Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (Q1925482)

From MaRDI portal





scientific article; zbMATH DE number 6116494
Language Label Description Also known as
default for all languages
No label defined
    English
    Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy
    scientific article; zbMATH DE number 6116494

      Statements

      Hopf bifurcation in an SEIDQV worm propagation model with quarantine strategy (English)
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      18 December 2012
      0 references
      Summary: Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold \(\tau_0\) is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.
      0 references
      zero-day vulnerabilities
      0 references
      computer worms
      0 references
      Hopf bifurcation
      0 references
      SEIDQV worm propagation
      0 references

      Identifiers

      0 references
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references