Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy

Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay m...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu Yao, Wenlong Xiang, Andong Qu, Ge Yu, Fuxiang Gao
Format: Article
Language:English
Published: Wiley 2012-01-01
Series:Discrete Dynamics in Nature and Society
Online Access:http://dx.doi.org/10.1155/2012/304868
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832564305275387904
author Yu Yao
Wenlong Xiang
Andong Qu
Ge Yu
Fuxiang Gao
author_facet Yu Yao
Wenlong Xiang
Andong Qu
Ge Yu
Fuxiang Gao
author_sort Yu Yao
collection DOAJ
description Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold τ0 is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.
format Article
id doaj-art-ff0034b4019e4ef2aeee696e2ca2307f
institution Kabale University
issn 1026-0226
1607-887X
language English
publishDate 2012-01-01
publisher Wiley
record_format Article
series Discrete Dynamics in Nature and Society
spelling doaj-art-ff0034b4019e4ef2aeee696e2ca2307f2025-02-03T01:11:26ZengWileyDiscrete Dynamics in Nature and Society1026-02261607-887X2012-01-01201210.1155/2012/304868304868Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine StrategyYu Yao0Wenlong Xiang1Andong Qu2Ge Yu3Fuxiang Gao4Key Laboratory of Medical Image Computing of Ministry of Education, Northeastern University, Shenyang 110004, ChinaKey Laboratory of Medical Image Computing of Ministry of Education, Northeastern University, Shenyang 110004, ChinaKey Laboratory of Medical Image Computing of Ministry of Education, Northeastern University, Shenyang 110004, ChinaKey Laboratory of Medical Image Computing of Ministry of Education, Northeastern University, Shenyang 110004, ChinaKey Laboratory of Medical Image Computing of Ministry of Education, Northeastern University, Shenyang 110004, ChinaWorms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and uncontrollable. In view of the above factors, a quarantine strategy is thus proposed in the study. In real network, unknown worms and worm variants may lead to great risks, which misuse detection system fails to detect. However, anomaly detection is of help in detecting these kinds of worm. Consequently, our proposed quarantine strategy is built on the basis of anomaly intrusion detection system. Numerical experiments show that the quarantine strategy can diminish the infectious hosts sharply. In addition, the threshold τ0 is much larger after using our quarantine strategy, which implies that people have more time to remove worms so that the system is easier to be stable and controllable without Hopf bifurcation. Finally, simulation results match numerical ones well, which fully supports our analysis.http://dx.doi.org/10.1155/2012/304868
spellingShingle Yu Yao
Wenlong Xiang
Andong Qu
Ge Yu
Fuxiang Gao
Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
Discrete Dynamics in Nature and Society
title Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
title_full Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
title_fullStr Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
title_full_unstemmed Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
title_short Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
title_sort hopf bifurcation in an seidqv worm propagation model with quarantine strategy
url http://dx.doi.org/10.1155/2012/304868
work_keys_str_mv AT yuyao hopfbifurcationinanseidqvwormpropagationmodelwithquarantinestrategy
AT wenlongxiang hopfbifurcationinanseidqvwormpropagationmodelwithquarantinestrategy
AT andongqu hopfbifurcationinanseidqvwormpropagationmodelwithquarantinestrategy
AT geyu hopfbifurcationinanseidqvwormpropagationmodelwithquarantinestrategy
AT fuxianggao hopfbifurcationinanseidqvwormpropagationmodelwithquarantinestrategy