Time-Delay Propagation Model and Suppression Strategy Design of Operating System Virus

被引:1
|
作者
Wang G. [1 ]
Feng Y. [1 ]
Ma R. [1 ]
机构
[1] Information and Navigation Institute, Air Force Engineering University, Xi'an
来源
| 1600年 / Xi'an Jiaotong University卷 / 55期
关键词
Hopf bifurcation; Infection time-delay; Stability; Suppression strategy; Virus propagation;
D O I
10.7652/xjtuxb202103002
中图分类号
学科分类号
摘要
To effectively suppress operating system virus propagation in the network, a time-delay propagation model and the suppression strategy of operating system virus are proposed aiming at the characteristics of operating system virus, such as strong target and delay of infection. Based on the SIRS model, a new state and the infection time delay are introduced. The time-delay model of the operating system virus is constructed. The equilibrium point and the basic regeneration number are given. The global stability of network system at the virus-free equilibrium point is proved by direct Lyapunov method. According to Hopf bifurcation theory, the threshold of bifurcation is calculated, and the Hopf bifurcation behavior is analyzed at the virus equilibrium point. To solve the oscillation in the case of too high infection time delay, the virus propagation suppression strategy is designed. The oscillation can be eliminated by fine-tuning the switching frequency of the operating system. When the number of infected nodes is stable, switching frequency of the operating system is renewed with reference to the basic regeneration number. to eliminate virus completely. The theoretical and simulation results show that when the basic regeneration number is less than 1, the network can be globally asymptotically stable at the virus-free equilibrium point. The network can eliminate the operating system virus relying on its own immunity. When the basic regeneration number is greater than 1 and the time delay is greater than the corresponding threshold, the number of infected nodes has periodic oscillation. It is difficult to determine the network environment at this time. The oscillation can be eliminated by fine-tuning the operating system switching frequency. When the basic regeneration number is greater than 1 and the time delay is less than the corresponding threshold, the network is locally asymptotically stable at the virus equilibrium point, and the network security situation is clear. At this time, the operation switching frequency can be adjusted according to the basic regeneration number to ensure network security. © 2021, Editorial Office of Journal of Xi'an Jiaotong University. All right reserved.
引用
收藏
页码:11 / 19
页数:8
相关论文
共 20 条
  • [1] WU Jiangxing, LI Jianhua, JI Xinsheng, Security for cyberspace: challenges and opportunities, Frontiers of Information Technology & Electronic Engineering, 19, 12, pp. 1459-1461, (2018)
  • [2] SULTANA N, CHILAMKURTI N, PENG Wei, Et al., Survey on SDN based network intrusion detection system using machine learning approaches, Peer-to-Peer Networking and Applications, 12, 2, pp. 493-501, (2019)
  • [3] ALI M Q, AL-SHAER E, SAMAK T., Firewall policy reconnaissance: techniques and analysis, IEEE Transactions on Information Forensics and Security, 9, 2, pp. 296-308, (2014)
  • [4] ZHOU Yuyang, CHENG Guang, GUO Chunsheng, Et al., Survey on attack surface dynamic transfer technology based on moving target defense, Journal of Software, 29, 9, pp. 2799-2820, (2018)
  • [5] TONG Qing, ZHANG Zheng, ZHANG Weihua, Et al., Design and implementation of mimic defense web server, Journal of Software, 28, 4, pp. 883-897, (2017)
  • [6] KANELLOPOULOS A, VAMVOUDAKIS K G., A moving target defense control framework for cyber-physical systems, IEEE Transactions on Automatic Control, 65, 3, pp. 1029-1043, (2020)
  • [7] CHO J H, SHARMA D P, ALAVIZADEH H, Et al., Toward proactive, adaptive defense: a survey on moving target defense, IEEE Communications Surveys & Tutorials, 22, 1, pp. 709-745, (2020)
  • [8] EL-SAYED A M A, ARAFA A A M, KHALI M, Et al., A mathematical model with memory for propagation of computer virus under human intervention, Progress in Fractional Differentiation and Applications, 2, 2, pp. 105-113, (2016)
  • [9] WANG Gang, FENG Yun, LU Shiwei, Et al., Virus propagation model and security performance optimization strategy of multi-operating system heterogeneous network, Journal of Electronics & Information Technology, 42, 4, pp. 972-980, (2020)
  • [10] LIU Lijun, WEI Xiaodan, ZHANG Naimin, Global stability of a network-based SIRS epidemic model with nonmonotone incidence rate, Physica: A Statistical Mechanics and Its Applications, 515, pp. 587-599, (2019)