Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (Q1925482): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2012/304868 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2124306589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling and analysis of the spread of computer virus / rank
 
Normal rank
Property / cites work
 
Property / cites work: SEIRS epidemic model with delay for transmission of malicious objects in computer network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mathematical models on computer viruses / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fixed period of temporary immunity after run of anti-malicious software on computer nodes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dynamic model of worms with vertical transmission in computer network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy epidemic model for the transmission of worms in computer network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stability and Hopf bifurcation in a computer virus model with multistate antivirus / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel computer virus model and its dynamics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Propagation behavior of virus codes in the situation that infected computers are connected to the Internet with positive probability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Propagation of computer virus under human intervention: a dynamical model / rank
 
Normal rank
Property / cites work
 
Property / cites work: SEIQRS model for the transmission of malicious objects in computer network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hopf bifurcation in an Internet worm propagation model with time delay in quarantine / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hopf bifurcation and stability of periodic solutions in a delayed eco-epidemiological system / rank
 
Normal rank

Latest revision as of 00:41, 6 July 2024

scientific article
Language Label Description Also known as
English
Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy
scientific article

    Statements

    Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    18 December 2012
    0 references
    Summary: Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold \(\tau_0\) is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.
    0 references
    0 references
    0 references
    0 references
    0 references
    zero-day vulnerabilities
    0 references
    computer worms
    0 references
    Hopf bifurcation
    0 references
    SEIDQV worm propagation
    0 references
    0 references
    0 references