Zero-day Virus Transmission Model and Stability Analysis

被引:1
|
作者
Meng Qingwei [1 ]
Qiu Minyang [1 ]
Wang Gang [1 ]
Ma Runnian [1 ]
机构
[1] Air Force Engn Univ, Informat & Nav Inst, Xian 710077, Peoples R China
关键词
Zero-day attack; Virus propagation model; Stability; PROPAGATION;
D O I
10.11999/JEIT200519
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
According to the characteristics and propagation law of zero-day virus, the propagation model and stability of zero-day virus are studied. Firstly, the mechanism of zero-day virus transmission is analyzed. Based on the Susceptible-Infected-Removed-Susceptible(SIRS) virus transmission model, the node of infection state is redefined, the node of execution state and the node of damage state are introduced, and the zero-day virus transmission Susceptible - Initial-state-of infection- Zero-day - Damaged - Recovery (SIZDR) dynamic model is established. Secondly, the local stability of the system equilibrium point, the basic regeneration number and its influence on the scale of virus transmission are analyzed by using Rous stability criterion. Finally, the local stability of the model is verified by simulation, and the influence of node infection rate, node degree and node damage rate on zero-day virus transmission is analyzed. Theoretical analysis and simulation results show that the proposed model can objectively reflect the law of zero-day virus transmission, and the magnitude of zero-day virus spread is positively correlated with node degree and node infection rate, and negatively correlated with node damage rate. Targeted prevention and control of known viruses can effectively improve the defense effect against zero-day viruses.
引用
收藏
页码:1849 / 1855
页数:7
相关论文
共 15 条
  • [1] Distributed attack detection scheme using deep learning approach for Internet of Things
    Diro, Abebe Abeshu
    Chilamkurti, Naveen
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 761 - 768
  • [2] Epidemic spreading model and stability of the networks in mobile environment
    Gong Yong-Wang
    Song Yu-Rong
    Jiang Guo-Ping
    [J]. ACTA PHYSICA SINICA, 2012, 61 (11)
  • [3] GU Haijun, 2016, COMPUTER SCI, V43, P64
  • [4] Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
    Kim, Jin-Young
    Bu, Seok-Jun
    Cho, Sung-Bae
    [J]. INFORMATION SCIENCES, 2018, 460 : 83 - 102
  • [5] [张瑜 Zhang Yu], 2017, [清华大学学报. 自然科学版, Journal of Tsinghua University. Science and Technology], V57, P1127
  • [6] [秦李 Qin Li], 2016, [计算机应用研究, Application Research of Computers], V33, P1228
  • [7] Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths
    Sun, Xiaoyan
    Dai, Jun
    Liu, Peng
    Singhal, Anoop
    Yen, John
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2506 - 2521
  • [8] SUN Xiaoyan, 2017, NETWORK SECURITY MET
  • [9] Numerical Approaching of SIR Epidemic Model for Propagation of Computer Worms
    Valdez, J. S.
    Guevara, P.
    Audelo, J.
    Delgado, G.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (10) : 3452 - 3460
  • [10] [王刚 Wang Gang], 2019, [哈尔滨工业大学学报, Journal of Harbin Institute of Technology], V51, P131