Optimal Patching in Clustered Epidemics of Malware

Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous across different regions. Heterogeneous rates of contact can also be due to diverse platforms, utilization of contact lists by the malware, the clustered nature of the network, etc. In this paper, a general formal framework is proposed for leveraging such information about heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin’s Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies that are amenable to implementation in a distributed manner. Through numerical calculations, the behavior of optimal patching policies is investigated in sample topologies and their advantages are demonstrated.

[1]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[2]  J. Cuzick,et al.  Spatial clustering for inhomogeneous populations , 1990 .

[3]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[4]  T. Kurtz Solutions of ordinary differential equations as limits of pure jump markov processes , 1970, Journal of Applied Probability.

[5]  Eitan Altman,et al.  Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[6]  Hossein Saidi,et al.  Malware propagation in Online Social Networks , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[7]  Chuanyi Ji,et al.  Spatial-temporal modeling of malware propagation in networks , 2005, IEEE Transactions on Neural Networks.

[8]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[9]  Pan Hui,et al.  An optimal distributed malware defense system for mobile networks with heterogeneous devices , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[10]  C. Gilligan,et al.  Optimization of control strategies for epidemics in heterogeneous populations with symmetric and asymmetric transmission. , 2010, Journal of theoretical biology.

[11]  Bruno Gaujal,et al.  Mean Field for Markov Decision Processes: From Discrete to Continuous Optimization , 2010, IEEE Transactions on Automatic Control.

[12]  Eitan Altman,et al.  Optimal control of epidemic evolution , 2011, 2011 Proceedings IEEE INFOCOM.

[13]  H. Behncke Optimal control of deterministic epidemics , 2000 .

[14]  Sencun Zhu,et al.  Improving sensor network immunity under worm attacks: a software diversity approach , 2008, MobiHoc '08.

[15]  G. Thompson,et al.  Optimal Control Theory: Applications to Management Science and Economics , 2000 .

[16]  Christopher A. Gilligan,et al.  Optimal control of epidemics in metapopulations , 2009, Journal of The Royal Society Interface.

[17]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[18]  Biplab Sikdar,et al.  Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[19]  David M. Nicol,et al.  A mixed abstraction level simulation model of large-scale Internet worm infestations , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[20]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[21]  Yoichi Shinoda,et al.  A Macro View of Viral Propagation and Its Persistence in Heterogeneous Wireless Networks , 2009, 2009 Fifth International Conference on Networking and Services.

[22]  Ahmed Helmy,et al.  Capturing User Friendship in WLAN Traces , 2006 .

[23]  Robin Wilson,et al.  Modern Graph Theory , 2013 .

[24]  Zhen Xie,et al.  Optimal response to attacks on the open science grid , 2011, Comput. Networks.

[25]  Biplab Sikdar,et al.  On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics , 2007, 2007 IEEE International Conference on Communications.

[26]  Robert F. Stengel,et al.  Optimal Control and Estimation , 1994 .