SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 43-47
www.iosrjournals.org
DOI: 10.9790/0661-17134347 www.iosrjournals.org 43 | Page
Modeling and Threshold Sensitivity Analysis of Computer Virus
Epidemic
Abidur Rahaman1
, Amran Bhuiyan2
, Md. Ahsan Habib3
and Z. H. Mozumder4
1
(Dept.of ICT,Noakhali Science and Technology University(NSTU),Noakhali-3814,Bangladesh)
2
(Dept.of CSTE,Noakhali Science and Technology University(NSTU),Noakhali-3814,Bangladesh)
3_(
Dept. of ETE,Begum Rokeya University,Rangpur,Bangladesh)
4
_(Dept. of EEE,University of Dhaka,Dhaka-1000,Bangladesh)
Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biological
epidemics to the domain of information technology. A new epidemic model has been proposed by
incorporating a range of parameters rather than using constant parameters for a fixed population network. All
individual nodes or computers are classified into four classes- susceptible, exposed, infected and immunized.
Changes of population of these four classes with time and higher epidemic threshold are studied. Finally
threshold sensitivity analysis has been analyzed to take into account the appropriate measures to control the
virus epidemic.
Keywords:Computer virus epidemic, epidemic threshold, sensitivity analysis
I. Introduction
Computer virusespossess a major threat both for standalone and networked computers as they can
replicate themselves and spread among computers in the form of malicious programs. Destruction of data by the
viruses cause serious problem for individual user and may cause disastrous situation for institutional user, even
sometimes destroy the whole computer system [1]. Despite the significant development of anti-virus as a major
means of defending against viruses, the computer viruses are still very much a cause of concern in computer
network. As a promising alternative of anti-virus technique, the epidemic dynamics of computer viruses aims to
understand the way how the computer viruses can spread across network and to work out global policies of
inhibiting their prevalence. Analogous behavior of computer viruses and their biological counterparts inspired
many researchers to study this new filed computer viruses study. Cohen [2] and Murray [3] evidently suggested
exploiting the compartment modeling techniques developed in the epidemic dynamics of biologically infectious
disease to study the spread of computer viruses. Later, Kephart and White [4] model the virus spreading in the
Internet based on the biological epidemic model. All the state-of-the-arts works related this model is explained
below.
In [5-7], it was found that the computer network (i.e. Internet) follows diverse power-law degree
distributions. This finding initiates the interest in virus spreading in complex networks, leading to the surprising
finding that the epidemic threshold vanishes for scale-free networks with infinite size [8]. To fully understand
the spreading mechanism of computer viruses, multifarious virus spreading models, ranging from conventional
models to unconventional models such as delayed models, impulsive models and stochastic models have been
proposed in [16-17]. All the above mentioned models have been implemented based on fixed parameters.
This paper is intended to develop an epidemic model of computer viruses that can be checked for a
range of parameters rather than for a constant parameter. It also shows how epidemic threshold affects the total
process and thus decisive measures can be taken to control the viral epidemic.
The rest of the paper has been organized as follows. Section 2 describes of the Mathematical Modeling
of Computer Virus Epidemic in detail. Sec. 3 estimates the parameters, Sec.4 reports the result and discussion
and finally concluding remarks are drawn in Sec. 5.
II. Mathematical Modeling Of Computer Virus Epidemic
In normal biological epidemics, if each disease carrier infects less than one person, then the infection
will eventually die out. This case can mathematically be expressed by the basic reproduction number, R0 ˂ 1.
The first full analysis of a computer virus invading a network using similar techniques to those used in
analyzing biological epidemics by Kephart and White [4]. It applies a Susceptible-Infected-Susceptible (SIS)
model to a random graph of N nodes which represent computers in a network with a general virus propagating
throughout. More specific models have been developed since to deal with the different types of computer virus
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
DOI: 10.9790/0661-17134347 www.iosrjournals.org 44 | Page
[15]. We shall now introduce a model developed to analyze the spread of acomputer virus through a network of
computers which we shall call the CVE model. It is a modification of a model proposed by Yuan [9].This
network is assumed to be a one in which each computers connectivity is identical, thus subject to similar
governing principles as biological systems. It is assumed that each individual member of the total population is a
single computer and that the computer virus is able to infect but not destroy a host. One further assumption is
that once infected, a computer enters an exposed state, described by the class E, before entering the infected
and contagiousclass I after a certain length of time. Those in E have the virus but its code has yet to be activated
and thus cannot infect susceptible. At the same time, computers are being updated with antivirus software which
enables each computer to become immune to the virus modeled by the class R.The model is described by the
following system of differential equations:
dS
dt
= μN −
rSI
N
− pSR +μ S… . . … . (1)
dE
dt
=
rSI
N
− α + pER + μ E … … . . (2)
dI
dt
= αE − γ + μ I … … … … … … … (3)
dR
dt
= pSR S + pER E + γI … . . … … . . . (4)
For steady states
dS
dt
+
dE
dt
+
dI
dt
+
dR
dt
= 0 … … … … … (5)
Let us define also epidemic threshold,
R0 =
αμr
α + pER + μ γ + μ pSR + μ
… . 6
Here S, E, I and R, are all functions of t only and allconstants are assumed to be strictly positive. This
