Effective immunization of online networks: a self-similar selection approach

This paper proposes a self-similar selection method as an alternative to existing immunization strategies for online networks. Given the self-similar characteristics of online networks which are shown to have fractal and scale-free structure, we presume that the self-similar selection which is well developed in physics outperforms random or targeted vaccination based on incoming or outgoing connections. We examine the effectiveness of the proposed self-similar selection method with random vaccination and other different types of targeted vaccination strategies in terms of delaying the spread of computer virus over a scale-free computer network constructed using real-world World Wide Web data. Our computer simulation results indicate that the self-similar selection method is more effective in deterring virus propagation than the existing vaccination strategies. In addition, vaccination based on self-similar selection is practical since it does not require detailed information about network morphology at the individual node level, which is often not easy to observe. Our findings have significant implications for both policy makers and network security providers.

[1]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[2]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[3]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[4]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[5]  Reuven Cohen,et al.  Efficient immunization strategies for computer networks and populations. , 2002, Physical review letters.

[6]  Albert-László Barabási,et al.  Internet: Diameter of the World-Wide Web , 1999, Nature.

[7]  Cohen,et al.  Resilience of the internet to random breakdowns , 2000, Physical review letters.

[8]  Winfried Gleissner,et al.  A mathematical theory for the spread of computer viruses , 1989, Comput. Secur..

[9]  Mark E. J. Newman,et al.  Technological Networks and the Spread of Computer Viruses , 2004, Science.

[10]  Edoardo M. Airoldi,et al.  An entropy approach to disclosure risk assessment: Lessons from real applications and simulated domains , 2011, Decis. Support Syst..

[11]  K. Goh,et al.  Fractality and self-similarity in scale-free networks , 2007 .

[12]  Wonseok Oh,et al.  Membership Herding and Network Stability in the Open Source Community: The Ising Perspective , 2007, Manag. Sci..

[13]  Tridas Mukhopadhyay,et al.  The Effect of Liability and Patch Release on Software Security: The Monopoly Case , 2011 .

[14]  Christos Faloutsos,et al.  Scalable modeling of real graphs using Kronecker multiplication , 2007, ICML '07.

[15]  Christos Faloutsos,et al.  RTG: a recursive realistic graph generator using random typing , 2009, Data Mining and Knowledge Discovery.

[16]  Christos Faloutsos,et al.  Epidemic thresholds in real networks , 2008, TSEC.

[17]  B. Bollobás The evolution of random graphs , 1984 .

[18]  Stephanie Forrest,et al.  Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[19]  B. Kahng,et al.  Geometric fractal growth model for scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[20]  S. Redner,et al.  Connectivity of growing random networks. , 2000, Physical review letters.

[21]  S. Havlin,et al.  Self-similarity of complex networks , 2005, Nature.

[22]  William Hugh Murray,et al.  The application of epidemiology to computer viruses , 1988, Comput. Secur..

[23]  Insu Park,et al.  Short Term and Total Life Impact analysis of email worms in computer systems , 2007, Decis. Support Syst..

[24]  Bernard P. Zajac Dial-up communication lines: Can they be secured? , 1988, Comput. Secur..

[25]  Matthew Sellars,et al.  Hyperfine interaction in ground and excited states of praseodymium-doped yttrium orthosilicate , 2002 .

[26]  Hernán A Makse,et al.  Small-world to fractal transition in complex networks: a renormalization group approach. , 2009, Physical review letters.

[27]  C. Sparrow The Fractal Geometry of Nature , 1984 .

[28]  Hui Xiong,et al.  Towards controlling virus propagation in information systems with point-to-group information sharing , 2009, Decis. Support Syst..

[29]  Matthew C. Elder,et al.  On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[30]  Tridas Mukhopadhyay,et al.  An Economic Analysis of the Software Market with a Risk-Sharing Mechanism , 2009, Int. J. Electron. Commer..

[31]  Hernán A. Makse,et al.  Fractal and Transfractal Scale-Free Networks , 2008, Encyclopedia of Complexity and Systems Science.

[32]  Donald F. Towsley,et al.  The effect of network topology on the spread of epidemics , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[33]  Christos Faloutsos,et al.  On the Vulnerability of Large Graphs , 2010, 2010 IEEE International Conference on Data Mining.