×

The topological defense in SIS epidemic models. (English) Zbl 1382.68020

Summary: The spreading of dangerous malware or faults in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino or cascading effect. Researchers are attempting to develop a high level analysis of malware propagation discarding software details, in order to generalize to the maximum extent the defensive strategies. For example, it has been suggested that the maximum eigenvalue of the network adjacency matrix could act as a threshold for the malware’s spreading. This leads naturally to use the spectral graph theory to identify the most critical and influential nodes in technological networks. Many well-known graph parameters have been studied in the past years to accomplish the task. In this work, we test our AV11 algorithm showing that outperforms degree, closeness, betweenness centrality and the dynamical importance.

MSC:

68M11 Internet topics
68M10 Network design and communication in computer systems
68R10 Graph theory (including graph drawing) in computer science
Full Text: DOI

References:

[1] Wang, Y.; Chakrabarti, D.; Wang, C.; Faloutsos, C., Epidemic spreading in real networks, Proceedings of the SRDS conference (2003)
[2] Chakrabarti, D.; Wang, Y.; Wang, C.; Leskovec, J.; Faloutsos, C., Epidemic thresholds in real networks, ACM Trans Inf Syst Secur, 10, 1-26 (2008)
[3] Pastor-Satorras, R.; Vespignani, A., Epidemic spreading in scale-free networks, Phy Rev Lett, 86, 3200-3203 (2001)
[4] Buldyrev, S.; Parshani, R.; Paul, G.; Stanley, G.; Havlin, S., Catastrophic cascade of failures in interdependent networks, Nature, 464, 1025-1028 (2010)
[5] Rinaldi, J., Identifying critical infrastructure interdependencies, IEEE Control Syst Mag, 21, 337-351 (2001)
[6] Osorio, L., Seismic response of critical interdependent networks, Earthq Eng Struct Dyn, 36, 2, 285-306 (2007)
[7] Peng, C.; Xiaogang, J.; Meixia, S., Epidemic threshold and immunization on generalized networks, Phys A, 389, 549-560 (2010)
[8] Arbore, A.; Fioriti, V., Topological protection from the next generation malware: a survey, Int J. Comput. Intell. Syst., 9, 52-73 (2013)
[9] Harris, C.; Miles, J., Stability of linear systems, Science and Engineering, vol. 153 (1980), Academic Press: Academic Press London · Zbl 0453.34005
[10] Zesheng, C.; Chuanyi, J., Measuring network aware worm spreading strategy, Proceedings of the INFOCOM 26th IEEE international conference on computer communications (2007)
[11] Chen, Z.; Ji, C., Measuring network-aware worm spreading ability, Proceedings of the IEEE INFOCOM conference ’07 (2007)
[12] Pardalos, P., Detecting critical nodes in sparse graphs, Comput Oper Res, 36, 7, 2193-2200 (2009) · Zbl 1158.90411
[13] Dell’Isola, F.; Romano, A., A phenomenological approach to phase transition in classical field theory, Int J Eng Sci, 25, 1469-1475 (1987) · Zbl 0629.73006
[14] Fioriti, V.; Chinnici, M.; Palomo, J., Predicting the sources of an outbreak with a spectral technique, Appl Math Sci, 8, 6775-6782 (2014)
[15] Lewis, J. M.; Yannakakis, M., The node-deletion problem for hereditary properties is NP-complete, J Comput Syst Sci, 20, 2, 219-230 (1980) · Zbl 0436.68029
[16] Fioriti, V.; Chinnici, M., Identifying sparse and dense sub-graphs in large graphs with a fast algorithm, Euro Phys Lett, 108, 1-5 (2014)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.