model assumes a fixed population as seen through addition of the rates of change of the separate classes. The
rate of this replacement can be varied by the coefficient µ in the model and the introduction of these new
computers is modeled by the term µN inthe first equation. It isassumed for simplification of the model that
newcomputers when introduced are not immune to the virus. Removal of computers is modeled by each of the
−µ terms in each equation and since N = S + I + E + R, this removal and replacement cancels out but still has an
effect on how the virus spreads.Infection of a computer withthe virus from an infective is assumed to be
proportional to the product SI given in (1), which represents connectionsbetween susceptible and infective
computers. A fraction r of these will result in a successful passing on of the virus. These initial infections pass
into the infected but not contagious class E via the interaction rSI in equation (2).
Individuals in E whose virus code becomes active move to the infected and contagious class I via the
term −αE in equation (2). It is assumed that the rate of change of this activation is proportional to the size of E
and can be varied by the constant α which is a reasonable assumption to make. Immunization of individual
computers from the susceptible, exposed and infected classes to the immunized class R is carried out via the –
pSRS, −pER E and −γI terms in the model. pSR S models the effect of real-time immunization, pER E models
the effect of immunizing individual computers in the non-infective class E and γI is the recovery rate from I to
R. These constants can be changed to model the differing rates of immunization for each class. These
individuals pass to the vaccinated class R and remain there unless replaced through the term −µR. Clearly if
there is no replacement included in this model (µ = 0) then eventually the entire population of computers will
exist in R and will therefore be immune to the virus.
III. Estimation Of Parameters
We have six different constants which all have an impact on the evolution of the model over time. We
considered a population of N =100,000 computers and µ = 1/4800 which represents a replacement rate of
approximatelymore than half a year (200 days or seven months, time is measured in hours). The constant r
represents the average number of newcomputers being infected per new infection. Finding an appropriate figure
for r is a difficult task as many viruses or worms infect at differing rates. We can get a reasonable idea by
looking back at the analysis of the fastest spreading worms of the recent past. The Code-RedI worm infected
over 359,000 unique IP addresses in the 24 hour period after 19th July 2001 with a peak infection rate of 2000
news hosts per minute [10]. One of the fastest worms in history, the 2003 Slammer/Sapphire worm, doubled in
size approximately every 8.5 seconds, and after targeting 200,000 servers worldwide, had infected over 75,000
in under 10 minutes or 7,500 per minute [11]. By analyzing all of these including [12] [13], we choose the value
of r = 27 as a starting point. Estimation of α, the rate that the virus code is activated is more difficult to calculate,
as it can depend from case to case. Some viruses can lay dormant for many days if they require a user to activate
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
DOI: 10.9790/0661-17134347 www.iosrjournals.org 45 | Page
its code, such as in the case of many email viruses. Others will activate almost instantly, spreading their
malicious code to other susceptible machines in the locality. For the purposes ofthis model we shall assume that
the virusremains inactivefor an average time oftE = 6 hours.Therefore we must choose (α + pER + µ) such that
1
tE
= (α + pER + μ).We will choose a value of α = 0.1 for the rate of activation and a rate of immunization of
exposed members aspER = 0.066. The only constants left to estimate are the rate of immunization for the
infective and susceptible classes, γ and pSR respectively. We shall assume for this model that immunization is
carried out through updates which can be acquired via the internet, and that uptake of these updates will be
higher in theinfected class,I than in the non-infected class, S. We shall assume that the average time required
for an infective to be immunized against the threat is tI = 1 and thus we shall set γ = 1 .
Finally for pSR , we will assume that the immunization rate is lowest in this class as those with a
non-infected computer will not be as aware of the threat and therefore uptake of updates will be lower, and
therefore we shall set pSR = 0.02. The initial class sizes are important to have the model set up in a sensible
manner. As we are modeling the introduction of a new virus into a group of infective, the exposed and
recovered classes will initially be of zero size. Therefore we will set the initial population of infective to be N
(0) =99,990 and the infective carriers to have size I(0) = 10. A preliminary list of chosen values for the different
constants is given below.
Table (1): Parameter Estimation Table for CVE Model.
Parameter Description Value
N Total Population Size 100,000
S(0) Initial size of Susceptible Class 99,990
E(0) Initial size of Exposed Class 0
I(0) Initial size of Infective Class 10
R(0) Initial size of Recovered Class 0
μ Replacement Coefficient 0.00201
r Rate of Infection 27
α Rate of Virus Activation 0.1
pSR
RealTime Immunization-
Susceptible
0.02
pER Rate of Immunization– Exposed 0.066
γ Rate of Immunization–Infective 1
This initial setup for the CVE model is a reasonable starting point and leads to a reproduction number of R0
= 1.46 which is the condition for a endemic steady state.
IV. Results And Discussion
After solving the system, we obtain the Population-Time behavior of four classes (Susceptible,
Exposed, Infected and Removed) (Fig(1)).The combined plot shows the proposedCVE(Computer Virus
Epidemic) models evolution for the time t= 50hours (Red-Susceptible, Green-Exposed, Yellow-Infected,Blue-
