Web malware spread modelling and optimal control strategies

The popularity of the Web improves the growth of web threats. Formulating mathematical models for accurate prediction of malicious propagation over networks is of great importance. The aim of this paper is to understand the propagation mechanisms of web malware and the impact of human intervention on the spread of malicious hyperlinks. Considering the characteristics of web malware, a new differential epidemic model which extends the traditional SIR model by adding another delitescent compartment is proposed to address the spreading behavior of malicious links over networks. The spreading threshold of the model system is calculated, and the dynamics of the model is theoretically analyzed. Moreover, the optimal control theory is employed to study malware immunization strategies, aiming to keep the total economic loss of security investment and infection loss as low as possible. The existence and uniqueness of the results concerning the optimality system are confirmed. Finally, numerical simulations show that the spread of malware links can be controlled effectively with proper control strategy of specific parameter choice.

[1]  P. Van Mieghem,et al.  Susceptible-infected-susceptible model: a comparison of N-intertwined and heterogeneous mean-field approximations. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  Albert-László Barabási,et al.  A genetic epidemiology approach to cyber-security , 2014, Scientific Reports.

[3]  Frédéric Raynal,et al.  New threats and attacks on the World Wide Web , 2006, IEEE Security & Privacy.

[4]  Alessandro Vespignani,et al.  WiFi networks and malware epidemiology , 2007, Proceedings of the National Academy of Sciences.

[5]  Yi Wang,et al.  Global analysis of an SIS model with an infective vector on complex networks , 2012 .

[6]  O. Diekmann,et al.  On the definition and the computation of the basic reproduction ratio R0 in models for infectious diseases in heterogeneous populations , 1990, Journal of mathematical biology.

[7]  Yihao Zhang,et al.  Modeling the propagation of mobile malware on complex networks , 2016, Commun. Nonlinear Sci. Numer. Simul..

[8]  Chao Liu,et al.  A Discrete Dynamic Model for Computer Worm Propagation , 2015 .

[9]  Kevin M. Carter,et al.  Probabilistic Threat Propagation for Network Security , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Saurabh Bagchi,et al.  Modeling and automated containment of worms , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[11]  Sharon Weinberger,et al.  Computer security: Is this the start of cyberwarfare? , 2011, Nature.

[12]  M. Li,et al.  Global dynamics of a SEIR model with varying total population size. , 1999, Mathematical Biosciences.

[13]  Ingemar J. Cox,et al.  Optimizing Hybrid Spreading in Metapopulations , 2014, Scientific Reports.

[14]  Zhen Jin,et al.  Periodic solutions in a herbivore-plant system with time delay and spatial diffusion , 2016 .

[15]  Jinde Cao,et al.  Revisiting node-based SIR models in complex networks with degree correlations , 2015 .

[16]  Jie Wu,et al.  Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms , 2016, IEEE Transactions on Vehicular Technology.

[17]  Abba B. Gumel,et al.  A mathematical model for the dynamics of HIV-1 during the typical course of infection , 2001 .

[18]  Chao Liu,et al.  Modeling the spread of malware with the influence of heterogeneous immunization , 2016 .

[19]  S. Havlin,et al.  Epidemic threshold for the susceptible-infectious-susceptible model on random networks. , 2010, Physical review letters.

[20]  Anupama Sharma,et al.  Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..

[21]  Zhen Jin,et al.  Effects of time delay and space on herbivore dynamics: linking inducible defenses of plants to herbivore outbreak , 2015, Scientific Reports.

[22]  Lev Muchnik,et al.  Identifying influential spreaders in complex networks , 2010, 1001.5285.

[23]  Zhen Jin,et al.  Influence of time delay and nonlinear diffusion on herbivore outbreak , 2014, Commun. Nonlinear Sci. Numer. Simul..

[24]  Bimal Kumar Mishra,et al.  Impact of Information based Classification on Network Epidemics , 2016, Scientific reports.

[25]  Juan Zhang,et al.  Influence of removable devices on computer worms: Dynamic analysis and control strategies , 2011, Comput. Math. Appl..

[26]  Zhen Jin,et al.  Pattern transitions in spatial epidemics: Mechanisms and emergent properties , 2016, Physics of Life Reviews.

[27]  J. Watmough,et al.  Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. , 2002, Mathematical biosciences.

[28]  Li Li,et al.  Pattern dynamics of a spatial predator–prey model with noise , 2012 .

[29]  Juan Zhang,et al.  Transmission dynamics of a multi-group brucellosis model with mixed cross infection in public farm , 2014, Appl. Math. Comput..

[30]  David London,et al.  On derivations arising in differential equations , 1976 .

[31]  Gui-Quan Sun,et al.  Mathematical modeling of population dynamics with Allee effect , 2016, Nonlinear Dynamics.

[32]  Juan Zhang,et al.  Pattern formation of a spatial predator-prey system , 2012, Appl. Math. Comput..

[33]  Shigui Ruan,et al.  Uniform persistence and flows near a closed positively invariant set , 1994 .

[34]  Jinde Cao,et al.  Global dynamics of a network epidemic model for waterborne diseases spread , 2014, Appl. Math. Comput..

[35]  Zi-Ke Zhang,et al.  Global stability for a sheep brucellosis model with immigration , 2014, Appl. Math. Comput..

[36]  S. Fortunato,et al.  Statistical physics of social dynamics , 2007, 0710.3256.

[37]  Tingwen Huang,et al.  High-Performance Consensus Control in Networked Systems With Limited Bandwidth Communication and Time-Varying Directed Topologies , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[38]  Zhen Jin,et al.  Influence of isolation degree of spatial patterns on persistence of populations , 2016 .

[39]  Li Li,et al.  Patch invasion in a spatial epidemic model , 2015, Appl. Math. Comput..

[40]  Z. Teng,et al.  Persistence in dynamical systems , 1990 .

[41]  Radu State,et al.  PhishStorm: Detecting Phishing With Streaming Analytics , 2014, IEEE Transactions on Network and Service Management.

[42]  Quan-Hui Liu,et al.  Predicting the epidemic threshold of the susceptible-infected-recovered model , 2015, Scientific Reports.

[43]  Gui-Quan Sun,et al.  Pattern formation of an epidemic model with diffusion , 2012, Nonlinear Dynamics.

[44]  H R Thieme,et al.  Epidemic and demographic interaction in the spread of potentially fatal diseases in growing populations. , 1992, Mathematical biosciences.

[45]  Dahlard L. Lukes,et al.  Differential Equations: Classical to Controlled , 2012 .

[46]  James S. Muldowney,et al.  Compound matrices and ordinary differential equations , 1990 .

[47]  Paul Waltman,et al.  Uniformly persistent systems , 1986 .

[48]  James S. Muldowney,et al.  On Bendixson′s Criterion , 1993 .

[49]  Liancheng Wang,et al.  Global Dynamics of an SEIR Epidemic Model with Vertical Transmission , 2001, SIAM J. Appl. Math..