International Journal On Cyber Situational Awareness (IJCSA)
ISSN: (Print) 2057-2182 ISSN: (Online) 2057-2182
Published Semi-annually. Est. 2014
Dr Cyril Onwubiko, Chair – Cyber Security & Intelligence, E-Security Group, Research Series, London, UK; IEEE UK & Ireland Section Secretary
Professor Frank Wang, Head of School / Professor of Future Computing, Chair IEEE Computer Society, UK&RI, School of Computing, University of Kent, Canterbury, UK
Dr Thomas Owens, Senior Lecturer & Director of Quality, Department of Electronic and Computer Engineering, Brunel University, London, UK
Epidemic Response Model for Malware Defense on Computer Networks
Timilehin B. Aderinola, Aderonke F. Thompson, and Boniface K. Alese
The Internet came with serious security vulnerabilities. Now, malicious individuals may gain unauthorized access to protected resources and disrupt network services by using malicious software, also known as malware. Most malware rapidly self-propagate within a network like an infectious disease. The classical epidemic model has been applied to study malware epidemics in computer networks. This study adapted the Susceptible-Infected-Susceptible (SIS) epidemic model to design a defense response model for computer networks and analyse the model obtained using a game theoretic approach of the attacker and defender. The model presented divided a network of fixed population into two compartments modelled with an ordinary differential equation that incorporated the strategies of the attacker and defender. Differential games were formulated and solved based on this model to derive optimal responses to malware epidemics. The SIS epidemic model established could aid optimal decisions for malware defense on computer networks.
Keyword: Epidemic Models, Game Theory, Malware, Differential Games, SIS, Networks, Malware Defenses, Computer Networks.
Volume 2. No. 1
Date: Nov. 2017
Reference to this paper should be made as follows: Aderinola, T. B., Thompson, A. F. and Alese, B. K. (2017). Epidemic Response Model for Malware Defense on Computer Networks. International Journal on Cyber Situational Awareness, Vol. 2, No. 1, pp69-84.