Immunized) (Fig (1)). In the first few hours the susceptible class initially decreased due to the increase in
immunized computers. After 2 hours, the rate of infection(r) increased dramatically from approximately 20/hr to
well over 100/hr and by the fifth hour the rate of infection peaks at 670/hr. By this time instant the susceptible
class shrunk to only one third of its original size and was falling at a higher rate than immunization .Two hours
later there were virtually no susceptible left to infect and thus the rate ofinfection suddenly decreased. At the
same time the rate of increase in the infective class reached its maximum before becoming zero at
approximately 13 hours after the initial introduction of the virus. All the while, the immunized class increased
until it reached asymptotically its maximum value at the endemic steady state, R ≈ 98,900.The other classes tend
to their fixed pointsS≈500, I≈200 and E≈400(Fig(1)). To study the influence of a high epidemic threshold value
(R0) on the scale and timeframe of an epidemic, the value of R0was gradually increased and the effect of it on
different types of population was observed simultaneously (Fig (2) to Fig (5)). As R0 gradually increases rate of
infected population’s changes dramatically. The peaks of infected and exposed individuals sharply increased
with increasing R0 and they moved to the left of the graph. As a result susceptible populations decrease sharply.
In every moment summation of all four populations remains constant and it is N=100000. It was calculated
earlier for the case of steady states. Epidemic threshold depends on six parameters which governs in equation(6)
.The sensitivity of R0 with different parameters was studied .It was seen that R0 is linearly proportional to the
rate of infection(r). So a higher (r) might turn to a higher R0(Fig(7)). It became clear that rate of immunized-
exposed class (pER),rate of immunized-susceptible (pSR)and the rate of immunized- infective class (γ) all
influences R0 significantly. With the increase ofpER,pSR and γ it was seen that R0 decreased exponentially (Fig
(8), (9), and (10)) .On the other hand, increasing virus activation rate (α) evidently increasedR0. It increased
R0exponentially (Fig(6)). So to control epidemic we have to decrease it.Replacement coefficient (μ) shows its
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
DOI: 10.9790/0661-17134347 www.iosrjournals.org 46 | Page
effect onR0. First R0 increased exponentially with increase of (μ) than after a threshold value R0decreased
exponentially with increasing μ. (Fig(11)) Proper selection of μ is an important aspect to control epidemics.
Figure(1): Change in different types of population
with time (𝑅0= 1.46, time 50 hours).
Figure (2): For 𝑅0=2.7, time 50 hours.
Figure (3): For 𝑅0=8.1, time 50 hours
Figure (4): For 𝑅0=13.5, time 50 hours
Figure (5): For 𝑅0=21.6, time 50 hours.
a. Sensitivity of 𝑹 𝟎 with its
parameters
Figure (6): Variations of 𝑅0for 𝛼 = (0.1 − 10)
Figure (7): Variations of 𝑅0for 𝑟 = (0 − 500)
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
DOI: 10.9790/0661-17134347 www.iosrjournals.org 47 | Page
Figure (8): Variations of 𝑅0 for 𝑝 𝐸𝑅 = (0 −
0.09)
Figure (9): Variation of 𝑅0for 𝑝𝑆𝑅 = (0 − 0.09)
Figure (10): Variation of 𝑅0 for 𝛾 = (0 − 1)
Figure (11): Variation of 𝑅0 for 𝜇 = (0 − 1)
V. Conclusion
This works gives a graphical understanding of how a computer virus epidemic evolves and behaves
over time. Realization and choosing appropriate parameters for epidemic threshold shows the way to curb an
epidemic in cyber world. It could be a good insight for antivirus program developer. In the light of this, further
work can be done on immunization strategy or quarantine strategy and application of controltheory may give
good result.
References
[1]. Szor P. The Art Of Computer Virus Research And Defense. 1st
Ed. Addison-Wesley Education Publishers Inc.: 2005.
[2]. Cohen F. Computer Viruses: Theory And Experiments. Computsecur 1987;6(1):22-35.
[3]. Murray WH. The Application Of Epidemiology To Computer Viruses.Computsecur 1988:7(2) 130-50.
[4]. Kephart, J., White, S., Directed-Graph Epidemiological Models Of Computer Viruses, IEEE Symposium On Security And
Privacy (1991).
[5]. Faloutsos M, Faloustsos P, Faloustsos C. On Power-Lae Relationships Of The Internet Topology. ACM SIGCOMM
ComputcommunRev 1999,29(4):251-62.
[6]. Albert R, Barabasi A-L. Statistical Mechanics Of Complex Networks. Rev Mod Phys 2002.74(1):47-97.
[7]. Revasz E, Barbasi A-L. Hierarchical Organization In Complex Networks.Phys Rev E 2003,27(2)(Article ID 026112).
[8]. Pastor-Satorras R, Vespignani A. Epidemic Spreading In A Scale-Free Networks.
[9]. Yuan, H. And Chen, G., Network Virus-Epidemic Model With The Point- To-Group Information Propagation, Applied
Mathematics And Computation 206 (2008) 357-367
[10]. Moore, D, Shannon, C, Brown, J, Code-Red: A Case Study On The Spread And Victims Of An Internet Worm,
Http://Www.Caida.Org/ Publications/Papers/2002/Codered/Codered.Pdf
[11]. Moore, D, Paxson, V, Savage, S, Shannon, C, Staniford,S, Weaver, N, Inside The Slammer Worm,
Http://Www.Cs.Ucsd.Edu/~Savage/ Papers/IEEESP03.Pdf
[12]. ConfickerWorm Spikes Infects 1.1million Pcs In 24 Hours, Http://Arstechnica.Com/Security/News Conficker-Worm-Spikes-
Infects-1-1-Million-Pcs-In-24-Hours.Ars
[13]. Internet Usage Statistics,Http://Www.Internetworldstats.Com/Stats.Htm
[14]. VBS Love Letter And Variants, Http://Www.Symentec.Com/Security_Response/Writeup.Jsp
[15]. Zou, C. Et. Al, Email Virus Propagation Modeling And Analysis, Technical Report TR-CSE-03-04, Department Of Electrical
&Computer Engineering, Univ. Massachusetts.
[16]. Misra BK, Jha N.SEIQRS Model For The Transmission Of Malicious Objects In Computer Network. Appl Math Model
2010,34(3):710-5.
[17]. Zhang C,Yang X, Ren J. Modeling And Analysis Of The Spread Of Computer Virus, Commun Nonlinear Scinumersimul
2012;17(12):5117-24.
[18]. Robinson RC. An Introduction To Dynamic Systems: Continuous And Discrete. 1st
Ed. Prentice Hall;2004.

