Skip to main content

A SEIR Model for Computer Virus Spreading Based on Cellular Automata

  • Conference paper
  • First Online:
International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding (SOCO 2017, ICEUTE 2017, CISIS 2017)

Abstract

There are a great variety of specimens of malware: computer viruses, computer worms, trojans, etc. Nowadays, malware is one of the most important computer security problem and the source of great financial losses. Consequently, it is necessary to design tools that allow one to simulate the behavior of malware propagation. These tools are based on mathematical models and the great majority of them tackle the study of a particular type of malware called computer worms. Nevertheless, to the best of our knowledge, there are few models devoted to the study of the spreading of computer viruses. In this sense, the main goal of this work is to introduce a new mathematical model, based on cellular automata, to analyze the epidemic behavior of computer virus. Specifically, it is a SEIR (Susceptible-Exposed-Infectious-Recovered) model where the nodes of the network are divided into four compartments: susceptible, exposed, infected and recovered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aycock, J.: Computer Viruses and Malware. Advances in Information Security, vol. 22. Springer, Heidelberg (2006)

    Google Scholar 

  2. Bauer, A.L., Beauchemin, C.A.A., Perelson, A.S.: Agent-based modeling of host-pathogen systems: The successes and challenges. Inf. Sci. 179, 1379–1389 (2009)

    Article  Google Scholar 

  3. Bradley, J., Gilmore, S., Hillston, J.: Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models. J. Comput. Syst. Sci. 74, 1013–1032 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  4. Coen, F.: Computer viruses: Theory and experiments. Comput. Secur. 6(1), 22–35 (1987)

    Article  Google Scholar 

  5. Filiol, E.: Computer Viruses: From Theory to Applications. Springer, Paris (2005)

    MATH  Google Scholar 

  6. Kondakci, S.: Epidemic state analysis of computers under malware attacks. Simul. Model. Pract. Theory 16, 571–584 (2008)

    Article  Google Scholar 

  7. Li, J., Knickerbocker, P.: Functional similarities between computer worms and biological pathogens. Comput. Secur. 26, 338–347 (2007)

    Article  Google Scholar 

  8. del Rey, A.M.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Netw. 8, 2561–2579 (2015)

    Article  Google Scholar 

  9. del Rey, A.M., Sánchez, G.R.: A discrete mathematical model to simulate malware spreading. Int. J. Mod. Phys. C 23(10), 1250064 (2012)

    Article  Google Scholar 

  10. Mishra, B.K., Saini, D.: Mathematical models on computer viruses. Appl. Math. Comput. 187, 929–936 (2007)

    MathSciNet  MATH  Google Scholar 

  11. Mishra, B.K., Pandey, S.K.: Dynamic model of worms with vertical transmission in computer network. Appl. Math. Comput. 217, 8438–8446 (2011)

    MathSciNet  MATH  Google Scholar 

  12. Piqueira, J., Vasconcelos, A., Gabriel, C., Araujo, V.: Dynamic models for computer viruses. Comput. Secur. 27, 355–359 (2008)

    Article  Google Scholar 

  13. Ren, J., Yang, X., Zhu, Q., Yang, L.X., Zhang, C.: A novel computer virus model and its dynamics. Nonlinear Anal. Real. 13, 376–384 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  14. Serazzi, G., Zanero, S.: Computer virus propagation. In: Performance Tools and Applications to Networked Systems. Lecture Notes in Computer Science, vol. 2965, pp. 26–50. Springer (2004)

    Google Scholar 

  15. Wolfram, W.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)

    MATH  Google Scholar 

  16. Yuan, H., Chen, G.: Network virus-epidemic model with the point-to-group information propagation. Appl. Math. Comput. 206, 357–367 (2008)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work has been supported by Ministerio de Economía y Competitividad (Spain) and the European Union through FEDER funds under grants TIN2014-55325-C2-2-R and MTM2015-69138-REDT.

F.K. Batista and S. Quintero-Bonilla have been supported by IFARHU-SENACYT scholarship program (Panama).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farrah Kristel Batista .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Batista, F.K., Martín del Rey, Á., Quintero-Bonilla, S., Queiruga-Dios, A. (2018). A SEIR Model for Computer Virus Spreading Based on Cellular Automata. In: Pérez García, H., Alfonso-Cendón, J., Sánchez González, L., Quintián, H., Corchado, E. (eds) International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding. SOCO ICEUTE CISIS 2017 2017 2017. Advances in Intelligent Systems and Computing, vol 649. Springer, Cham. https://doi.org/10.1007/978-3-319-67180-2_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67180-2_62

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67179-6

  • Online ISBN: 978-3-319-67180-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics