Abstract
The development of information transmission has greatly accelerated the progress of society, and along with this, the security of information brings hidden threats to individual in the network. In this paper, a novel security defense trade-off strategy between information transmission and information security is proposed based on network performance gain function. First, the network performance gain function is defined on network average information intensity and network security index, and dedicated to make a trade-off between information transmission and information security of the network. Based on the gain function, node isolated strategies are provided, and corresponding algorithms named maximum degree isolation algorithm (MDIA) and maximum performance gain isolation algorithm (MPDIA) are devised respectively to isolate network node and improve network security. The results in simulation demonstrate that MDIA can quickly improve network security performance and MPDIA can acquire the larger gain within network robustness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yu, H., Gibbons, P.B., Kaminsky, M., et al.: SybilLimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)
Wang, G., Mohanlal, M., Wilson, C., et al.: Social turing tests: crowdsourcing sybil detection (2012). Eprint Arxiv https://arxiv.org/abs/1205.3856. Accessed 7 Dec 2012
Yang, C., Harkreader, R.C., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280–1293 (2013)
Adewole, K.S., Anuar, N.B., Kamsin, A., et al.: Malicious accounts: dark of the social networks. J. Netw. Comput. Appl. 79(1), 41–67 (2017)
Cheng, S.M., Vasileios, K., Chen, P.Y., et al.: Diffusion models for information dissemination dynamics in wireless complex communication networks. J. Complex Syst. 2013, 1–13 (2013)
Zhao, J., Wu, J., Xu, K.: Weak ties: subtle role of information diffusion in online social networks. Phys. Rev. E 82(1), 016105 (2010). https://doi.org/10.1103/PhysRevE.82.016105
Zhu, L., Wang, Y.: Rumor spreading model with noise interference in complex social networks. Phys. A: Stat. Mech. Appl. 469, 750–760 (2016)
Huang, C.Y., Lee, C.L., Wen, T.H., et al.: A computer virus spreading model based on resource limitations and interaction costs. J. Syst. Softw. 86(3), 801–808 (2013)
Yang, L.X., Yang, X., Tang, Y.: A bi-virus competing spreading model with generic infection rates. IEEE Trans. Netw. Sci. Eng. 5, 2–13 (2017)
Xu, D., Xu, X., Xie, Y., et al.: Optimal control of an SIVRS epidemic spreading model with virus variation based on complex networks. Commun. Nonlinear Sci. Numer. Simul. 48, 200–210 (2017)
Zhang, C.M.: Global behavior of a computer virus propagation model on multilayer networks. Secur. Commun. Netw. 2018, 1–9 (2018)
Ali, J., Saeed, M., Rafiq, M., Iqbal, S.: Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Padé approximation scheme. Adv. Differ. Equ. 2018(1), 1–18 (2018). https://doi.org/10.1186/s13662-018-1672-1
Li, T., Wang, S., Li, B.: Research on suppression strategy of social network information based on effective isolation. Procedia Comput. Sci. 131, 131–138 (2018)
Soini, M., Kukkurainen, J., Lauri, S.: Security and performance trade-off in KILAVI wireless sensor network. In: WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS) (2010)
Lin, C., Jean, L.: Research article on multipath routing in multihop wireless networks: security, performance, and their tradeoff. Eurasip J. Wirel. Commun. Netw. 2009(1), 1–13 (2009)
Lei, X., Jiang, C.X., Han, Z., et al.: Trust-based collaborative privacy management in online social networks. IEEE Trans. Inf. Forensics Secur. 14(1), 48–60 (2019)
Chen, S., Jiang, J., Pang, S., et al.: Modeling and optimization of train scheduling network based on invulnerability analysis. Appl. Math. Inf. Sci. 7(1), 113–119 (2013)
Gao, X., Keqiu, L.I., et al.: Invulnerability measure of a military heterogeneous network based on network structure entropy. IEEE Access 6, 6700–6708 (2017). https://doi.org/10.1109/ACCESS.2017.2769964
Gan, C., Yang, X., Liu, W., Zhu, Q.: A propagation model of computer virus with nonlinear vaccination probability. Commun. Nonlinear Sci. Number Simul. 19, 92–100 (2014)
Guo, H., Li, M.: Impacts of migration and immigration on disease transmission dynamics in heterogeneous populations. Discret. Contin. Dyn. Syst.-Ser. B 17, 2413–2430 (2017)
Holme, P., Masuda, N.: The basic reproduction number as a predictor for epidemic outbreaks in temporal networks. PLoS ONE 10(3), 1–15 (2015)
Li, T., Liu, X., Wu, J., et al.: An epidemic spreading model on adaptive scale-free networks with feedback mechanism. Phys. A: Stat. Mech. Appl. 450, 649–656 (2016)
Muchnik, L.: Complex networks package for MATLAB. http://www.levmuchnik.net/Content/Networks/ComplexNetworksPackage.html (2013)
Acknowledgment
The paper is supported by National Natural Science Foundation of China (No. 61573017, 61703420, 61873277). We declare that there is no conflict of interest regarding the publication of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, G., Lu, S., Feng, Y., Liu, W., Ma, R. (2020). Node Isolated Strategy Based on Network Performance Gain Function: Security Defense Trade-Off Strategy Between Information Transmission and Information Security. In: Han, H., Wei, T., Liu, W., Han, F. (eds) Recent Advances in Data Science. IDMB 2019. Communications in Computer and Information Science, vol 1099. Springer, Singapore. https://doi.org/10.1007/978-981-15-8760-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-8760-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8759-7
Online ISBN: 978-981-15-8760-3
eBook Packages: Computer ScienceComputer Science (R0)