Influences of Removable Devices on the Anti-Threat Model: Dynamic Analysis and Control Strategies

With the rapid development of M2M wireless network, damages caused by malicious worms are getting more and more serious. The main goal of this paper is to explore the influences of removable devices on the interaction dynamics between malicious worms and benign worms by using a mathematical model. The model takes two important network environment factors into consideration: benign worms and the influences of removable devices. Besides, the model’s basic reproduction number is obtained, along with the correct control conditions of the local and global asymptotical stability of the worm-free equilibrium. Simulation results show that the effectiveness of our proposed model in terms of reflecting the influences of removable devices on the interaction dynamics of an anti-treat model. Based on numerical analyses and simulations, effective methods are proposed to contain the propagation of malicious worms by using anti-worms.

[1]  Sihan Qing,et al.  A survey and trends on Internet worms , 2005, Comput. Secur..

[2]  Seong-Moo Yoo,et al.  Stability analysis of VEISV propagation modeling for network worm attack , 2012 .

[3]  Juan Zhang,et al.  Influence of removable devices on computer worms: Dynamic analysis and control strategies , 2011, Comput. Math. Appl..

[4]  L. Wahl,et al.  Perspectives on the basic reproductive ratio , 2005, Journal of The Royal Society Interface.

[5]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[6]  G. Serio,et al.  A generalization of the Kermack-McKendrick deterministic epidemic model☆ , 1978 .

[7]  R. Bellman Stability theory of differential equations , 1953 .

[8]  R. May,et al.  Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.

[9]  Chenquan Gan,et al.  Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread , 2015, Commun. Nonlinear Sci. Numer. Simul..

[10]  Dinesh Kumar Saini,et al.  SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..

[11]  Navnit Jha,et al.  SEIQRS model for the transmission of malicious objects in computer network , 2010 .

[12]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[13]  Fangwei Wang,et al.  Stability analysis of the interaction between malicious and benign worms , 2013, CIT 2013.

[14]  Yunkai Zhang,et al.  Stability analysis of an e-SEIAR model with point-to-group worm propagation , 2015, Commun. Nonlinear Sci. Numer. Simul..

[15]  Tang Tang Xie,et al.  A Revised Benign Worm-Anti-Worm Propagation Model , 2011 .

[16]  Ge Yu,et al.  Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy , 2012 .

[17]  Daniel Hlubinka,et al.  Kermack-McKendrick epidemic model revisited , 2007, Kybernetika.

[18]  J. Watmough,et al.  Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. , 2002, Mathematical biosciences.

[19]  Hong Zhao,et al.  Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms , 2007, Sixth International Conference on Networking (ICN'07).

[20]  Xiaofan Yang,et al.  Modeling and analysis of the spread of computer virus , 2012 .

[21]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[22]  R. Robinson,et al.  An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .

[23]  R. Clark The Routh-Hurwitz stability criterion, revisited , 1992 .