scholarly journals Evaluating the Performance of a Static Patching Strategy against Computer Viruses

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-10 ◽  
Author(s):  
Da-Wen Huang ◽  
Lu-Xing Yang ◽  
Xiaofan Yang ◽  
Xiang Zhong ◽  
Yuan Yan Tang

To cope with evolving computer viruses, antivirus programs must be periodically updated. Due to the limited network bandwidth, new virus patches are typically injected into a small subset of network nodes and then forwarded to the remaining nodes. A static patching strategy consists of a fixed patch injection rate and a fixed patch forwarding rate. This paper focuses on evaluating the performance of a static patching strategy. First, we introduce a novel autonomous node-level virus-patch propagation model to characterize the effect of a static patching strategy. Second, we show that the model is globally attracting, implying that regardless of the initial expected state of the network, the expected fraction of the infected nodes converges to the same value. Therefore, we use the asymptotic expected fraction of the infected nodes as the measure of performance of a static patching strategy. On this basis, we evaluate the performances of a few static patching strategies. Finally, we examine the influences of a few parameters on the performance of a static patching strategy. Our findings provide a significant guidance for restraining malware propagation.

2018 ◽  
Vol 13 (1) ◽  
pp. 160-168
Author(s):  
Nandalal Rana ◽  
Krishna P Bhandari ◽  
Surendra Shrestha

 Bandwidth requirement prediction is an important part of network design and service planning. The natural way of predicting bandwidth requirement for existing network is to analyze the past trends and apply appropriate mathematical model to predict for the future. For this research, the historical usage data of FWDR network nodes of Nepal Telecom is subject to univariate linear time series ARIMA model after logit transformation to predict future bandwidth requirement. The predicted data is compared to the real data obtained from the same network and the predicted data has been found to be within 10% MAPE. This model reduces the MAPE by 11.71% and 15.42% respectively as compared to the non-logit transformed ARIMA model at 99% CI. The results imply that the logit transformed ARIMA model has better performance compared to non-logit-transformed ARIMA model. For more accurate and longer term predictions, larger dataset can be taken along with season adjustments and consideration of long term variations.Journal of the Institute of Engineering, 2017, 13(1): 160-168


2014 ◽  
Vol 114 (1) ◽  
pp. 86-106
Author(s):  
Pei-Chen Sung ◽  
Cheng-Yuan Ku ◽  
Chien-Yuan Su

Purpose – Understanding the computer-virus propagation is quite essential for the construction and development of anti-virus policy. While researches about the anti-virus policy have been extensively investigated, the viewpoint from sociological perspective is relatively ignored. Therefore, this paper aims to explore the dynamics of computer-virus propagation and evaluate the effectiveness of anti-virus policies through the sociological perspective. Design/methodology/approach – This research constructs a virus-propagation model based on the susceptible-exposed-infective-recovered epidemic concept to simulate and explore the dynamic behavior of multipartite computer viruses through the tool of system dynamics. The effectiveness of various anti-virus policies is then evaluated via this model. Findings – The frequency of media contact has a significant effect on the virus infection rate. The effectiveness of user self-prevention relies on the usefulness of the virus signatures. The reporting/alarm process can enhance the capability of anti-virus software company and the detected intensity of new threat. The quarantine policy can effectively reduce the spread of computer virus. Practical implications – Individuals should strengthen the self-awareness of information security to reduce the negative impact. Managers should construct and implement the information security norm to regulate the behavior of staff. Anti-virus software companies should strengthen the capability of their automatic reporting/alarm mechanism to early detect the exceptional conditions and control new threats in time. Originality/value – Information security management research is still in the growth phase, but it is critically important to establish the groundwork for understanding of computer viruses and the effectiveness of anti-virus policy from assorted perspectives. The major contribution of research is to explore the propagation of multipartite computer viruses and study how to prevent their destruction from the sociological and technical perspectives.


2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
José Roberto C. Piqueira ◽  
Cristiane M. Batistela

As the beginning of the 21st century was marked by a strong development in data science and, consequently, in computer networks, models for designing preventive actions against intruding, data stealing, and destruction became mandatory. Following this line, several types of epidemiological models have been developed and improved, considering different operational approaches. The development of the research line using traditional SIR(Susceptible, Infected, Removed) model for data networks started in the 1990s. In 2005, an epidemiological compartmental model containing antidotal nodes, SIRA (Susceptible, Infected, Removed, Antidotal), was introduced to study how the antivirus policies affect the network reliability. The idea here is to study the consequence of quarantine actions in a network by modifying the SIRA model, introducing quarantine nodes generating the SIQRA (Susceptible, Infected, Quarantine, Removed, Antidotal) model. Analytical and numerical approaches result in parameter conditions for the existence and stability of disease-free and endemic equilibrium points for two different cases: saturation and nonsaturation of the quarantine population block. Based on these results, operational actions can be planned to improve the network reliability.


Author(s):  
Larry J. LeBlanc ◽  
Michael R. Bartolacci ◽  
Thomas A. Grossman

Low altitude platform (LAP) architectures are an emerging platform for providing temporary wireless network connectivity to areas with a damaged fixed wireless network infrastructure. The authors propose a spreadsheet-based approach for practitioners to locate LAP nodes in the field. This approach does not require radio frequency propagation expertise and incorporates standard models to display the coverage areas for the placement of LAP aerial devices. The proposed tool allows the transmission range for a given aerial device to be visually optimized during deployment. The spreadsheet-based tool the authors are proposing is expressly suited for battery-powered LAP architecture devices with payload weight restrictions, such as those utilizing balloons or kites, that can be quickly deployed by emergency responders. An additional contribution of this work is the development of a hybrid propagation model for LAP device transmissions for deployments above 200 meters which is absent in the literature. This model is a linear combination of two existing models for free space radio propagation.


Sign in / Sign up

Export Citation Format

Share Document