More Related Content

What's hot

Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copySelva Raj
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREIJNSA Journal
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREIJNSA Journal
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsEditor IJCATR
 
Ijfls05
Ijfls05Ijfls05
Ijfls05ijfls
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...swathi78
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)IOSR Journals
 
Resource Allocation for Antivirus Cloud Appliances
Resource Allocation for Antivirus Cloud AppliancesResource Allocation for Antivirus Cloud Appliances
Resource Allocation for Antivirus Cloud AppliancesIOSR Journals
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...Shakas Technologie
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...IJNSA Journal
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainIJCI JOURNAL
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionAboul Ella Hassanien
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Kent State University
 

What's hot (16)

Ijctt v17 p128-copy-copy
Ijctt v17 p128-copy-copyIjctt v17 p128-copy-copy
Ijctt v17 p128-copy-copy
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
 
Ijfls05
Ijfls05Ijfls05
Ijfls05
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
L018118083.new ramya publication (1)
L018118083.new ramya publication (1)L018118083.new ramya publication (1)
L018118083.new ramya publication (1)
 
Resource Allocation for Antivirus Cloud Appliances
Resource Allocation for Antivirus Cloud AppliancesResource Allocation for Antivirus Cloud Appliances
Resource Allocation for Antivirus Cloud Appliances
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
MultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detectionMultiAgent artificial immune system for network intrusion detection
MultiAgent artificial immune system for network intrusion detection
 
Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...Design and Implementation of Artificial Immune System for Detecting Flooding ...
Design and Implementation of Artificial Immune System for Detecting Flooding ...
 

Viewers also liked (20)

D011122934
D011122934D011122934
D011122934
 
M012329497
M012329497M012329497
M012329497
 
A010420106
A010420106A010420106
A010420106
 
B017340511
B017340511B017340511
B017340511
 
C011141018
C011141018C011141018
C011141018
 
L1102017479
L1102017479L1102017479
L1102017479
 
S130403131140
S130403131140S130403131140
S130403131140
 
Effects of EM Radiation on Living System
Effects of EM Radiation on Living System Effects of EM Radiation on Living System
Effects of EM Radiation on Living System
 
E012513749
E012513749E012513749
E012513749
 
B012630608
B012630608B012630608
B012630608
 
L1803016468
L1803016468L1803016468
L1803016468
 
K1802036171
K1802036171K1802036171
K1802036171
 
H018124360
H018124360H018124360
H018124360
 
N017259396
N017259396N017259396
N017259396
 
I017114347
I017114347I017114347
I017114347
 
D010112031
D010112031D010112031
D010112031
 
G012325053
G012325053G012325053
G012325053
 
K1103047173
K1103047173K1103047173
K1103047173
 
C010411218
C010411218C010411218
C010411218
 
K010217785
K010217785K010217785
K010217785
 

Similar to I017134347

A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...IJCNCJournal
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficAlexander Decker
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagationUltraUploader
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networksPvrtechnologies Nellore
 
Iaetsd attacking behaviour of computer worms on
Iaetsd attacking behaviour of computer worms onIaetsd attacking behaviour of computer worms on
Iaetsd attacking behaviour of computer worms onIaetsd Iaetsd
 
Comprehensive study: machine learning approaches for COVID-19 diagnosis
Comprehensive study: machine learning approaches for COVID-19 diagnosis Comprehensive study: machine learning approaches for COVID-19 diagnosis
Comprehensive study: machine learning approaches for COVID-19 diagnosis IJECEIAES
 
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...Sara Perez
 
Image Morphing: A Literature Study
Image Morphing: A Literature StudyImage Morphing: A Literature Study
Image Morphing: A Literature StudyEditor IJCATR
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsEditor IJCATR
 
An epidemic model of mobile phone virus
An epidemic model of mobile phone virusAn epidemic model of mobile phone virus
An epidemic model of mobile phone virusUltraUploader
 
A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...UltraUploader
 
THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...
THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...
THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...csandit
 
The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...
The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...
The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...cscpconf
 
A memory symptom based virus detection approach
A memory symptom based virus detection approachA memory symptom based virus detection approach
A memory symptom based virus detection approachUltraUploader
 
Dengue Prediction Model using Machine Learning techniques and Internet of Things
Dengue Prediction Model using Machine Learning techniques and Internet of ThingsDengue Prediction Model using Machine Learning techniques and Internet of Things
Dengue Prediction Model using Machine Learning techniques and Internet of ThingsTarun Swarup
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetUltraUploader
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior csandit
 

Similar to I017134347 (20)

A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network traffic
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagation
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
Iaetsd attacking behaviour of computer worms on
Iaetsd attacking behaviour of computer worms onIaetsd attacking behaviour of computer worms on
Iaetsd attacking behaviour of computer worms on
 
Comprehensive study: machine learning approaches for COVID-19 diagnosis
Comprehensive study: machine learning approaches for COVID-19 diagnosis Comprehensive study: machine learning approaches for COVID-19 diagnosis
Comprehensive study: machine learning approaches for COVID-19 diagnosis
 
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
A Study On Countermeasures Against Computer Virus Propagation Using An Agent-...
 
06558266
0655826606558266
06558266
 
Image Morphing: A Literature Study
Image Morphing: A Literature StudyImage Morphing: A Literature Study
Image Morphing: A Literature Study
 
Intrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map AlgorithmsIntrusion Detection System Using Self Organizing Map Algorithms
Intrusion Detection System Using Self Organizing Map Algorithms
 
An epidemic model of mobile phone virus
An epidemic model of mobile phone virusAn epidemic model of mobile phone virus
An epidemic model of mobile phone virus
 
A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...A mixed abstraction level simulation model of large scale internet worm infes...
A mixed abstraction level simulation model of large scale internet worm infes...
 
THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...
THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...
THE SUSCEPTIBLE-INFECTIOUS MODEL OF DISEASE EXPANSION ANALYZED UNDER THE SCOP...
 
The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...
The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...
The Susceptible-Infectious Model of Disease Expansion Analyzed Under the Scop...
 
A memory symptom based virus detection approach
A memory symptom based virus detection approachA memory symptom based virus detection approach
A memory symptom based virus detection approach
 
H1803025360
H1803025360H1803025360
H1803025360
 
Dengue Prediction Model using Machine Learning techniques and Internet of Things
Dengue Prediction Model using Machine Learning techniques and Internet of ThingsDengue Prediction Model using Machine Learning techniques and Internet of Things
Dengue Prediction Model using Machine Learning techniques and Internet of Things
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internet
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

