Towards understanding the effectiveness of patch injection

Abstract To contain the prevalence of computer virus on a network, we have to continuously inject new patches into the network. As the limited communication bandwidth restricts the patch injection rate, we need to evaluate the performance of a patch injection rate in restraining computer infections. This paper focuses on the performance evaluation problem. We propose a virus–patch interacting model with patch injection mechanism, and show that this model admits a globally stable equilibrium. This result implies that the fraction of infected nodes will approach a common value. Therefore, we recommend the asymptotic fraction of infected nodes to serve as a measure of performance of the associated patch injection rate. We also examine the influence of different parameters on the asymptotic fraction of infected nodes. In particular, we find that patch injection is particularly effective for densely connected networks. This work takes the first step towards understanding the effectiveness of patch injection.

[1]  Xiaofan Yang,et al.  The effect of infected external computers on the spread of viruses: A compartment modeling study , 2013 .

[2]  Yamir Moreno,et al.  Effects of delayed recovery and nonuniform transmission on the spreading of diseases in complex networks , 2012, Physica A: Statistical Mechanics and its Applications.

[3]  Fu-xiang Gao,et al.  Analysis of a Delayed Internet Worm Propagation Model with Impulsive Quarantine Strategy , 2014 .

[4]  Shouhuai Xu,et al.  A Stochastic Model of Active Cyber Defense Dynamics , 2015, Internet Math..

[5]  Jacob Goldenberg,et al.  Distributive immunization of networks against viruses using the ‘honey-pot’ architecture , 2005 .

[6]  Xiaofan Yang,et al.  The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach , 2017 .

[7]  Xinchu Fu,et al.  SPREADING DYNAMICS OF A DISEASE-AWARENESS SIS MODEL ON COMPLEX NETWORKS , 2013 .

[8]  Lu-Xing Yang,et al.  A Novel Virus-Patch Dynamic Model , 2015, PloS one.

[9]  Jonathan Rodriguez,et al.  Fundamentals of 5G Mobile Networks , 2015 .

[10]  Matthias Dehmer,et al.  Interplay between SIR-based disease spreading and awareness diffusion on multiplex networks , 2018, J. Parallel Distributed Comput..

[11]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[12]  Shouming Zhong,et al.  Web malware spread modelling and optimal control strategies , 2017, Scientific Reports.

[13]  Lu-Xing Yang,et al.  Heterogeneous virus propagation in networks: a theoretical study , 2017 .

[14]  Shouhuai Xu,et al.  Adaptive Epidemic Dynamics in Networks , 2013, ACM Trans. Auton. Adapt. Syst..

[15]  Lu-Xing Yang,et al.  The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach , 2015, PloS one.

[16]  Lu-Xing Yang,et al.  The pulse treatment of computer viruses: a modeling study , 2014 .

[17]  Chao Li,et al.  Identification of influential spreaders based on classified neighbors in real-world complex networks , 2018, Appl. Math. Comput..

[18]  Quanyan Zhu,et al.  Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.

[19]  Shouhuai Xu,et al.  A Stochastic Model of Multivirus Dynamics , 2012, IEEE Transactions on Dependable and Secure Computing.

[20]  Hongyong Zhao,et al.  Dynamical behaviours and control measures of rumour-spreading model with consideration of network topology , 2017, Int. J. Syst. Sci..

[21]  Kathleen M. Carley,et al.  The impact of countermeasure propagation on the prevalence of computer viruses , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[22]  Steve R. White,et al.  Computers and epidemiology , 1993, IEEE Spectrum.

[23]  Xiaoying Gan,et al.  An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.

[24]  Wanlei Zhou,et al.  To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[25]  Steve Mansfield-Devine Leaks and ransoms - the key threats to healthcare organisations , 2017, Netw. Secur..

[26]  Jianguo Ren,et al.  A compartmental model to explore the interplay between virus epidemics and honeynet potency , 2018, Applied Mathematical Modelling.

[27]  Yong Deng,et al.  Identifying influential nodes in complex networks: A node information dimension approach. , 2018, Chaos.

[28]  Xiaoming Wang,et al.  Bifurcation analysis of a delay reaction-diffusion malware propagation model with feedback control , 2015, Commun. Nonlinear Sci. Numer. Simul..

[29]  Yuan Yan Tang,et al.  Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.

[30]  R. Robinson,et al.  An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .

[31]  Lu-Xing Yang,et al.  A mixing propagation model of computer viruses and countermeasures , 2013 .

[32]  P. Van Mieghem,et al.  Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.

[33]  Yuan Yan Tang,et al.  Security Evaluation of the Cyber Networks Under Advanced Persistent Threats , 2017, IEEE Access.

[34]  Jianguo Ren,et al.  A compartmental model for computer virus propagation with kill signals , 2017 .

[35]  Yuan Yan Tang,et al.  A Bi-Virus Competing Spreading Model with Generic Infection Rates , 2018, IEEE Transactions on Network Science and Engineering.

[36]  Manisha Patil,et al.  A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .

[37]  Haiyan Wang,et al.  Complex dynamic behavior of a rumor propagation model with spatial-temporal diffusion terms , 2016, Inf. Sci..

[38]  Liguo Fei,et al.  A new method to identify influential nodes based on relative entropy , 2017 .

[39]  Yuan Yan Tang,et al.  On the competition of two conflicting messages , 2018 .

[40]  K B Blyuss,et al.  Mathematical model for the impact of awareness on the dynamics of infectious diseases. , 2017, Mathematical biosciences.

[41]  Sudip Samanta,et al.  Awareness programs control infectious disease - Multiple delay induced mathematical model , 2015, Appl. Math. Comput..

[42]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[43]  H. Vincent Poor,et al.  Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study , 2017, IEEE Journal on Selected Areas in Communications.

[44]  Anupama Sharma,et al.  Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..

[45]  Azzedine Boukerche Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .

[46]  Wanlei Zhou,et al.  A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks , 2015, IEEE Transactions on Computers.

[47]  Hongyong Zhao,et al.  Dynamic Analysis of a Reaction-Diffusion Rumor Propagation Model , 2016, Int. J. Bifurc. Chaos.