Skip to main content

2017 | OriginalPaper | Buchkapitel

Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy

verfasst von : Yu Yao, Qiang Fu, Chuan Sheng, Wei Yang

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since the Morris worm occurred in 1988, malwares have threatened the network persistently. With rapid development of the Internet, network security issues become increasingly serious. Recently, the benign worms become a new active countermeasure to deal with the worm threat. In this paper, we propose a compositive-hybrid benign worm propagation model with quarantine strategy. Usually, quarantine strategy will lead to a time delay, and the worm propagation system will be unstable and out of control with the time delay increases. Then the existence condition and the stability of the positive equilibrium are derived. Through our derivation and analysis, the threshold \( \tau_{0} \) of Hopf bifurcation is obtained. The system will be stable when time delay \( \tau < \tau_{0} \). In addition, numerical experiments are performed and the effect of benign worms is displayed by comparing with the model that do not include benign worms. Furthermore, simulation experiments are carried out to verify our conclusions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Moore, D., Shannon, C., Claffy, K.: Code-Red: a case study on the spread and victims of an internet worm. In: ACM SIGCOMM Workshop on Internet Measurement 2002, pp. 273–284, Marseille, France, November 2002. doi:10.1145/637201.637244 Moore, D., Shannon, C., Claffy, K.: Code-Red: a case study on the spread and victims of an internet worm. In: ACM SIGCOMM Workshop on Internet Measurement 2002, pp. 273–284, Marseille, France, November 2002. doi:10.​1145/​637201.​637244
6.
Zurück zum Zitat Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 59–81. Springer, Heidelberg (2004). doi:10.1007/978-3-540-30143-1_4 CrossRef Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 59–81. Springer, Heidelberg (2004). doi:10.​1007/​978-3-540-30143-1_​4 CrossRef
7.
Zurück zum Zitat Kim, H.A., Karp, B.: Autograph: toward automated, distributed worm signature detection. In: USENIX Security Symposium, August 9–13, 2004, San Diego, CA, USA, pp. 271–286. DBLP (2004) Kim, H.A., Karp, B.: Autograph: toward automated, distributed worm signature detection. In: USENIX Security Symposium, August 9–13, 2004, San Diego, CA, USA, pp. 271–286. DBLP (2004)
9.
Zurück zum Zitat Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: USENIX Security Symposium, (pp. 149–167). USENIX Association (2002) Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: USENIX Security Symposium, (pp. 149–167). USENIX Association (2002)
10.
Zurück zum Zitat Streftaris, G., Gibson, G.J.: Statistical inference for stochastic epidemic models. In: Proceedings of the 17th International Workshop on Statistical Modeling, Chania, UK, pp. 609–616 (2002) Streftaris, G., Gibson, G.J.: Statistical inference for stochastic epidemic models. In: Proceedings of the 17th International Workshop on Statistical Modeling, Chania, UK, pp. 609–616 (2002)
11.
Zurück zum Zitat Martin, J.C., Burge III, L.L., Gill, J.I., Washington, A.N., Alfred, M.: Modelling the spread of mobile malware. Int. J. Comput. Aided Eng. Technol. 2(1), 3–14 (2010). doi:10.1504/IJCAET.2010.029592 Martin, J.C., Burge III, L.L., Gill, J.I., Washington, A.N., Alfred, M.: Modelling the spread of mobile malware. Int. J. Comput. Aided Eng. Technol. 2(1), 3–14 (2010). doi:10.​1504/​IJCAET.​2010.​029592
12.
Zurück zum Zitat Frauenthal, J.C.: Mathematical Modeling in Epidemiology, pp. 115–123. Springer, New York (1980)CrossRefMATH Frauenthal, J.C.: Mathematical Modeling in Epidemiology, pp. 115–123. Springer, New York (1980)CrossRefMATH
16.
Zurück zum Zitat Castaneda, F., Sezer, E.C., Xu, J.: WORM vs. WORM: preliminary study of an active counter-attack mechanism. In: ACM Workshop on Rapid Malcode, Worm 2004, Washington, DC, USA, pp. 83–93, October 2004. doi:10.1145/1029618.1029631 Castaneda, F., Sezer, E.C., Xu, J.: WORM vs. WORM: preliminary study of an active counter-attack mechanism. In: ACM Workshop on Rapid Malcode, Worm 2004, Washington, DC, USA, pp. 83–93, October 2004. doi:10.​1145/​1029618.​1029631
18.
Zurück zum Zitat Hassard, B., Kazarino, D., Wan, Y.: Theory and Application of Hopf Bifurcation. Cambridge University Press, Cambridge (1981) Hassard, B., Kazarino, D., Wan, Y.: Theory and Application of Hopf Bifurcation. Cambridge University Press, Cambridge (1981)
19.
Zurück zum Zitat Zou, C.C., Gong, W., Towsley, D.: Worm propagation modeling and analysis under dynamic quarantine defense. In: ACM Workshop on Rapid Malcode, vol. 23, pp. 51–60. ACM (2003) doi:10.1145/948187.948197 Zou, C.C., Gong, W., Towsley, D.: Worm propagation modeling and analysis under dynamic quarantine defense. In: ACM Workshop on Rapid Malcode, vol. 23, pp. 51–60. ACM (2003) doi:10.​1145/​948187.​948197
20.
Zurück zum Zitat Zhang, J.F., Li, W.T., Yan, X.P.: Hopf bifurcation and stability of periodic solutions in a delayed eco-epidemiological system. Appl. Math. Comput. 198(2), 865–876 (2008). doi:10.1016/j.amc.2007.09.045 Zhang, J.F., Li, W.T., Yan, X.P.: Hopf bifurcation and stability of periodic solutions in a delayed eco-epidemiological system. Appl. Math. Comput. 198(2), 865–876 (2008). doi:10.​1016/​j.​amc.​2007.​09.​045
Metadaten
Titel
Modeling and Hopf Bifurcation Analysis of Benign Worms with Quarantine Strategy
verfasst von
Yu Yao
Qiang Fu
Chuan Sheng
Wei Yang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-69471-9_24