Epidemic spreading in complex networks with degree correlations

Slides:



Advertisements
Similar presentations
Complex Networks Advanced Computer Networks: Part1.
Advertisements

ETC Trento Workshop Spectral properties of complex networks
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
October 31st, 2003ACM SSRS'03 Tolerating Denial-of-Service Attacks Using Overlay Networks – Impact of Topology Ju Wang 1, Linyuan Lu 2 and Andrew A. Chien.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Stopping computer viruses through dynamic immunization E. Shir, J.Goldenberg, Y. Shavitt, S. Solomon.
Efficient Control of Epidemics over Random Networks Marc Lelarge (INRIA-ENS) SIGMETRICS 09.
Spectrum Based RLA Detection Spectral property : the eigenvector entries for the attacking nodes,, has the normal distribution with mean and variance bounded.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
RD processes on heterogeneous metapopulations: Continuous-time formulation and simulations wANPE08 – December 15-17, Udine Joan Saldaña Universitat de.
Directional triadic closure and edge deletion mechanism induce asymmetry in directed edge properties.
Scale Free Networks Robin Coope April Abert-László Barabási, Linked (Perseus, Cambridge, 2002). Réka Albert and AL Barabási,Statistical Mechanics.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
電腦攻擊與防禦 The Attack and Defense of Computers
Modeling the spread of active worms Zesheng Chen, Lixin Gao, and Kevin Kwiat bearhsu - INFOCOM 2003.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
Advanced Network Security Fall 2014 Instructor: Kun Sun, Ph.D.
Introduction to Honeypot, Botnet, and Security Measurement
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Matching TCP/IP Packet to Detect Stepping-stone Intrusion Jianhua Yang TSYS School of Computer Science Edward Bosworth Center for Information Assurance.
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Directed-Graph Epidemiological Models of Computer Viruses Presented by: (Kelvin) Weiguo Jin “… (we) adapt the techniques of mathematical epidemiology to.
Complex Networks First Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Advanced Systems and Network Security Fall 2015 Instructor: Kun Sun, Ph.D.
Shi Zhou University College London Second-order mixing in networks Shi Zhou University College London.
Emergence of Scaling and Assortative Mixing by Altruism Li Ping The Hong Kong PolyU
1 Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense Cliff C. Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
1 How to Give a Good Presentation? Cliff C. Zou CAP /2010.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Term Project Description CAP6135 Spring Term Project Two students form a group to do term project together – A research oriented term project.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Cooperative Response Strategies for Large Scale Attack Mitigation D. Nojiri, J. Rowe, K. Levitt Univ of California Davis DARPA Info Survivability Conference.
2016/3/13 1 Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan Computer Communications.
networks and the spread of computer viruses Authors:M. E. J. Newman, S. Forrest, and J. Balthrop. Published:September 10, Physical Review.
Scale-free and Hierarchical Structures in Complex Networks L. Barabasi, Z. Dezso, E. Ravasz, S.H. Yook and Z. Oltvai Presented by Arzucan Özgür.
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Lecture 23: Structure of Networks
Worm Origin Identification Using Random Moonwalks
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Lecture 23: Structure of Networks
The Internet Jonah, Alan, and Swetha.
Modeling and Measuring Botnets
Research Progress Report
End-user Based Network Measurement and Diagnosis
Department of Computer Science University of York
Modeling Botnet Propagation Using Time Zones
Topology and Dynamics of Complex Networks
Peer-to-Peer and Social Networks
Internet Worms: Reality or Hype
Lecture 23: Structure of Networks
CSE551: Introduction to Information Security
Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan
Introduction to Internet Worm
Per Söderqvist Per Söderqvist Sales Engineer
Presentation transcript:

Epidemic spreading in complex networks with degree correlations Authors: M. Boguna, R. Pastor-Satorras, and A. Vespignani. Publish: Lecture Notes in Physics: Statistical Mechanics of Complex Networks, 2003 Presenter: Cliff C. Zou

Background Limitation of Internet worm models Extended from simple epidemic model Homogeneous assumption No topology considered Suitable for scan-based worms Not suitable for modeling topological malware Email viruses P2P malware

Objective Provide epidemic analytical models for topological networks Cover both correlated networks and uncorrelated networks We only consider uncorrelated networks here

Model Notations : infection prob. via an edge per unit time P(k): fraction of nodes with degree k Only consider SI model ik(t): fraction of infected in k-degree hosts hki = k k P(k): average degree

Topological Model I (t): prob. that any given link points to an infected host Think each edge has two “end points” P(k)ik(t)¢ N: # of k-degree infected P(k)k¢ N: # of end points owned by k-degree nodes

Topological Model II A newly infected at most has k-1 links to infect others It is infected through an edge The edge is useless in infection later

Problems of Models Implicit assumptions: Homogenous mixing Assume infected are uniformly distributed Fact: epidemic spread via topology Infected are connected (clustered) Many infectious edges are wasted Results: Models overestimate epidemic spreading speed

Illustration 16 infectious “end points” Model I: 16, overestimate 60% Only 10 effective infection links Model I: 16, overestimate 60% Model II: 12, overestimate 20%

Simulation Results Random network Power law network

How to Improve Model? Remove wasted edges in modeling How to proceed? Virtual removal hosts Hosts with few/no links to vulnerable hosts How to proceed? I don’t know yet

Security Research Major Conferences Tier-1: IEEE Symposium on Security and Privacy (IEEE S&P) ACM Computer Communication Security (CCS) Usenix Security Symposium Annual International Cryptology Conference (CRYPTO) Tier-2: NDSS: Network and Distributed System Security ACSAC: Annual Computer Security Applications Conference DSN: dependable system and network ESORICS: European Symposium on Research in Computer Security RAID: Recent Advances in Intrusion Detection

Technical News ACM techology news: Information Security Magazine: http://www.acm.org/technews/articles/2006-8/0130m.html Information Security Magazine: http://informationsecurity.techtarget.com/