I017134347

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 43-47 www.iosrjournals.org DOI: 10.9790/0661-17134347 www.iosrjournals.org 43 | Page Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic Abidur Rahaman1 , Amran Bhuiyan2 , Md. Ahsan Habib3 and Z. H. Mozumder4 1 (Dept.of ICT,Noakhali Science and Technology University(NSTU),Noakhali-3814,Bangladesh) 2 (Dept.of CSTE,Noakhali Science and Technology University(NSTU),Noakhali-3814,Bangladesh) 3_( Dept. of ETE,Begum Rokeya University,Rangpur,Bangladesh) 4 _(Dept. of EEE,University of Dhaka,Dhaka-1000,Bangladesh) Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biological epidemics to the domain of information technology. A new epidemic model has been proposed by incorporating a range of parameters rather than using constant parameters for a fixed population network. All individual nodes or computers are classified into four classes- susceptible, exposed, infected and immunized. Changes of population of these four classes with time and higher epidemic threshold are studied. Finally threshold sensitivity analysis has been analyzed to take into account the appropriate measures to control the virus epidemic. Keywords:Computer virus epidemic, epidemic threshold, sensitivity analysis I. Introduction Computer virusespossess a major threat both for standalone and networked computers as they can replicate themselves and spread among computers in the form of malicious programs. Destruction of data by the viruses cause serious problem for individual user and may cause disastrous situation for institutional user, even sometimes destroy the whole computer system [1]. Despite the significant development of anti-virus as a major means of defending against viruses, the computer viruses are still very much a cause of concern in computer network. As a promising alternative of anti-virus technique, the epidemic dynamics of computer viruses aims to understand the way how the computer viruses can spread across network and to work out global policies of inhibiting their prevalence. Analogous behavior of computer viruses and their biological counterparts inspired many researchers to study this new filed computer viruses study. Cohen [2] and Murray [3] evidently suggested exploiting the compartment modeling techniques developed in the epidemic dynamics of biologically infectious disease to study the spread of computer viruses. Later, Kephart and White [4] model the virus spreading in the Internet based on the biological epidemic model. All the state-of-the-arts works related this model is explained below. In [5-7], it was found that the computer network (i.e. Internet) follows diverse power-law degree distributions. This finding initiates the interest in virus spreading in complex networks, leading to the surprising finding that the epidemic threshold vanishes for scale-free networks with infinite size [8]. To fully understand the spreading mechanism of computer viruses, multifarious virus spreading models, ranging from conventional models to unconventional models such as delayed models, impulsive models and stochastic models have been proposed in [16-17]. All the above mentioned models have been implemented based on fixed parameters. This paper is intended to develop an epidemic model of computer viruses that can be checked for a range of parameters rather than for a constant parameter. It also shows how epidemic threshold affects the total process and thus decisive measures can be taken to control the viral epidemic. The rest of the paper has been organized as follows. Section 2 describes of the Mathematical Modeling of Computer Virus Epidemic in detail. Sec. 3 estimates the parameters, Sec.4 reports the result and discussion and finally concluding remarks are drawn in Sec. 5. II. Mathematical Modeling Of Computer Virus Epidemic In normal biological epidemics, if each disease carrier infects less than one person, then the infection will eventually die out. This case can mathematically be expressed by the basic reproduction number, R0 ˂ 1. The first full analysis of a computer virus invading a network using similar techniques to those used in analyzing biological epidemics by Kephart and White [4]. It applies a Susceptible-Infected-Susceptible (SIS) model to a random graph of N nodes which represent computers in a network with a general virus propagating throughout. More specific models have been developed since to deal with the different types of computer virus
  • 2. Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic DOI: 10.9790/0661-17134347 www.iosrjournals.org 44 | Page [15]. We shall now introduce a model developed to analyze the spread of acomputer virus through a network of computers which we shall call the CVE model. It is a modification of a model proposed by Yuan [9].This network is assumed to be a one in which each computers connectivity is identical, thus subject to similar governing principles as biological systems. It is assumed that each individual member of the total population is a single computer and that the computer virus is able to infect but not destroy a host. One further assumption is that once infected, a computer enters an exposed state, described by the class E, before entering the infected and contagiousclass I after a certain length of time. Those in E have the virus but its code has yet to be activated and thus cannot infect susceptible. At the same time, computers are being updated with antivirus software which enables each computer to become immune to the virus modeled by the class R.The model is described by the following system of differential equations: dS dt = μN − rSI N − pSR +μ S… . . … . (1) dE dt = rSI N − α + pER + μ E … … . . (2) dI dt = αE − γ + μ I … … … … … … … (3) dR dt = pSR S + pER E + γI … . . … … . . . (4) For steady states dS dt + dE dt + dI dt + dR dt = 0 … … … … … (5) Let us define also epidemic threshold, R0 = αμr α + pER + μ γ + μ pSR + μ … . 