Rejuvenation and the Spread of Epidemics in General Topologies

Epidemic models have received significant attention in the past few decades to study the propagation of viruses, worms and ideas in computer and social networks. In the case of viruses, the goal is to understand how the topology of the network and the properties of the nodes that comprise the network, together, impact the spread of the epidemics. In this paper, we propose rejuvenation as a way to cope with epidemics. Then, we present a model to study the effect of rejuvenation and of the topology on the steady-state number of infected and failed nodes. We distinguish between a state in which the virus is incubating and in which symptoms might not be visible and yet they may be contagious and infecting other nodes, and a state of failure where symptoms are clear. Sampling costs might be incurred to examine nodes in search for viruses at an early stage. Using the proposed model, we show that the sampling rate admits at most one local minimum greater than zero. Then, we numerically illustrate the impact of different system parameters on the optimal sampling rate, indicating when rejuvenation is more beneficial.

[1]  Chalee Asavathiratham,et al.  The influence model: a tractable representation for the dynamics of networked Markov chains , 2001 .

[2]  Andrea Bondavalli,et al.  An OS-level Framework for Anomaly Detection in Complex Software Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[3]  Kishor S. Trivedi,et al.  Software Rejuvenation: Do IT & Telco Industries Use It? , 2012, 2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops.

[4]  Yennun Huang,et al.  Software rejuvenation: analysis, module and applications , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[5]  Elaine J. Weyuker,et al.  Methods and opportunities for rejuvenation in aging distributed software systems , 2008, 2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp).

[6]  Donald F. Towsley,et al.  Modeling malware spreading dynamics , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[8]  Kishor S. Trivedi,et al.  Analysis of software rejuvenation using Markov Regenerative Stochastic Petri Net , 1995, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95.

[9]  Eitan Altman,et al.  Complete game-theoretic characterization of SIS epidemics protection strategies , 2014, 53rd IEEE Conference on Decision and Control.

[10]  Sujay Sanghavi,et al.  Learning the graph of epidemic cascades , 2012, SIGMETRICS '12.

[11]  Elaine J. Weyuker,et al.  Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs , 2007, WOSP '07.

[12]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[13]  D. Villemonais,et al.  Quasi-stationary distributions and population processes , 2011, 1112.4732.

[14]  P. Van Mieghem,et al.  Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.

[15]  Christos Faloutsos,et al.  Epidemic spreading in real networks: an eigenvalue viewpoint , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..

[16]  Elaine J. Weyuker,et al.  Monitoring Smoothly Degrading Systems for Increased Dependability , 2004, Empirical Software Engineering.

[17]  Elaine J. Weyuker,et al.  Monitoring for security intrusion using performance signatures , 2010, WOSP/SIPEW '10.