Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation

Efficient security patch distribution is of essential importance for updating anti-virus software to ensure effective and timely virus detection and cleanup. In this paper, we propose a mixed strategy of patch distribution to combine the advantages of the traditional centralized patch distribution strategy and decentralized patch distribution strategy. A novel network model that contains a central node and a multiplex network composed of patch dissemination network layer and virus propagation network layer is presented, and a competing spreading dynamical process on top of the network model that simulates the interplay between virus propagation and patch dissemination is developed. Such a new framework helps in effectively analyzing the impacts of patches distribution on virus propagation, and developing more realizable schemes for restraining virus propagation. Furthermore, considering the constraints of the capacity of the central node and the bandwidth of network links, an optimal allocation approach of patches is proposed, which could simultaneously optimize multiple dynamical parameters to effectively restrain the virus propagation with a given budget.

[1]  Y. Moreno,et al.  Epidemic outbreaks in complex heterogeneous networks , 2001, cond-mat/0107267.

[2]  C. Scoglio,et al.  Competitive epidemic spreading over arbitrary multilayer networks. , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  Song Guo,et al.  Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[4]  Sancheng Peng,et al.  An Immunization Framework for Social Networks Through Big Data Based Influence Modeling , 2019, IEEE Transactions on Dependable and Secure Computing.

[5]  David Saad,et al.  Optimal deployment of resources for maximizing impact in spreading processes , 2016, Proceedings of the National Academy of Sciences.

[6]  Daniel C. DuVarney,et al.  Using predators to combat worms and viruses: a simulation-based study , 2004, 20th Annual Computer Security Applications Conference.

[7]  Lu-Xing Yang,et al.  A mixing propagation model of computer viruses and countermeasures , 2013 .

[8]  Ning Zhong,et al.  Network Immunization with Distributed Autonomy-Oriented Entities , 2011, IEEE Transactions on Parallel and Distributed Systems.

[9]  Liang Zheng,et al.  Optimization algorithms for epidemic evolution in broadcast networks , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  Cecilia Mascolo,et al.  STOP: Socio-Temporal Opportunistic Patching of short range mobile malware , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[11]  Meng Cai,et al.  Social contagions on correlated multiplex networks , 2017, Physica A: Statistical Mechanics and its Applications.

[12]  Jie Hu,et al.  Imperfect targeted immunization in scale-free networks , 2009 .

[13]  Piet Van Mieghem,et al.  Epidemic processes in complex networks , 2014, ArXiv.

[14]  A. Arenas,et al.  Models of social networks based on social distance attachment. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  Ming Tang,et al.  Suppression of epidemic spreading in complex networks by local information based behavioral responses , 2014, Chaos.

[16]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[17]  Zili Zhang,et al.  Network Community Detection Based on the Physarum-Inspired Computational Framework , 2018, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[18]  Ian T. Foster,et al.  Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.

[19]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[20]  Yuan Yan Tang,et al.  A Bi-Virus Competing Spreading Model with Generic Infection Rates , 2018, IEEE Transactions on Network Science and Engineering.

[21]  Christos Faloutsos,et al.  Graph evolution: Densification and shrinking diameters , 2006, TKDD.

[22]  Saswati Sarkar,et al.  Optimal Patching in Clustered Malware Epidemics , 2014, IEEE/ACM Transactions on Networking.

[23]  J. Khan,et al.  MODELING AND ANALAYSIS OF WORM ATTACKS WITH PREDATOR AND PATCHING INTERPLAY , 2008 .

[24]  Pan Hui,et al.  Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices , 2014, IEEE Transactions on Mobile Computing.

[25]  Geoffrey M. Voelker,et al.  Defending Mobile Phones from Proximity Malware , 2009, IEEE INFOCOM 2009.

[26]  Eduard Heindl,et al.  Understanding the spreading patterns of mobile phone viruses , 2012 .

[27]  Jiming Liu,et al.  Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.

[28]  Sergio Gómez,et al.  On the dynamical interplay between awareness and epidemic spreading in multiplex networks , 2013, Physical review letters.

[29]  Bo Gao,et al.  The robustness of interdependent networks under the interplay between cascading failures and virus propagation , 2016, ArXiv.

[30]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[31]  V. Latora,et al.  Complex networks: Structure and dynamics , 2006 .

[32]  George J. Pappas,et al.  Analysis and Control of Epidemics: A Survey of Spreading Processes on Complex Networks , 2015, IEEE Control Systems.

[33]  Dawei Zhao,et al.  Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[34]  Ming Tang,et al.  Asymmetrically interacting spreading dynamics on complex layered networks , 2014, Scientific Reports.

[35]  Shi Xiao,et al.  Tolerance of intentional attacks in complex communication networks , 2008, IEEE Communications Magazine.

[36]  Alireza Keshavarz-Haddad,et al.  A distributed patching scheme for controlling mobile malware infection , 2015, 2015 23rd Iranian Conference on Electrical Engineering.

