Preview

Russian Technological Journal

Advanced search

Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses

https://doi.org/10.32362/2500-316X-2019-7-3-7-27

Abstract

The paper presents a complex model of the dynamics of virus epidemies propagation in computer networks, based on topological properties of computer networks and mechanisms of the viruses spread. On one hand, this model is based on the use of percolation theory methods, which makes it possible to determine such structural-information characteristics of networks as the dependence of the percolation threshold on the average number of connections per one node (network density). On the other hand, the dynamic processes of stochastic propagation in computer networks of evolving viruses are observed when anti-virus programs become outdated and postponed. The paper discusses the concept of percolation threshold, provides an equation for the dependence of the percolation threshold of a network on its density obtained by analyzing numerical simulation data. The dynamics of virus epidemies were studied through two approaches. The first one is based on the description of transition diagrams between states of nodes, after which a system of kinetic differential equations for the virus epidemies is constructed. The second is based on considering the probabilities of transitions between possible states of the entire network. A second-order differential equation is obtained in this article, and a boundary value problem is formulated. Its solution describes the dependence of the network blocking probability on the blocking probability of an individual node. The solution also makes it possible to estimate the time required to reach the percolation threshold. The model incorporates the evolutionary properties of viruses: previously immunized or disinfected nodes can be infected again after a certain time interval. Besides, the model incorporates a lag of the anti-virus protection. Analysis of the solutions obtained for the models created shows the possibility of various modes of virus propagation. Moreover, with some sets of values of differential equation coefficients, an oscillating and almost periodic nature of virus epidemies is observed, which largely coincides with real observations.

About the Authors

S. A. Lesko
MIREA – Russian Technological University
Russian Federation

Ph.D. (Engineering), Associate Professor of the Chair "Management and Modeling of Systems", Institute of Integrated Security and Special Instrumentation

78, Vernadskogo pr., Moscow 119454, Russia



A. S. Alyoshkin
MIREA – Russian Technological University
Russian Federation

Ph.D. (Engineering), Associate Professor of the Chair "Information Confrontation", Institute of Integrated Security and Special Instrumentation

78, Vernadskogo pr., Moscow 119454, Russia



V. V. Filatov
MIREA – Russian Technological University
Russian Federation

Ph.D. (Engineering), Deputy Head of the Chair "Management and Modeling of Systems", Institute of Integrated Security and Special Instrumentation

78, Vernadskogo pr., Moscow 119454, Russia



References

1. Anderson H., Britton T. Stochastic Epidemic Models and Their Statistical Analysis. NY: Springer-Verlag, New-York, Inc., 2000. 133 p.

2. Earn David J.D., Rohani Pejman, Bolker Benjamin M., Grenfell Bryan T. A simple model for complex dynamical transitions in epidemics. Science. 2000; 287:667-670. DOI: 10.1126/science.287.5453.667

3. Wang C., Knight J. C., Elder M. C. Impact of network structure on malware propagation: A growth curve perspective. J. Manag. Inform. Syst. 2016; 33(1):296-325. DOI: 10.1080/07421222.2016.1172440

4. Misra V., Gong W., Towsley D. A fluid based analysis of a network of AQM routers supporting TCP flows with an application to RED. ACM/SIGCOMM Computer Commun. Rev. 2000; 30(4):151-160. DOI: 10.1145/347059.347421

5. Kumar M., Kumar M.B., Panda T.C. A new model on the spread of malicious objects in computer network. Int. J. Hybrid Inform. Technol. 2013; 6(6):161-176. DOI: 10.14257/ijhit.2013.6.6.14

6. Kumar M.B., Mursalin A.G. Differential epidemic model of virus and worms in computer network. Int. J. Network Security. 2012; 14(3):149-155.

7. Semenov S.G., Davydov V.V. Mathematical model of computer virus distribution in heterogeneous computer networks of automated process control systems. Vestnik NTU "KhPI" (Bulletin of the National Technical University "Kharkiv Polytechnic Institute"). 2012; 38:163-171. (in Russ.)

8. Balthrop J., Forrest S., Newman M.E.J., Williamson M.M. Technological networks and the spread of computer viruses. Science. 2004; 304:527-529. DOI: 10.1126/science.1095845

9. Chen Li-Chiou, Carley K.M. The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Trans. on Systems, Man, and Cybernetics. Part B: Cybernetics. 2004; 34(2):823-833.

