Abstract
Considering the characteristics of the propagation of worm, we can analyze it by epidemic model. In this paper, we build a SIQR model for Internet worm virus propagation depended on the two-factor model. By using the theory of differential equations, the dynamical properties of the model is analyzed, the regularity of Internet worm virus propagation is gained and numerical simulation is presented. The analysis techniques of the mathematical model provide theoretical foundation of control and forecast for Internet worm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kephart, J.O., White, S.R.: Directed Graph epidemiological Model of Computer Viruses. In: Proc. of the 1991 IEEE Symposium on security and Privacy, pp. 343–359 (1991)
Wang, Y., Wang, C.X.: Modeling the effects of timing parameters on virus propagation [EB/OL], http://xys.ccert.edu.cn/reference/Worms/Worm2003/p61-wang.pdf
Kim, J., Radhakrishnan, S., Dhall, S.K.: Measurement and analysis of worm propagation on Internet network topology. In: Proceedings of 13th International Conference on Computer Communications and Networks, pp. 495–500 (2004)
Wang, Y., Wang, C.: Modeling the effects of timing parameters on virus propagation, http://xys.ccert.edu.cn/reference/Worms/Worm2003/p61-wang.pdf
Tanachaiwiwat, S., Helmy, A.X.: Modeling and analysis of worm interactions (war of the worms). In: Fourth International Conference on Broadband Communications, Networks and Systems, pp. 649–658 (2007)
Zhou, H., Wen, Y., Zhao, H.: Passive Worm Propagation Modeling and Analysis. In: International Multi-Conference on Computing in the Global Information Technology, p. 32 (2007)
Abdelhafez, M., Riley, G., Cole, R.G., Phamdo, N.: Modeling and Simulations of TCP MANET Worms. In: 21st International Workshop on Principles of Advanced and Distributed Simulation (PADS 2007), pp. 123–130 (2007)
Zou, C.C., Gong, W., Towsley, D.: Code Red worm propagationmodeling and analysis. In: Proc. of the 9th ACM Symp. on Computer and Communication Security, Washington, pp. 138–147 (2002)
Yu, D., Jiwen, Z.: Improved Two-factor worm propagation model. Microcomputer information 26 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shaojie, W., Qiming, L. (2009). Analysis of a Mathematical Model for Worm Virus Propagation. In: Park, J.H., Zhan, J., Lee, C., Wang, G., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Its Application. ISA 2009. Communications in Computer and Information Science, vol 36. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02633-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-02633-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02632-4
Online ISBN: 978-3-642-02633-1
eBook Packages: Computer ScienceComputer Science (R0)