Detecting Sources of Computer Viruses in Networks: Theory and Experiment

被引:0
|
作者
Shah, Devavrat [1 ]
Zaman, Tauhid [1 ]
机构
[1] MIT, Cambridge, MA 02139 USA
关键词
Epidemics; Estimation; CENTRALITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide a systematic study of the problem of finding the source of a computer virus in a network. We model virus spreading in a network with a variant of the popular SIR model and then construct an estimator for the virus source. This estimator is based upon a novel combinatorial quantity which we term rumen. centrality. We establish that this is an ML estimator for a class of graphs. We find the following surprising threshold phenomenon: on trees which grow faster than a line, the estimator always has non-trivial detection probability, whereas on trees that grow like a line, the detection probability will go to 0 as the network grows. Simulations performed on synthetic networks such as the popular small-world and scale-free networks, and on real networks such as an internet AS network and the U.S. electric power grid network, show that the estimator either finds the source exactly or within a few hops in different network topologies. We compare rumor centrality to another common network centrality notion known as distance centrality. We prove that on trees, the rumor center and distance center are equivalent, but on general networks, they may differ. Indeed, simulations show that rumor centrality outperforms distance centrality in finding virus sources in networks which are not tree-like.
引用
收藏
页码:203 / 214
页数:12
相关论文
共 50 条
  • [1] Detecting Covert Channels in Computer Networks Based on Chaos Theory
    Zhao, Hong
    Shi, Yun-Qing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 273 - 282
  • [2] AN ABSTRACT THEORY OF COMPUTER VIRUSES
    ADLEMAN, LM
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 354 - 374
  • [3] Detecting unknown computer viruses - A new approach
    Mori, A
    [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 226 - 241
  • [4] Technological networks and the spread of computer viruses
    Balthrop, J
    Forrest, S
    Newman, MEJ
    Williamson, MM
    [J]. SCIENCE, 2004, 304 (5670) : 527 - 529
  • [5] Email networks and the spread of computer viruses
    Newman, MEJ
    Forrest, S
    Balthrop, J
    [J]. PHYSICAL REVIEW E, 2002, 66 (03)
  • [6] Computer Viruses: The Abstract Theory Revisited
    Gladychev, Nikolai
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 406 - 414
  • [7] Detecting Computer Intrusions with Bayesian Networks
    Tylman, Wojciech
    [J]. INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, PROCEEDINGS, 2009, 5788 : 82 - 91
  • [8] Proceedings Sources of viruses - experiment about the protectorate activist literature
    Fialova, Alena Sidakova
    [J]. CESKA LITERATURA, 2020, 68 (01): : 40 - 64
  • [9] Neural Networks Ensemble Approach for Detecting Attacks in Computer Networks
    Bukhtoyarov, Vladimir
    Semenkin, Eugene
    [J]. 2012 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2012,
  • [10] THEORY AND TECHNOLOGY OF COMPUTER NETWORKS
    JOTZOFF, R
    LANGER, W
    MULLER, B
    WINKLER, H
    [J]. ANGEWANDTE INFORMATIK, 1973, (09): : 373 - 384