Eradicating Computer Viruses on Networks

نویسنده

  • Jinyu Huang
چکیده

Spread of computer viruses can be modeled as the SIS (susceptible-infected-susceptible) epidemic propagation. We show that in order to ensure the random immunization or the targeted immunization effectively prevent computer viruses propagation on homogeneous networks, we should install antivirus programs in every computer node and frequently update those programs. This may produce large work and cost to install and update antivirus programs. Then we propose a new policy called “network monitors” to tackle this problem. In this policy, we only install and update antivirus programs for small number of computer nodes, namely the “network monitors”. Further, the “network monitors” can monitor their neighboring nodes’ behavior. This mechanism incur relative small cost to install and update antivirus programs.We also indicate that the policy of the “network monitors” is efficient to protect the network’s safety. Numerical simulations confirm our analysis. PACS. 89.75.Hc Networks and genealogical trees – 05.70.Jk Critical point phenomena – 64.60.ah Percolation

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Architecture for an Adaptive Computer Virus Immune System

Computer viruses are widely recognized as a sig-niicant computer threat. The \birth rate" of new viruses is high and increasing due to global connec-tivity, and technology improvements can accelerate their spread. In response to this threat, some contemporary research eeorts are aimed at creating computer virus immune systems (CVIS). A CVIS uses the human immune system as a model for identifyin...

متن کامل

Halting viruses in scale-free networks.

The vanishing epidemic threshold for viruses spreading on scale-free networks indicate that traditional methods, aiming to decrease a virus' spreading rate cannot succeed in eradicating an epidemic. We demonstrate that policies that discriminate between the nodes, curing mostly the highly connected nodes, can restore a finite epidemic threshold and potentially eradicate a virus. We find that th...

متن کامل

A Survey on Multicast Routing Approaches in Wireless Mesh Networks

Wireless mesh networks (WMNs) which mediates the broadband Internet access, have been recently received many attentions by the researchers. In order to increase capacity in these networks, nodes are equipped with multiple radios tuned on multiple channels emerging multi radio multi-channel WMNs (MRMC WMNs). Therefore, a vital challenge that poses in MRMC WMNs is how to properly assign channels ...

متن کامل

Experiments on the Impact of Computer Viruses on Modern Computer Networks

In this paper, we describe some initial results of experiments on the impact of computer viruses on two modern computer networks. We begin by describing a research environment designed to allow safe and repeatable experiments with computer viruses. Next, we describe exhaustive tests of protection settings, their effectiveness against viruses in two very common computing environments, and other ...

متن کامل

A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory

The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1207.3388  شماره 

صفحات  -

تاریخ انتشار 2012