Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (Q1925482): Difference between revisions
From MaRDI portal
Set profile property. |
Set OpenAlex properties. |
||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1155/2012/304868 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2124306589 / rank | |||
Normal rank |
Revision as of 23:53, 19 March 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy |
scientific article |
Statements
Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (English)
0 references
18 December 2012
0 references
Summary: Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold \(\tau_0\) is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.
0 references
zero-day vulnerabilities
0 references
computer worms
0 references
Hopf bifurcation
0 references
SEIDQV worm propagation
0 references