Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy

Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.

[1]  Fangwei Wang,et al.  Stability analysis of a SEIQV epidemic model for rapid spreading worms , 2010, Comput. Secur..

[2]  A. J. Hall Infectious diseases of humans: R. M. Anderson & R. M. May. Oxford etc.: Oxford University Press, 1991. viii + 757 pp. Price £50. ISBN 0-19-854599-1 , 1992 .

[3]  Yong Yang,et al.  The Analysis of Propagation Model for Internet Worm Based on Active Vaccination , 2008, 2008 Fourth International Conference on Natural Computation.

[4]  Ge Yu,et al.  Pulse quarantine strategy of internet worm propagation: Modeling and analysis , 2012, Comput. Electr. Eng..

[5]  Bimal Kumar Mishra,et al.  Fixed period of temporary immunity after run of anti-malicious software on computer nodes , 2007, Appl. Math. Comput..

[6]  R. May,et al.  Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.

[7]  Wan-Tong Li,et al.  Hopf bifurcation and stability of periodic solutions in a delayed eco-epidemiological system , 2008, Appl. Math. Comput..

[8]  R. May,et al.  Population Biology of Infectious Diseases , 1982, Dahlem Workshop Reports.

[9]  Dinesh Kumar Saini,et al.  SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..

[10]  Lu-Xing Yang,et al.  Propagation Behavior of Virus Codes in the Situation That Infected Computers Are Connected to the Internet with Positive Probability , 2012 .

[11]  Lu-Xing Yang,et al.  A novel computer virus model and its dynamics , 2012 .

[12]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[13]  Donald F. Towsley,et al.  Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.

[14]  Bimal Kumar Mishra,et al.  Mathematical models on computer viruses , 2007, Appl. Math. Comput..

[15]  Bimal Kumar Mishra,et al.  Fuzzy epidemic model for the transmission of worms in computer network , 2010 .

[16]  R. May,et al.  Population biology of infectious diseases: Part II , 1979, Nature.

[17]  Navnit Jha,et al.  SEIQRS model for the transmission of malicious objects in computer network , 2010 .

[18]  X. Liao,et al.  Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus , 2012 .

[19]  Ge Yu,et al.  Hopf bifurcation in an Internet worm propagation model with time delay in quarantine , 2013, Math. Comput. Model..

[20]  Xiaofan Yang,et al.  Modeling and analysis of the spread of computer virus , 2012 .

[21]  Chenquan Gan,et al.  Propagation of Computer Virus under Human Intervention: A Dynamical Model , 2012 .

[22]  Bimal Kumar Mishra,et al.  Dynamic model of worms with vertical transmission in computer network , 2011, Appl. Math. Comput..