Time-Lag Lotka-Volterra System Application in Network Worm Modeling

Article Preview

Abstract:

This paper studies the impact of network time-lag on the spread of worms and virus, uses Lotka-Volterra equation theory with time delay, and studies the influence of network characteristics such as response time, predator copy size and interaction of network worms and predators.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2229-2233

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sboch,John F, Jon A. Hupp. The wrom programs early experiencc with a distdbuted computation,communications of the ACM,1982,25(3),pp.172-180.

Google Scholar

[2] Tanachaiwiwat S,Helmy A. Modeling and analysis of worm interactions(war of the worms)[C]/Fourth InternationalConference on Broadband Communications,Networks and Systems(BROADNETS'07). Raleigh,NC,USA:IEEE Press,2007:649-658.

DOI: 10.1109/broadnets.2007.4550495

Google Scholar

[3] Castaneda F,Sezer E C,Xu J. WORM vs. WORM:preliminary study of an active counter-attack mechanism[C]/Proceedings of the 2004 ACM Workshop on Rapid Malcode(WORM'04). Washington DC,USA:ACM Press,2004:83-93.

DOI: 10.1145/1029618.1029631

Google Scholar

[4] Tamimi Z M, Khan J I. Modeling and analysis of worm attacks with predator and patching interply[C]/Proceedings of the international conference of communications, internet and information. Virgin Islands: IEEE press 2006: 533-809.

Google Scholar

[5] Tamimi Z M,Khan J I. Model-based analysis of two fighting worms[C]/IEEE/IIU Proceedings of International Conference on Computer & Communication Engineering(ICCCE'06). Kuala Lumpur,Malaysia:IEEE Press,2006:157-163.

Google Scholar

[6] Tanachaiwiwat S,Helmy A. Computer worm ecology in encounter-based networks[C]/Fourth International Conference on Broadband Communications,Networks and Systems (BROADNETS'07). Raleigh,NC,USA:IEEE Press,2007:535-543.

DOI: 10.1109/broadnets.2007.4550479

Google Scholar

[7] Tanachaiwiwat S,Helmy A. Encounter-based worms:analysis and defense[J]. Ad Hoc Networks,2009,7(7):1414-1430.

DOI: 10.1016/j.adhoc.2009.02.004

Google Scholar

[8] Van den Driessche P,Watmough J. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission[J]. Mathematical Biosciences,2002,180 (1): 29-48.

DOI: 10.1016/s0025-5564(02)00108-6

Google Scholar

[9] Robinson R C. An introduction to dynamical system:continuousand discrete[M]. USA:Prentice Hall,(2004).

Google Scholar

[10] Bailey M,Cooke E,Jahanian F et al. The blaster worm:then and now[J]. IEEE Security & Privacy,2005,3(4):26-31.

DOI: 10.1109/msp.2005.106

Google Scholar