Skip to main content

Node Isolated Strategy Based on Network Performance Gain Function: Security Defense Trade-Off Strategy Between Information Transmission and Information Security

  • Conference paper
  • First Online:
Recent Advances in Data Science (IDMB 2019)

Abstract

The development of information transmission has greatly accelerated the progress of society, and along with this, the security of information brings hidden threats to individual in the network. In this paper, a novel security defense trade-off strategy between information transmission and information security is proposed based on network performance gain function. First, the network performance gain function is defined on network average information intensity and network security index, and dedicated to make a trade-off between information transmission and information security of the network. Based on the gain function, node isolated strategies are provided, and corresponding algorithms named maximum degree isolation algorithm (MDIA) and maximum performance gain isolation algorithm (MPDIA) are devised respectively to isolate network node and improve network security. The results in simulation demonstrate that MDIA can quickly improve network security performance and MPDIA can acquire the larger gain within network robustness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yu, H., Gibbons, P.B., Kaminsky, M., et al.: SybilLimit: a near-optimal social network defense against sybil attacks. IEEE/ACM Trans. Netw. 18(3), 885–898 (2010)

    Article  Google Scholar 

  2. Wang, G., Mohanlal, M., Wilson, C., et al.: Social turing tests: crowdsourcing sybil detection (2012). Eprint Arxiv https://arxiv.org/abs/1205.3856. Accessed 7 Dec 2012

  3. Yang, C., Harkreader, R.C., Gu, G.: Empirical evaluation and new design for fighting evolving twitter spammers. IEEE Trans. Inf. Forensics Secur. 8(8), 1280–1293 (2013)

    Article  Google Scholar 

  4. Adewole, K.S., Anuar, N.B., Kamsin, A., et al.: Malicious accounts: dark of the social networks. J. Netw. Comput. Appl. 79(1), 41–67 (2017)

    Article  Google Scholar 

  5. Cheng, S.M., Vasileios, K., Chen, P.Y., et al.: Diffusion models for information dissemination dynamics in wireless complex communication networks. J. Complex Syst. 2013, 1–13 (2013)

    Article  Google Scholar 

  6. Zhao, J., Wu, J., Xu, K.: Weak ties: subtle role of information diffusion in online social networks. Phys. Rev. E 82(1), 016105 (2010). https://doi.org/10.1103/PhysRevE.82.016105

    Article  Google Scholar 

  7. Zhu, L., Wang, Y.: Rumor spreading model with noise interference in complex social networks. Phys. A: Stat. Mech. Appl. 469, 750–760 (2016)

    Article  MathSciNet  Google Scholar 

  8. Huang, C.Y., Lee, C.L., Wen, T.H., et al.: A computer virus spreading model based on resource limitations and interaction costs. J. Syst. Softw. 86(3), 801–808 (2013)

    Article  Google Scholar 

  9. Yang, L.X., Yang, X., Tang, Y.: A bi-virus competing spreading model with generic infection rates. IEEE Trans. Netw. Sci. Eng. 5, 2–13 (2017)

    Article  Google Scholar 

  10. Xu, D., Xu, X., Xie, Y., et al.: Optimal control of an SIVRS epidemic spreading model with virus variation based on complex networks. Commun. Nonlinear Sci. Numer. Simul. 48, 200–210 (2017)

    Article  MathSciNet  Google Scholar 

  11. Zhang, C.M.: Global behavior of a computer virus propagation model on multilayer networks. Secur. Commun. Netw. 2018, 1–9 (2018)

    Google Scholar 

  12. Ali, J., Saeed, M., Rafiq, M., Iqbal, S.: Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Padé approximation scheme. Adv. Differ. Equ. 2018(1), 1–18 (2018). https://doi.org/10.1186/s13662-018-1672-1

    Article  MATH  Google Scholar 

  13. Li, T., Wang, S., Li, B.: Research on suppression strategy of social network information based on effective isolation. Procedia Comput. Sci. 131, 131–138 (2018)

    Article  Google Scholar 

  14. Soini, M., Kukkurainen, J., Lauri, S.: Security and performance trade-off in KILAVI wireless sensor network. In: WSEAS International Conference on Computers. World Scientific and Engineering Academy and Society (WSEAS) (2010)

    Google Scholar 

  15. Lin, C., Jean, L.: Research article on multipath routing in multihop wireless networks: security, performance, and their tradeoff. Eurasip J. Wirel. Commun. Netw. 2009(1), 1–13 (2009)

    Google Scholar 

  16. Lei, X., Jiang, C.X., Han, Z., et al.: Trust-based collaborative privacy management in online social networks. IEEE Trans. Inf. Forensics Secur. 14(1), 48–60 (2019)

    Article  Google Scholar 

  17. Chen, S., Jiang, J., Pang, S., et al.: Modeling and optimization of train scheduling network based on invulnerability analysis. Appl. Math. Inf. Sci. 7(1), 113–119 (2013)

    Article  MathSciNet  Google Scholar 

  18. Gao, X., Keqiu, L.I., et al.: Invulnerability measure of a military heterogeneous network based on network structure entropy. IEEE Access 6, 6700–6708 (2017). https://doi.org/10.1109/ACCESS.2017.2769964

    Article  Google Scholar 

  19. Gan, C., Yang, X., Liu, W., Zhu, Q.: A propagation model of computer virus with nonlinear vaccination probability. Commun. Nonlinear Sci. Number Simul. 19, 92–100 (2014)

    Article  MathSciNet  Google Scholar 

  20. Guo, H., Li, M.: Impacts of migration and immigration on disease transmission dynamics in heterogeneous populations. Discret. Contin. Dyn. Syst.-Ser. B 17, 2413–2430 (2017)

    MathSciNet  MATH  Google Scholar 

  21. Holme, P., Masuda, N.: The basic reproduction number as a predictor for epidemic outbreaks in temporal networks. PLoS ONE 10(3), 1–15 (2015)

    Article  Google Scholar 

  22. Li, T., Liu, X., Wu, J., et al.: An epidemic spreading model on adaptive scale-free networks with feedback mechanism. Phys. A: Stat. Mech. Appl. 450, 649–656 (2016)

    Article  MathSciNet  Google Scholar 

  23. Muchnik, L.: Complex networks package for MATLAB. http://www.levmuchnik.net/Content/Networks/ComplexNetworksPackage.html (2013)

Download references

Acknowledgment

The paper is supported by National Natural Science Foundation of China (No. 61573017, 61703420, 61873277). We declare that there is no conflict of interest regarding the publication of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, G., Lu, S., Feng, Y., Liu, W., Ma, R. (2020). Node Isolated Strategy Based on Network Performance Gain Function: Security Defense Trade-Off Strategy Between Information Transmission and Information Security. In: Han, H., Wei, T., Liu, W., Han, F. (eds) Recent Advances in Data Science. IDMB 2019. Communications in Computer and Information Science, vol 1099. Springer, Singapore. https://doi.org/10.1007/978-981-15-8760-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8760-3_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8759-7

  • Online ISBN: 978-981-15-8760-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics