible, Infected, Removed) model for data networks started in the 1990s. In 2005, an epidemiological compartmental model containing antidotal nodes, SIRA (Susceptible, Infected, Removed, Antidotal), was introduced to study how the antivirus policies affect the network reliability. The idea here is to study the consequence of quarantine actions in a network by modifying the SIRA model, introducing quarantine nodes generating the SIQRA (Susceptible, Infected, Quarantine, Removed, Antidotal) model. Analytical and numerical approaches result in parameter conditions for the existence and stability of disease-free and endemic equilibrium points for two different cases: saturation and nonsaturation of the quarantine population block. Based on these results, operational actions can be planned to improve the network reliability.
引用
收藏
页数:8
相关论文
共 42 条
[1]   The stochastic SIRA model for computer viruses [J].
Amador, Julia .
APPLIED MATHEMATICS AND COMPUTATION, 2014, 232 :1112-1124
[2]   Stochastic modeling of computer virus spreading with warning signals [J].
Amador, Julia ;
Artalejo, Jesus R. .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2013, 350 (05) :1112-1138
[3]  
Bi J., 2017, DAMAGE INFLICTED COM
[4]   On the Optimal Dynamic Control Strategy of Disruptive Computer Virus [J].
Bi, Jichao ;
Yang, Xiaofan ;
Wu, Yingbo ;
Xiong, Qingyu ;
Wen, Junhao ;
Tang, Yuan Yan .
DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2017, 2017
[5]  
Boots J., 1983, NONLINEAR OSCILLATIO
[6]  
Chen TM, 2006, IEEE ICC, P2142
[7]  
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[8]   Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus [J].
Dong, Tao ;
Liao, Xiaofeng ;
Li, Huaqing .
ABSTRACT AND APPLIED ANALYSIS, 2012,
[9]   Optimal Patching in Clustered Malware Epidemics [J].
Eshghi, Soheil ;
Khouzani, M. H. R. ;
Sarkar, Saswati ;
Venkatesh, Santosh S. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (01) :283-298
[10]   A propagation model of computer virus with nonlinear vaccination probability [J].
Gan, Chenquan ;
Yang, Xiaofan ;
Liu, Wanping ;
Zhu, Qingyi .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) :92-100