6 Here S, E, I and R, are all functions of t only and allconstants are assumed to be strictly positive. This model assumes a fixed population as seen through addition of the rates of change of the separate classes. The rate of this replacement can be varied by the coefficient µ in the model and the introduction of these new computers is modeled by the term µN inthe first equation. It isassumed for simplification of the model that newcomputers when introduced are not immune to the virus. Removal of computers is modeled by each of the −µ terms in each equation and since N = S + I + E + R, this removal and replacement cancels out but still has an effect on how the virus spreads.Infection of a computer withthe virus from an infective is assumed to be proportional to the product SI given in (1), which represents connectionsbetween susceptible and infective computers. A fraction r of these will result in a successful passing on of the virus. These initial infections pass into the infected but not contagious class E via the interaction rSI in equation (2). Individuals in E whose virus code becomes active move to the infected and contagious class I via the term −αE in equation (2). It is assumed that the rate of change of this activation is proportional to the size of E and can be varied by the constant α which is a reasonable assumption to make. Immunization of individual computers from the susceptible, exposed and infected classes to the immunized class R is carried out via the – pSRS, −pER E and −γI terms in the model. pSR S models the effect of real-time immunization, pER E models the effect of immunizing individual computers in the non-infective class E and γI is the recovery rate from I to R. These constants can be changed to model the differing rates of immunization for each class. These individuals pass to the vaccinated class R and remain there unless replaced through the term −µR. Clearly if there is no replacement included in this model (µ = 0) then eventually the entire population of computers will exist in R and will therefore be immune to the virus. III. Estimation Of Parameters We have six different constants which all have an impact on the evolution of the model over time. We considered a population of N =100,000 computers and µ = 1/4800 which represents a replacement rate of approximatelymore than half a year (200 days or seven months, time is measured in hours). The constant r represents the average number of newcomputers being infected per new infection. Finding an appropriate figure for r is a difficult task as many viruses or worms infect at differing rates. We can get a reasonable idea by looking back at the analysis of the fastest spreading worms of the recent past. The Code-RedI worm infected over 359,000 unique IP addresses in the 24 hour period after 19th July 2001 with a peak infection rate of 2000 news hosts per minute [10]. One of the fastest worms in history, the 2003 Slammer/Sapphire worm, doubled in size approximately every 8.5 seconds, and after targeting 200,000 servers worldwide, had infected over 75,000 in under 10 minutes or 7,500 per minute [11]. By analyzing all of these including [12] [13], we choose the value of r = 27 as a starting point. Estimation of α, the rate that the virus code is activated is more difficult to calculate, as it can depend from case to case. Some viruses can lay dormant for many days if they require a user to activate
  • 3. Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic DOI: 10.9790/0661-17134347 www.iosrjournals.org 45 | Page its code, such as in the case of many email viruses. Others will activate almost instantly, spreading their malicious code to other susceptible machines in the locality. For the purposes ofthis model we shall assume that the virusremains inactivefor an average time oftE = 6 hours.Therefore we must choose (α + pER + µ) such that 1 tE = (α + pER + μ).We will choose a value of α = 0.1 for the rate of activation and a rate of immunization of exposed members aspER = 0.066. The only constants left to estimate are the rate of immunization for the infective and susceptible classes, γ and pSR respectively. We shall assume for this model that immunization is carried out through updates which can be acquired via the internet, and that uptake of these updates will be higher in theinfected class,I than in the non-infected class, S. We shall assume that the average time required for an infective to be immunized against the threat is tI = 1 and thus we shall set γ = 1 . Finally for pSR , we will assume that the immunization rate is lowest in this class as those with a non-infected computer will not be as aware of the threat and therefore uptake of updates will be lower, and therefore we shall set pSR = 0.02. The initial class sizes are important to have the model set up in a sensible manner. As we are modeling the introduction of a new virus into a group of infective, the exposed and recovered classes will initially be of zero size. Therefore we will set the initial population of infective to be N (0) =99,990 and the infective carriers to have size I(0) = 10. A preliminary list of chosen values for the different constants is given below. Table (1): Parameter Estimation Table for CVE Model. Parameter Description Value N Total Population Size 100,000 S(0) Initial size of Susceptible Class 99,990 E(0) Initial size of Exposed Class 0 I(0) Initial size of Infective Class 10 R(0) Initial size of Recovered Class 0 μ Replacement Coefficient 0.00201 r Rate of Infection 27 α Rate of Virus Activation 0.1 pSR RealTime Immunization- Susceptible 0.02 pER Rate of Immunization– Exposed 0.066 γ Rate of Immunization–Infective 1 This initial setup for the CVE model is a reasonable starting point and leads to a reproduction number of R0 = 1.46 which is the condition for a endemic steady state. IV. Results And Discussion After solving the system, we obtain the Population-Time behavior of four classes (Susceptible, Exposed, Infected and Removed) (Fig(1)).The combined plot shows the proposedCVE(Computer Virus Epidemic) models evolution for the time t= 50hours (Red-Susceptible, Green-Exposed, Yellow-Infected,Blue- Immunized) (Fig (1)). In the first few hours the susceptible class initially decreased due to the increase in immunized computers. After 2 hours, the rate of infection(r) increased dramatically from approximately 20/hr to well over 100/hr and by the fifth hour the rate of infection peaks at 670/hr. By this time instant the susceptible class shrunk to only one third of its original size and was falling at a higher rate than immunization .Two hours later there were virtually no susceptible left to infect and thus the rate ofinfection suddenly decreased. At the same time the rate of increase in the infective class reached its maximum before becoming zero at approximately 13 hours after the initial introduction of the virus. All the while, the immunized class increased until it reached asymptotically its maximum value at the endemic steady state, R ≈ 98,900.The other classes tend to their fixed pointsS≈500, I≈200 and E≈400(Fig(1)). To study the influence of a high epidemic threshold value (R0) on the scale and timeframe of an epidemic, the value of R0was gradually increased and the effect of it on different types of population was observed simultaneously (Fig (2) to Fig (5)). As R0 gradually increases rate of infected population’s changes dramatically. The peaks of infected and exposed individuals sharply increased with increasing R0 and they moved to the left of the graph. As a result susceptible populations decrease sharply. In every moment summation of all four populations remains constant and it is N=100000. It was calculated earlier for the case of steady states. Epidemic threshold depends on six parameters which governs in equation(6) .The sensitivity of R0 with different parameters was studied .It was seen that R0 is linearly proportional to the rate of infection(r). So a higher (r) might turn to a higher R0(Fig(7)). It became clear that rate of immunized- exposed class (pER),rate of immunized-susceptible (pSR)and the rate of immunized- infective class (γ) all influences R0 significantly. With the increase ofpER,pSR and γ it was seen that R0 decreased exponentially (Fig (8), (9), and (10)) .On the other hand, increasing virus activation rate (α) evidently increasedR0. It increased R0exponentially (Fig(6)). So to control epidemic we have to decrease it.Replacement coefficient (μ) shows its
  • 4. Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic DOI: 10.9790/0661-17134347 www.iosrjournals.org 46 | Page effect onR0. First R0 increased exponentially with increase of (μ) than after a threshold value R0decreased exponentially with increasing μ. (Fig(11)) Proper selection of μ is an important aspect to control epidemics. Figure(1): Change in different types of population with time (𝑅0= 1.46, time 50 hours). Figure (2): For 𝑅0=2.7, time 50 hours. Figure (3): For 𝑅0=8.1, time 50 hours Figure (4): For 𝑅0=13.5, time 50 hours Figure (5): For 𝑅0=21.6, time 50 hours. a. Sensitivity of 𝑹 𝟎 with its parameters Figure (6): Variations of 𝑅0for 𝛼 = (0.1 − 10) Figure (7): Variations of 𝑅0for 𝑟 = (0 − 500)
  • 5. Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic DOI: 10.9790/0661-17134347 www.iosrjournals.org 47 | Page Figure (8): Variations of 𝑅0 for 𝑝 𝐸𝑅 = (0 − 0.09) Figure (9): Variation of 𝑅0for 𝑝𝑆𝑅 = (0 − 0.09) Figure (10): Variation of 𝑅0 for 𝛾 = (0 − 1) Figure (11): Variation of 𝑅0 for 𝜇 = (0 − 1) V. Conclusion This works gives a graphical understanding of how a computer virus epidemic evolves and behaves over time. Realization and choosing appropriate parameters for epidemic threshold shows the way to curb an epidemic in cyber world. It could be a good insight for antivirus program developer. In the light of this, further work can be done on immunization strategy or quarantine strategy and application of controltheory may give good result. References [1]. Szor P. The Art Of Computer Virus Research And Defense. 1st Ed. Addison-Wesley Education Publishers Inc.: 2005. [2]. Cohen F. Computer Viruses: Theory And Experiments. Computsecur 1987;6(1):22-35. [3]. Murray WH. The Application Of Epidemiology To Computer Viruses.Computsecur 1988:7(2) 130-50. [4]. Kephart, J., White, S., Directed-Graph Epidemiological Models Of Computer Viruses, IEEE Symposium On Security And Privacy (1991). [5]. Faloutsos M, Faloustsos P, Faloustsos C. On Power-Lae Relationships Of The Internet Topology. ACM SIGCOMM ComputcommunRev 1999,29(4):251-62. [6]. Albert R, Barabasi A-L. Statistical Mechanics Of Complex Networks. Rev Mod Phys 2002.74(1):47-97. [7]. Revasz E, Barbasi A-L. Hierarchical Organization In Complex Networks.Phys Rev E 2003,27(2)(Article ID 026112). [8]. Pastor-Satorras R, Vespignani A. Epidemic Spreading In A Scale-Free Networks. [9]. Yuan, H. And Chen, G., Network Virus-Epidemic Model With The Point- To-Group Information Propagation, Applied Mathematics And Computation 206 (2008) 357-367 [10]. Moore, D, Shannon, C, Brown, J, Code-Red: A Case Study On The Spread And Victims Of An Internet Worm, Http://Www.Caida.Org/ Publications/Papers/2002/Codered/Codered.Pdf [11]. Moore, D, Paxson, V, Savage, S, Shannon, C, Staniford,S, Weaver, N, Inside The Slammer Worm, Http://Www.Cs.Ucsd.Edu/~Savage/ Papers/IEEESP03.Pdf [12]. ConfickerWorm Spikes Infects 1.1million Pcs In 24 Hours, Http://Arstechnica.Com/Security/News Conficker-Worm-Spikes- Infects-1-1-Million-Pcs-In-24-Hours.Ars [13]. Internet Usage Statistics,Http://Www.Internetworldstats.Com/Stats.Htm [14]. VBS Love Letter And Variants, Http://Www.Symentec.Com/Security_Response/Writeup.Jsp [15]. Zou, C. Et. Al, Email Virus Propagation Modeling And Analysis, Technical Report TR-CSE-03-04, Department Of Electrical &Computer Engineering, Univ. Massachusetts. [16]. Misra BK, Jha N.SEIQRS Model For The Transmission Of Malicious Objects In Computer Network. Appl Math Model 2010,34(3):710-5. [17]. Zhang C,Yang X, Ren J. Modeling And Analysis Of The Spread Of Computer Virus, Commun Nonlinear Scinumersimul 2012;17(12):5117-24. [18]. Robinson RC. An Introduction To Dynamic Systems: Continuous And Discrete. 1st Ed. Prentice Hall;2004.