A Stochastic Model of Multivirus Dynamics
#1

Abstract—Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies have mainly focused on single-virus spreading dynamics. In this paper, we study multivirus spreading dynamics, where multiple viruses attempt to infect computers while possibly combating against each other because, for example, they are controlled by multiple botmasters. Specifically, we propose and analyze a general model (and its two special cases) of multivirus spreading dynamics in arbitrary networks (i.e., we do not make any restriction on network topologies), where the viruses may or may not coreside on computers. Our model offers analytical results for addressing questions such as: What are the sufficient conditions (also known as epidemic thresholds) under which the multiple viruses will die out? What if some viruses can "rob" others? What characteristics does the multivirus epidemic dynamics exhibit when the viruses are (approximately) equally powerful? The analytical results make a fundamental connection between two types of factors: defense capability and network connectivity. This allows us to draw various insights that can be used to guide security defense.



projects9.com
Contact us : projects[at]projects9.com
Call us :8008855666
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: stochastic model example, stochastic model definition, stochastic optimization model, stochastic model of multivirus dynamics related problems, a stochastic model of multivirus dynamics ppt presentation, a stochastic model of multi virus dynamics,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Credit Card Fraud Detection Using Hidden Markov Model electronics seminars 3 3,794 10-10-2012, 01:33 PM
Last Post: seminar details
  distributed applications using RMI-Java model. seminar class 1 1,465 31-05-2012, 12:29 AM
Last Post: Guest
  An Adaptive Programming Model for Fault-Tolerant Distributed Computing electronics seminars 3 2,578 20-02-2012, 01:13 PM
Last Post: seminar paper
  Credit Card Fraud Detection Using Hidden Markov Model project report helper 1 2,631 09-02-2012, 11:21 AM
Last Post: seminar addict
  Class Schema Evolution for Persistent Object-Oriented Software: Model, Empirical Stud Projects9 0 904 24-01-2012, 05:29 PM
Last Post: Projects9
  How Much to Share: A Repeated Game Model for Peer-to-Peer Streaming under Service Dif Projects9 0 979 23-01-2012, 05:19 PM
Last Post: Projects9
  Fat versus Thin Threading Approach on GPUs: Application to Stochastic Simulation of C Projects9 0 668 23-01-2012, 05:18 PM
Last Post: Projects9
  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiage Projects9 0 574 20-01-2012, 06:27 PM
Last Post: Projects9
  Conditional Diagnosability of Augmented Cubes under the PMC Model Projects9 0 616 20-01-2012, 05:55 PM
Last Post: Projects9
  Enabling Public Verifiability and Data Dynamics For Storage Security in Cloud Computi smart paper boy 7 3,142 05-01-2012, 10:13 AM
Last Post: seminar addict

Forum Jump: