Skip to main content

Virus Propagation and Immunization Strategies in Email Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5678))

Abstract

This paper proposes a simulation model to characterize virus propagation in an email network and analyzes various defense strategies. We demonstrate the key factor which affects the efficiency of different strategies, and illustrate two phases of virus propagation. The results show that D-steps immunization is a feasible strategy in the case of finite resources and the efficiency of node-betweenness immunization is better than targeted immunization if we have the global information about a network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lloyd, A.L., May, R.M.: How Viruses Spread Among Computers and People. Science 292(5520), 1316–1317 (2001)

    Article  Google Scholar 

  2. Newman, M.E.J.: The Structure and Function of Complex Networks. SIAM Review 45(2), 167–256 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  3. Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86(14), 3200–3203 (2001)

    Article  Google Scholar 

  4. Moore, C., Newman, M.E.J.: Epidemics and Percolation in Small-world Network. Physical Review E 61(5), 5678–5682 (2000)

    Article  Google Scholar 

  5. Whalley, I., Arnold, B., Chess, D., Morar, J., Segal, A., Swimmerr, M.: An Environment for Controlled Worm Replication and Analysis. Virus Bulletin, 1–20 (2000)

    Google Scholar 

  6. Serazzi, G., Zanero, S.: Computer Virus Propagation Models. In: Calzarossa, M.C., Gelenbe, E. (eds.) MASCOTS 2003. LNCS, vol. 2965, pp. 26–50. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Eguiluz, V.M., Klemm, K.: Epidemic Threshold in Structured Scale-Free Networks. Physical Review Letters 89(10), 108701 (2002)

    Article  Google Scholar 

  8. May, S.R.: Enhanced: Simple Rules with Complex Dynamics. Science 287(5453), 601–602 (2000)

    Article  Google Scholar 

  9. Zou, C.C., Towsley, D., Gong, W.: Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. IEEE Transaction on Dependable and Secure Computing 4(2), 105–118 (2007)

    Article  Google Scholar 

  10. Pastor-Satorras, R., Vespignani, A.: Immunization of Complex Networks. Physical Review E 65(3), 36104 (2002)

    Article  Google Scholar 

  11. Cohen, R., Havlin, S., Ben-Averaham, D.: Efficient Immunization Strategies for Computer Networks and Populations. Physical Review Letters 91(24), 0247901 (2003)

    Article  Google Scholar 

  12. Gallos, L.K., Liljeros, F., Argyrakis, P., Bunde, A., Havlin, S.: Improving Immunization Strategies. Physical Review E 75(4), 045104 (2007)

    Article  Google Scholar 

  13. Gomez-Gardenes, J., Echenique, P., Moreno, Y.: Immunization of Real Complex Communication Networks. European Physical Journal B 49(2), 259–264 (2002)

    Article  Google Scholar 

  14. Echenique, P., Gomez-Gardenes, J., Moreno, Y., Vazquez, A.: Distance-d Covering Problem in Scale-Free Networks with Degree Correlation. Physical Review E 71(3), 035102 (2005)

    Article  Google Scholar 

  15. Newman, M.E.J., Forrest, S., Balthrop, J.: Email Networks and the Spread of Computer Viruses. Physical Review E 66(3), 035101 (2002)

    Article  Google Scholar 

  16. Strogatz, S.H.: Exploring Complex Networks. Nature 410(6825), 268–276 (2001)

    Article  MATH  Google Scholar 

  17. Milo, R., Shen-Orr, S., Itzkovitz, S., Kashtan, N., Chklovskii, D., Alon, U.: Network Motifs Simple Building Blocks of Complex Networks. Science 298(5594), 824–827 (2002)

    Article  Google Scholar 

  18. Bu, T., Towsley, D.: On Distinguishing Between Internet Power Law Topology Generators. In: Proceedings of the Twenty First Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 638–647. IEEE Press, New York (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, J., Gao, C., Zhong, N. (2009). Virus Propagation and Immunization Strategies in Email Networks. In: Huang, R., Yang, Q., Pei, J., Gama, J., Meng, X., Li, X. (eds) Advanced Data Mining and Applications. ADMA 2009. Lecture Notes in Computer Science(), vol 5678. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03348-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03348-3_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03347-6

  • Online ISBN: 978-3-642-03348-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics