Abstract
The social-network-based epidemics, such as email-based ones, have been long studied. However, few have noticed some newly emerging epidemics which especially based on portable devices. In this paper, we think of such viruses and take a representative, the Rose epidemic, for case study. We build a model with a system of differential equations and closed-form solutions for three propagation scenes correspondingly. With both theoretical and numerical analysis, we find out that (1) Rose is able to infect hosts as exponentially as the Internet-based worms do;(2) In the Internet cafe scene, it is difficult to contain Rose even with reactive recovery measures; (3) the most influential factors for Rose’s propagation are the amount of hosts and portable devices and the lifetime of Internet cafe machines, while the arrival rate of clients and the proportion of immune machines only affect in the print service office scene.
This work is supported by National Science Foundation of China (NSFC) under grants No.60433040 and No.60731160630, the Research Fund for the Doctoral Program of Higher Education under grant No.20050487040.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blaster Worms, CERT Advisory CA-2003-20 W32/Blaster Worm, http://www.cert.org/advisories/CA-2003-20.html
Code Red Worms, CAIDA Analysis of Code-Red, http://www.caida.org/analysis/security/code-red/
Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proc. of the 13th USENIX Security Symposium (2004)
Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient Immunization Strategies for Computer Networks and Populations. Physical Review Letters 91(24), 247–901 (2003)
Yang, S., Jin, H., Liao, X., Yao, H.: OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks. In: Proc. of ACIS SNPD 2007, Qingdao, China, July 30-August 2 (2007)
Scott, J.: Social Network Analysis: A Handbook, 2nd edn. Sage, London (2000)
Rose Epidemic, Rose Virus and Solution (in Chinese), http://grid.hust.edu.cn/cgcl/rose.htm
Nimaya Worm, Worm.Nimaya (Panda) and Special Cleanup Tools (in Chinese), http://it.rising.com.cn/Channels/Service/2006-11/1163505486d38734.shtml
Ebel, H., Davidsen, J., Bornholdt, S.: Dynamics of Social Networks. Complexity 8(2), 24–27 (2002)
Newman, M.E.J.: The Structure and Function of Complex Networks. SIAM Review 45(2), 167–256 (2003)
Pasteor-Satorras, R., Vespignani, A.: Epidemics and Immunization in Scale-Free Networks. In: Handbook of Graphs and Networks: From the Genome to the Internet, Wiley-VCH (2003)
Grabowskia, A., Kosiński, R.A.: The SIS Model of Epidemic Spreading in a Hierarchical Social Network. Acta. Phys. Polon. B 36, 1579–1593 (2005)
Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Physical Review Letters 86(14), 3200 (2001)
Liu, Z., Hu, B.: Epidemic spreading in community networks. Europhys. Lett. 72(2), 315 (2005)
Levi, A., Koc, C.K.: Risks in Email Security. Communications of the ACM 44(8), 112–112 (2001)
Newman, M.E.J., Forrest, S., Balthrop, J.: Email networks and the spread of computer viruses. Phys. Rev. E 66(035101) (2002)
Takahashi, K., Abe, T., Kawashima, M.: Stopping Junk Email by Using Conditional ID Technology: privango. NTT Technical Review 3(3), 52–56 (2005)
Oda, T., White, T.: Immunity from spam: an analysis of an artificial immune system for junk email detection. In: Proc. of 4th International Conference on Artificial Immune Systems, pp. 276–289 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, S., Jin, H., Liao, X., Liu, S. (2008). Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)