10. Ojugo A.A., Aghware F.O., Yoro R.E., Yerokun M.O., Eboka A.O., Anujeonye C.N., Efozia F.N. Evolutionary model for virus propagation on networks. Automation, Control and Intelligent Systems. 2015; 3(4):56-62. doi: 10.11648/j.acis.20150304.12

11. Vălean H., Pop A., Avram C. Intelligent model for virus spreading. Proceed. of the Int. Symp. on System Theory, Automation, Robotics, Computers, Informatics, Electronics and Instrumentation. SINTES 13. 18-20 October 2007, Craiova, Romania. P. 117-122.

12. Dalinger Ya.M., Babanin D.V., Burkov S.M. The mathematical models of the spreading of viruses in computer networks with the different structures. Informatika i sistemy upravleniya (Information Science and Control Systems). 2011; 4(30):3-11. (in Russ.)

13. Piqueira Jos´e R.C., Cesar F.B. Dynamical models for computer viruses propagation. Mathem. Problems in Engineering. Volume 2008; Article ID 940526: 11 pages. doi:10.1155/2008/940526.

14. Nazario J. Defense and Detection Strategies against Internet Worms. Artech House Publ., 2004. 319 p.

15. Pastor-Satorras R., Vespignani A. Epidemics and immunization in scale-free networks. In: Handbook of Graphs and Networks: From the Genome to the Internet. S. Bornholdt and H. G. Schuster (eds.). Wiley-VCH, 2005. DOI: 10.1002/3527602755.ch5.

16. Fekete A., Vattay G., Kocarev L. Traffic dynamics in scale-free networks. Complexus. 2006; 3: 97-107. DOI: 10.1159/000094192.

17. Wu Zhi-Xi, Peng G., Wong Wing-Ming, Yeung Kai-Hau. Improved routing strategies for data traffic in scale-free networks. J. Statist. Mechanics: Theory and Experiment. 2008; P11002. DOI:10.1088/1742-5468/2008/11/P11002.

18. Boccaletti S., Hwang D.-U., Latora V. Growing hierarchical scale-free networks by means of nonhierarchical processes. Int. J. Bifurcation and Chaos. 2007; 17(7):2447-2452. DOI: 10.1142/S0218127407018518.

19. Zhukov D., Lesko S., Lobanov D. Modeling of open network reliability including the Internet based on the theory of percolation in two-dimensional and three-dimensional regular and random network structures. Proceed. of the Int. Conf. "Internet Computing and Big Data" (ICOMP'14) - WORLDCOMP'14; 2014; 3:132-136.

20. Zhukov D., Lesko S. The percolation theory based analysis of data transmission reliability via data communication networks with random structure and kinetics of nodes blocking by viruses. ICNS 2015: Proceed. of the Eleventh Int. Conf. on Networking and Services. May 24-29, 2015. Rome, Italy. P. 24-30.

21. Sahini M., Sahimi M. Applications of Percolation Theory. CRC Press, 2003. 276 p.

22. Stauffer D., Aharony A. Introduction to Percolation Theory. London: Tailor & Francis, 2003. 192 p.

23. Tarasevich Yu.Yu. Percolation: theory, applications, algorithms. M.: Editorial URSS, 2002. 112 р. (in Russ.)

24. Zhukov D., Khvatova T., Lesko S., Zaltsman A. Managing social networks: applying the Percolation theory methodology to understand individuals’ attitudes and moods. Technol. Forecasting and Social Change. 2018; 129:297-307. DOI: 10.1016/j.techfore.2017.09.039

25. Zhukov D.O., Khvatova T.Yu., Lesko S.A., Zaltsman A.D. The influence of the connections density on clusterisation and percolation threshold during information distribution in social networks. Informatics and its Applications. 2018; 12(2):90-97. DOI: 10.14357/19922264180123

26. Zhukov D.O., Gusarov A.N., Kosyreva A.V. Computer threats distribution effective strategy research. Vestnik komp'yuternykh i informasionnykh tekhnologij (Herald of Computer and Information Technologies). 2010; 7 (73):40-46. (in Russ.)


Supplementary files

1. Fig.3. Model of spreading viruses process on a computer network.
Subject
Type Research Instrument
View (38KB)    
Indexing metadata ▾

Review

For citations:


Lesko S.A., Alyoshkin A.S., Filatov V.V. Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses. Russian Technological Journal. 2019;7(3):7-27. (In Russ.) https://doi.org/10.32362/2500-316X-2019-7-3-7-27

Views: 1007


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2782-3210 (Print)
ISSN 2500-316X (Online)