Skip to main content

Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose

  • Conference paper
Autonomic and Trusted Computing (ATC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Included in the following conference series:

Abstract

The social-network-based epidemics, such as email-based ones, have been long studied. However, few have noticed some newly emerging epidemics which especially based on portable devices. In this paper, we think of such viruses and take a representative, the Rose epidemic, for case study. We build a model with a system of differential equations and closed-form solutions for three propagation scenes correspondingly. With both theoretical and numerical analysis, we find out that (1) Rose is able to infect hosts as exponentially as the Internet-based worms do;(2) In the Internet cafe scene, it is difficult to contain Rose even with reactive recovery measures; (3) the most influential factors for Rose’s propagation are the amount of hosts and portable devices and the lifetime of Internet cafe machines, while the arrival rate of clients and the proportion of immune machines only affect in the print service office scene.

This work is supported by National Science Foundation of China (NSFC) under grants No.60433040 and No.60731160630, the Research Fund for the Doctoral Program of Higher Education under grant No.20050487040.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blaster Worms, CERT Advisory CA-2003-20 W32/Blaster Worm, http://www.cert.org/advisories/CA-2003-20.html

  2. Code Red Worms, CAIDA Analysis of Code-Red, http://www.caida.org/analysis/security/code-red/

  3. Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proc. of the 13th USENIX Security Symposium (2004)

    Google Scholar 

  4. Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient Immunization Strategies for Computer Networks and Populations. Physical Review Letters 91(24), 247–901 (2003)

    Article  Google Scholar 

  5. Yang, S., Jin, H., Liao, X., Yao, H.: OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks. In: Proc. of ACIS SNPD 2007, Qingdao, China, July 30-August 2 (2007)

    Google Scholar 

  6. Scott, J.: Social Network Analysis: A Handbook, 2nd edn. Sage, London (2000)

    Google Scholar 

  7. Rose Epidemic, Rose Virus and Solution (in Chinese), http://grid.hust.edu.cn/cgcl/rose.htm

  8. Nimaya Worm, Worm.Nimaya (Panda) and Special Cleanup Tools (in Chinese), http://it.rising.com.cn/Channels/Service/2006-11/1163505486d38734.shtml

  9. Ebel, H., Davidsen, J., Bornholdt, S.: Dynamics of Social Networks. Complexity 8(2), 24–27 (2002)

    Article  MathSciNet  Google Scholar 

  10. Newman, M.E.J.: The Structure and Function of Complex Networks. SIAM Review 45(2), 167–256 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  11. Pasteor-Satorras, R., Vespignani, A.: Epidemics and Immunization in Scale-Free Networks. In: Handbook of Graphs and Networks: From the Genome to the Internet, Wiley-VCH (2003)

    Google Scholar 

  12. Grabowskia, A., Kosiński, R.A.: The SIS Model of Epidemic Spreading in a Hierarchical Social Network. Acta. Phys. Polon. B 36, 1579–1593 (2005)

    Google Scholar 

  13. Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86(14), 3200 (2001)

    Article  Google Scholar 

  14. Liu, Z., Hu, B.: Epidemic spreading in community networks. Europhys. Lett. 72(2), 315 (2005)

    Article  MathSciNet  Google Scholar 

  15. Levi, A., Koc, C.K.: Risks in Email Security. Communications of the ACM 44(8), 112–112 (2001)

    Article  Google Scholar 

  16. Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. E 66(035101) (2002)

    Google Scholar 

  17. Takahashi, K., Abe, T., Kawashima, M.: Stopping Junk Email by Using Conditional ID Technology: privango. NTT Technical Review 3(3), 52–56 (2005)

    Google Scholar 

  18. Oda, T., White, T.: Immunity from spam: an analysis of an artificial immune system for junk email detection. In: Proc. of 4th International Conference on Artificial Immune Systems, pp. 276–289 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, S., Jin, H., Liao, X., Liu, S. (2008). Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics