图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
自动化与信息科学期刊
SJR: 0.275 SNIP: 0.59 CiteScore™: 0.8

ISSN 打印: 1064-2315
ISSN 在线: 2163-9337

卷:
卷 52, 2020 卷 51, 2019 卷 50, 2018 卷 49, 2017 卷 48, 2016 卷 47, 2015 卷 46, 2014 卷 45, 2013 卷 44, 2012 卷 43, 2011 卷 42, 2010 卷 41, 2009 卷 40, 2008 卷 39, 2007 卷 38, 2006 卷 37, 2005 卷 36, 2004 卷 35, 2003 卷 34, 2002 卷 33, 2001 卷 32, 2000 卷 31, 1999 卷 30, 1998 卷 29, 1997 卷 28, 1996

自动化与信息科学期刊

DOI: 10.1615/JAutomatInfScien.v51.i11.40
pages 34-49

Improvement of the Model of Computer Epidemics Based on Expanding the Set of Possible States of the Information Systems Objects

Alexey S. Bychkov
Kiev National Taras Shevchenko University, Kiev
Veronika Navotna
Brno University of Technology, Brno (Czech Republic)
Victor L. Shevchenko
Kiev National Taras Shevchenko University, Kiev
Alina V. Shevchenko
State University of Telecommunications, Kiev

ABSTRACT

Currently computer attacks on information system have acquired a global epidemiological character. For effective attacks counteraction it is necessary to predict their development. Of urgency is the improvement of computer epidemics models and determination of control parameters that hold the epidemic within the safe limits. The purpose of this article is to improve existing models of computer epidemics by identifying unaccounted states of objects of information systems. This work has considered and refined the classification of possible states of attacked objects of information systems. The set of types of states of susceptibility and immunity to infection has been expanded and the influence of preventive measures has been taken into account. The account of appearance and detection of infection signs has been refined. The account of the various stages of an infected condition, treatment in quarantine and without quarantine has been detailed. The new set of states of objects after the epidemic has been introduced − partial functionality of varying degree. Objects in this state are divided into several groups according to the levels of residual functionality. The number of states depends on external conditions, characteristics of the system under study and the characteristics of the problem formulation. The classification of computer epidemic models SI, SI exp, SI SL, SIS, SIR, SIRI, SEIR, SEnImRF, SLBQRS, PSIDR is considered and refined. The similarity of biological and computer epidemics is considered. The general model of the epidemiological process is improved as a structural VNF model. It is shown that most of existing epidemic models are particular cases of VNF model. The structural-logical and the mathematical models of computer epidemics are improved and tested using the Code Red CRv1 worm epidemic as an example. It has been established that qualitative pictures of dynamics of many epidemics, for example, CRv1, CRv2, SQL Slammer are similar but develop in their own time scales. The most typical stage is the growing level of infection which can be well approximated by the logistic curve. The management of the epidemic hazard level via the coefficients of susceptibility to infection and the infection transmission coefficient are proposed.

REFERENCES

  1. Petrov P., Dimitrov G., Ivanov S., A comparative study on web security technologies used in Irish and Finnish banks, 18 International Multidisciplinary Scientific Geoconference SGFM 2018: Conference Proceedings, 2018, Albena, Bulgaria, STEF92 Technology Ltd., Sofia, 2018, 18, No. 2.1, 3-10. .

  2. Cohen F., Computer viruses, PhD thesis, University of Southern California, 1985. .

  3. Kephart J.O., Whites S.R., Directed-graph epidemical models of computer viruses, Proceedings of the IFFF Computer Society Symposium on Research in Security and Privacy, 1991, 343-358. .

  4. Garetto M., Gong W., Towsley D., Modeling malware spreading dynamics, IFFF INFOCOM 2003, www.ieee-infocom.org/2003/papers/46_01.PDF (accessed 23 March 2017). .

  5. Staniford S., Paxson V., Weaver N., How to own the internet in your spare time, Proceedings of the 11th USFNIXSecurity Symposium (Security '02), 2002, 149-167. .

  6. Moore D., Shannon C., The spread of the code-red worm (CRv2), Official site Center for Applied Internet Data Analysis (CAIDA), 2001, https://www.caida.org/research/security/code-red/coderedv2_analysis.xml. .

  7. Moore D., Shannon C., Brown J., Code-red: a case study on the spread and victims of an internet worm, Proceedings of the ACM SIGCOMM/USFNIX Internet Measurement Workshop, 2002, 273-284. .

  8. Serazzi G., Zanero S., Computer virus propagation models, Eds. Calzarossa M.C., Gelenbe E., Performance Tools and Applications to Networked Systems, MASCOTS 2003, Lecture Notes in Computer Science, 2003, 2965, 26-50, DOI: 10.1007/978-3-540-24663-3_2. .

  9. Klimentiev K.E., Computer viruses and antiviruses: a programmer view [in Russian], DMK Press, Moscow, 2013. .

  10. Zhang C., Global behavior of a computer virus propagation model on multilayer networks, Hindawi. Security and Communication Networks, 2018, 2018, Art. ID 2153195, 1-9, DOI: 10.1155/2018/ 2153195. .

  11. Leveille J., Epidemic spreading in technological networks, 2002, www.hpl.hp.com/techreports /2002/HPL-2002-287.pdf (accessed 23 March 2017) .

  12. Cameron N., Preciado V.M., Pappas G.J., Analysis and control of epidemics: a survey of spreading processes on complex networks, IFFF Control Systems, 2016, 36, No. 1, 26-46. .

  13. Boev B.V., Makarov V.V., Geoinformation systems and flue epidemics, Veterinarnaya patalogiya, 2004, No. 3 (10), 51-59, http://elibrary.ru/item.asp?id=9165685 (accessed 23 March 2017) .

  14. Onwubuoya C., Nwanze D.E., Erejuwa J.S., Akinyemi S.T., An approximate solution of a computer virus model with antivirus using modified differential transform method, International Journal of Engineering Research (IJFRT), 2018, 7, No. 4, 154-161, www.ijert.org. .

  15. Umbreen F., Mubasher A., Nauman Ah., Muhammad R.M., Numerical modeling of susceptible latent breaking-out quarantine computer virus epidemic dynamic, Heliyon, 2018, 4, e00631, 1-21, DOI: 10.1016/j.heliyon.2018.e00631. .

  16. Baroyan O.V., Rvachev L.A., Ivannikov Yu.G., Simulation and prognosis of flue epidemic for USSR territory [in Russian], IEM im. N.F. Gamaleya, Moscow, 1977. .

  17. Zhang Z., Song L., Dynamics of a computer virus propagation model with delays and graded infection rate, Hindawi. Advances in Mathematical Physics, 2017, 2017, Art. ID 4514935, 1-13, DOI: 10.1155/2017/4514935. .

  18. Yang L.-X., Yang X., Wu Y., The impact of patch forwading on the prevalence of computer virus: a theoretical assessment approach, Applied Mathematical Modelling, 2017, 43, 110-125. .

  19. Kermack W.O., McKendrick A.G., A contribution to the mathematical theory of epidemics, Proc. Roy. Soc. Lond. A., 1927, 115, 700-721. .

  20. Viyun V.I., Eremenko T.K., Kuzmenko G.E., Mikhnenko Yu.A., On one approach to prognosis epidemiological situation with ARVI-flu using time series, Matematychni mashyny i systemy, 2011, No. 2, 131-136. .

  21. Soloviev S.O., Tereshchenko I.O., Dzyublyk I.V., Mathematical modeling and prognosis of rotavirus infection disease among children before 5 years old in Ukraine, Medychna informatyka ta inzheneriya, 2012, No. 1, 23-29. .

  22. Stollenwerk N., Jansen V., Population biology and criticality, From critical birth-death processes to self-organized criticality in mutation pathogen system, Imperial College Press, London, 2011. .

  23. Yao Y., Fu Q., Yang W., Wang Y., Sheng C., An epidemic model of computer worms with time delay and variable infection rate, Hindawi. Security and Communication Networks, 2018, 2018, Art. ID 9756982, 1-11, DOI: 10.1155/2018/9756982. .

  24. Shevchenko A., Shcheblanin J., Shevchenko V., The epidemiological approach to prognosis and management of information incidents, Systemy obrobky informatsii, 2017, No. 5 (151), 145-150, http://www.hups.mil.gov.ua/periodic-app/journal/soi/2017/5. .

  25. Shevchenko A., Shevchenko V., The epidemiological approach to information security incidents forecasting for decision making systems, 13-th International Conference Perspective Technologies and Methods in MEMS Design (MEMSTECH). Proceeding, Polyana, April 20-23, 2017, 174-177, http://ieeexplore.ieee.org/document/7937561, DOI: 10.1109/MEMSTECH.2017.7937561. .

  26. Gepko A.L., Shevchenko A.V., Mathematical model of prognosis of epidemic dynamics, Profilaktychna medycyna, No. 3 (15), 3-6. .


Articles with similar content:

Perfection of Computer Epidemic Model by Estimation of Functional Stability of the Information System
Journal of Automation and Information Sciences, Vol.52, 2020, issue 1
Alina V. Shevchenko , Georgiy P. Dimitrov , Victor L. Shevchenko , Alexey S. Bychkov
Matching of External Criterion and Method of Sample Partitioning for Solving Problem of Structural-Parametric Identification by Group Method of Data Handling
Journal of Automation and Information Sciences, Vol.47, 2015, issue 10
Nina V. Kondrashova
Iterative Identification of Multiconnected Discrete Systems
Journal of Automation and Information Sciences, Vol.41, 2009, issue 10
Aleksey O. Zhukov
The Estimation Method of Time-varying Parameters of Regression Models
Journal of Automation and Information Sciences, Vol.44, 2012, issue 11
Arnold S. Korkhin
INTELLIGENT SIMULATION OF NETWORK WORM PROPAGATION USING THE CODE RED AS AN EXAMPLE
Telecommunications and Radio Engineering, Vol.78, 2019, issue 5
D. Chumachenko, S. Yakovlev, K. Chumachenko