Mathematical model for spreading dynamics of social network worms

In this paper, a mathematical model for social network worm spreading is presented from the viewpoint of social engineering. This model consists of two submodels. Firstly, a human behavior model based on game theory is suggested for modeling and predicting the expected behaviors of a network user encountering malicious messages. The game situation models the actions of a user under the condition that the system may be infected at the time of opening a malicious message. Secondly, a social network accessing model is proposed to characterize the dynamics of network users, by which the number of online susceptible users can be determined at each time step. Several simulation experiments are carried out on artificial social networks. The results show that (1) the proposed mathematical model can well describe the spreading dynamics of social network worms; (2) weighted network topology greatly affects the spread of worms; (3) worms spread even faster on hybrid social networks.

[1]  Jürgen Kurths,et al.  Evidence for a bimodal distribution in human communication , 2010, Proceedings of the National Academy of Sciences.

[2]  Stefan Bornholdt,et al.  Dynamics of social networks , 2003, Complex..

[3]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[4]  Geoffrey M. Voelker,et al.  Second life: a social network of humans and bots , 2010, NOSSDAV.

[5]  Alessandro Vespignani,et al.  Weighted evolving networks: coupling topology and weight dynamics. , 2004, Physical review letters.

[6]  Donald F. Towsley,et al.  Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.

[7]  M Girvan,et al.  Structure of growing social networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Albert-László Barabási,et al.  Modeling bursts and heavy tails in human dynamics , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Alessandro Vespignani,et al.  WiFi networks and malware epidemiology , 2007, Proceedings of the National Academy of Sciences.

[10]  James A. Lewis Cyber terror: Missing in action , 2003 .

[11]  Seungyeop Han,et al.  Analysis of topological characteristics of huge online social networking services , 2007, WWW '07.

[12]  Svein J. Knapskog,et al.  Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005 .

[13]  Donald F. Towsley,et al.  On distinguishing between Internet power law topology generators , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[14]  Ke Xu,et al.  Modeling the IPv6 Internet AS-level Topology , 2009, ArXiv.

[15]  Zhou Tao,et al.  Epidemic Spread in Weighted Scale-Free Networks , 2005 .

[16]  John Scott Social Network Analysis , 1988 .

[17]  Keith J. Anderson Internet Use Among College Students: An Exploratory Study , 2001, Journal of American college health : J of ACH.

[18]  Steve Jones,et al.  Everyday Life, Online: U.S. College Students' Use of the Internet , 2009, First Monday.

[19]  Yukio Hayashi,et al.  Oscillatory epidemic prevalence in growing scale-free networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[20]  Andreas Gregoriades,et al.  Network Security Validation Using Game Theory , 2009, OTM Workshops.

[21]  L. Amaral,et al.  On Universality in Human Correspondence Activity , 2009, Science.

[22]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[23]  Wei Huang,et al.  Epidemic spreading in scale-free networks with community structure , 2007 .

[24]  Rebecca Goolsby,et al.  Social media as crisis platform: The future of community maps/crisis maps , 2010, TIST.

[25]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[26]  S. Bornholdt,et al.  Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[27]  Stephanie Forrest,et al.  Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[28]  Kwang-Cheng Chen,et al.  On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.

[29]  Hossein Saidi,et al.  Malware propagation in Online Social Networks , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[30]  Shameeka M. Jelenewicz,et al.  A Disappearing Digital Divide Among College Students? , 2006 .

[31]  Prabir Bhattacharya,et al.  Game theoretic models for detecting network intrusions , 2008, Comput. Commun..