scholarly journals Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy

2012 ◽  
Vol 2012 ◽  
pp. 1-18 ◽  
Author(s):  
Yu Yao ◽  
Wenlong Xiang ◽  
Andong Qu ◽  
Ge Yu ◽  
Fuxiang Gao

Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the thresholdτ0is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
Jiying Lai ◽  
Shujing Gao ◽  
Yujiang Liu ◽  
Xinzhu Meng

The issue on how to effectively control Internet malicious worms has been drawn significant attention owing to enormous threats to the Internet. Due to the rapid spreading of malicious worms, it is necessary to explore the integrated measures to automatically mitigate the propagation on the Internet. In this paper, a novel worm propagation model is established, which combines both impulsive quarantine and benign worm implementation. Then, sufficient conditions for the global stability of worm-free periodic solution and the permanence of the benign worm are obtained. Finally, the effects of quarantine strategy are assessed and some feasible strategies that can constrain the propagation of malicious worm are provided by numerical simulation.


2013 ◽  
Vol 475-476 ◽  
pp. 763-766
Author(s):  
Biao Yang ◽  
Guo Yu Lin ◽  
Wei Gong Zhang

The demand for intelligent surveillance is grown with the popularization of the camera monitoring network. An embedded system used as intelligent node of distributed surveillance is designed in this paper to improve the intelligent level of camera monitoring. Target detection and tracking can be implemented in this node and an anomaly intrusion detection system is designed based on the tracking results. Information sharing is realized via transmitting highly abstract object descriptors via the wireless network. A simple camera monitoring network is built in the labs to test the designed intelligent node and the experimental results indicate its effectiveness and accuracy.


Sign in / Sign up

Export Citation Format

Share Document