Advertisement

A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks

  • Mohamed Amine RguibiEmail author
  • Najem MoussaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11704)

Abstract

The spread of computer active worms is usually modeled by epidemic diffusion processes and widely applied to peer-to-peer computing and social networks. Many protective interventions are recommended to restrain the electronic epidemic, such as immunization strategies or the installation of anti-virus software. In real-world networks, a natural framework for game theory is created where each player (internet user) decides on his own strategy: to secure his host by paying the cost of antivirus software or to remain unsecured, and then takes the risk of being infected later. We introduce this issue by presenting an agent-based model for simulating a vaccination game. In this work, we study the neighbor’s impact including the imitation behavior effects on vaccination behavior, which may help to relieve the severity of active worms in peer to peer networks. The simulation results show that imitation behavior works well only when the network initially have more than 20% of vaccinated peers. Moreover, the higher the cost of vaccination, the more players tend to imitate the strategy of neighbors.

Keywords

Epidemic Game theory Peer-to-peer 

References

  1. 1.
    Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.: Network game with attacker and protector entities. In: Deng, X., Du, D.-Z. (eds.) ISAAC 2005. LNCS, vol. 3827, pp. 288–297. Springer, Heidelberg (2005).  https://doi.org/10.1007/11602613_30CrossRefzbMATHGoogle Scholar
  2. 2.
    Mavronicolas, M., Papadopoulou, V., Philippou, A., Spirakis, P.: A graph-theoretic network security game. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 969–978. Springer, Heidelberg (2005).  https://doi.org/10.1007/11600930_98CrossRefzbMATHGoogle Scholar
  3. 3.
    Mavronicolas, M., Monien, B., Papadopoulou, V.G.: How many attackers can selfish defenders catch? In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), p. 470, IEEE, January 2008Google Scholar
  4. 4.
    Wang, Y., Wen, S., Xiang, Y., Zhou, W.: Modeling the propagation of worms in networks: a survey. IEEE Commun. Surv. Tutorials 16(2), 942–960 (2014)CrossRefGoogle Scholar
  5. 5.
    Jafarabadi, A., Azgomi, M.A.: A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. Peer-to-Peer Network. Appl. 8(6), 1008–1022 (2015)CrossRefGoogle Scholar
  6. 6.
    Fu, F., Rosenbloom, D.I., Wang, L., Nowak, M.A.: Imitation dynamics of vaccination behaviour on social networks. Proc. R. Soc. B Biol. Sci. 278(1702), 42–49 (2010) CrossRefGoogle Scholar
  7. 7.
    Liu, C., Zhang, Z.K.: Information spreading on dynamic social networks. Commun. Nonlinear Sci. Numer. Simul. 19(4), 896–904 (2014)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Mishra, B.K., Pandey, S.K.: Dynamic model of worm propagation in computer network. Appl. Math. Model. 38(7–8), 2173–2179 (2014)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Wang, Q., Chen, Z., Chen, C., Pissinou, N.: On the robustness of the botnet topology formed by worm infection. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, IEEE, pp. 1–6, December 2010Google Scholar
  10. 10.
    Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W.: Modeling and detection of camouflaging worm. IEEE Trans. Dependable Secure Comput. 8(3), 377–390 (2011)CrossRefGoogle Scholar
  11. 11.
    Szabó, G., Tőke, C.: Evolutionary prisoner’s dilemma game on a square lattice. Phys. Rev. E 58(1), 69 (1998)CrossRefGoogle Scholar
  12. 12.
    Traulsen, A., Pacheco, J.M., Nowak, M.A.: Pairwise comparison and selection temperature in evolutionary game dynamics. J. Theor. Biol. 246(3), 522–529 (2007)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Fukuda, E., et al.: Risk assessment for infectious disease and its impact on voluntary vaccination behavior in social networks. Chaos Solitons Fractals 68, 1–9 (2014)CrossRefGoogle Scholar
  14. 14.
    Han, D., Sun, M.: Can memory and conformism resolve the vaccination dilemma? Physica A Stat. Mech. Appl. 415, 95–104 (2014)CrossRefGoogle Scholar
  15. 15.
    Ichinose, G., Kurisaku, T.: Positive and negative effects of social impact on evolutionary vaccination game in networks. Physica A Stat. Mech. Appl. 468, 84–90 (2017)CrossRefGoogle Scholar
  16. 16.
    Saha, S., Adiga, A., Vullikanti, A.K.S.: Equilibria in epidemic containment games. In: Twenty-Eighth AAAI Conference on Artificial Intelligence, June 2014Google Scholar
  17. 17.
    Gillespie, D.T.: Exact stochastic simulation of coupled chemical reactions. J. Phys. Chem. 81(25), 2340–2361 (1977)CrossRefGoogle Scholar
  18. 18.
    Barabási, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.LAROSERI, Department of Computer Science, Faculty of SciencesUniversity of Chouaib DoukkaliEl JadidaMorocco

Personalised recommendations