[37]  Lu-Xing Yang,et al.  A Novel Virus-Patch Dynamic Model , 2015, PloS one.

[38]  Quanyan Zhu,et al.  Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games , 2017, IEEE Transactions on Information Forensics and Security.

[39]  Dawei Zhao,et al.  Vital layer nodes of multiplex networks for immunization and attack , 2017 .

[40]  Dawei Zhao,et al.  Multiple routes transmitted epidemics on multiplex networks , 2013, ArXiv.

[41]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[42]  Dror Y. Kenett,et al.  Networks of networks – An introduction , 2015 .

[43]  Victor M. Preciado,et al.  Traffic optimization to control epidemic outbreaks in metapopulation models , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[44]  Sencun Zhu,et al.  Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[45]  Dawei Zhao,et al.  An Efficient Patch Dissemination Strategy for Mobile Networks , 2013 .

[46]  Yuan Yan Tang,et al.  A Risk Management Approach to Defending Against the Advanced Persistent Threat , 2020, IEEE Transactions on Dependable and Secure Computing.

[47]  Z. Wang,et al.  The structure and dynamics of multilayer networks , 2014, Physics Reports.

[48]  Faryad Darabi Sahneh,et al.  Optimal information dissemination strategy to promote preventive behaviors in multilayer epidemic networks. , 2015, Mathematical biosciences and engineering : MBE.

[49]  Min Wu,et al.  Propagation model of smartphone worms based on semi-Markov process and social relationship graph , 2014, Comput. Secur..

[50]  Fangwei Wang,et al.  Combating self-learning worms by using predators , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[51]  Matjaz Perc,et al.  Determinants of public cooperation in multiplex networks , 2017, ArXiv.

[52]  Xiang Wei,et al.  A unified framework of interplay between two spreading processes in multiplex networks , 2016 .

[53]  Jian Liu,et al.  Dynamics of competing ideas in complex social systems , 2011, ArXiv.

[54]  Sergio Gómez,et al.  Competing spreading processes on multiplex networks: awareness and epidemics , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.

[55]  Ming Tang,et al.  Suppressing disease spreading by using information diffusion on multiplex networks , 2016, Scientific Reports.

[56]  Conrado J. Pérez Vicente,et al.  Diffusion dynamics on multiplex networks , 2012, Physical review letters.

[57]  Li Miao,et al.  Optimal Dissemination Strategy of Security Patch Based on Differential Game in Social Network , 2018, Wirel. Pers. Commun..

[58]  Xiaofan Yang,et al.  The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach , 2017 .

[59]  Chinwendu Enyioha,et al.  Optimal vaccine allocation to control epidemic outbreaks in arbitrary networks , 2013, 52nd IEEE Conference on Decision and Control.

[60]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[61]  L Wong,et al.  Epidemic reemergence in adaptive complex networks. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.

[62]  Hiroshi Toyoizumi,et al.  Predators: good will mobile codes combat against computer viruses , 2002, NSPW '02.

[63]  Wanlei Zhou,et al.  On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[64]  Mason A. Porter,et al.  Multilayer networks , 2013, J. Complex Networks.

[65]  Peter Szor,et al.  The Art of Computer Virus Research and Defense , 2005 .

[66]  Marko Bajec,et al.  Robust network community detection using balanced propagation , 2011, ArXiv.

[67]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[68]  Wanlei Zhou,et al.  K-Center: An Approach on the Multi-Source Identification of Information Diffusion , 2015, IEEE Transactions on Information Forensics and Security.

[69]  Wei Ni,et al.  Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks , 2016, IEEE Transactions on Information Forensics and Security.

[70]  Dawei Zhao,et al.  Statistical physics of vaccination , 2016, ArXiv.

[71]  A Díaz-Guilera,et al.  Self-similar community structure in a network of human interactions. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[72]  Dawei Zhao,et al.  Immunization of Epidemics in Multiplex Networks , 2014, PloS one.

[73]  Dawei Zhao,et al.  Competing spreading processes and immunization in multiplex networks , 2016, ArXiv.

[74]  Dawei Zhao,et al.  Finding another yourself in multiplex networks , 2015, Appl. Math. Comput..

[75]  M. Perc Evolution of cooperation on scale-free networks subject to error and attack , 2009, 0902.4661.

[76]  Lin Wang,et al.  Degree mixing in multilayer networks impedes the evolution of cooperation , 2014, Physical review. E, Statistical, nonlinear, and soft matter physics.

[77]  D. Bu,et al.  Topological structure analysis of the protein-protein interaction network in budding yeast. , 2003, Nucleic acids research.

[78]  Dawei Zhao,et al.  The robustness of multiplex networks under layer node-based attack , 2015, Scientific Reports.

[79]  Matjaz Perc,et al.  Information cascades in complex networks , 2017, J. Complex Networks.