Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (Q1925482): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Set OpenAlex properties.
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2012/304868 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2124306589 / rank
 
Normal rank

Revision as of 23:53, 19 March 2024

scientific article
Language Label Description Also known as
English
Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy
scientific article

    Statements

    Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    18 December 2012
    0 references
    Summary: Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold \(\tau_0\) is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.
    0 references
    zero-day vulnerabilities
    0 references
    computer worms
    0 references
    Hopf bifurcation
    0 references
    SEIDQV worm propagation
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references