Title :
The impact of countermeasure propagation on the prevalence of computer viruses
Author :
Chen, Li-Chiou ; Carley, Kathleen M.
Author_Institution :
Dept. of Eng. & Public Policy, Carnegie Mellon Univ., Pittsburgh, PA, USA
fDate :
4/1/2004 12:00:00 AM
Abstract :
Countermeasures such as software patches or warnings can be effective in helping organizations avert virus infection problems. However, current strategies for disseminating such countermeasures have limited their effectiveness. We propose a new approach, called the countermeasure competing (CMC) strategy, and use computer simulation to formally compare its relative effectiveness with three antivirus strategies currently under consideration. CMC is based on the idea that computer viruses and countermeasures spread through two separate but interlinked complex networks - the virus-spreading network and the countermeasure-propagation network, in which a countermeasure acts as a competing species against the computer virus. Our results show that CMC is more effective than other strategies based on the empirical virus data. The proposed CMC reduces the size of virus infection significantly when the countermeasure-propagation network has properties that favor countermeasures over viruses, or when the countermeasure-propagation rate is higher than the virus-spreading rate. In addition, our work reveals that CMC can be flexibly adapted to different uncertainties in the real world, enabling it to be tuned to a greater variety of situations than other strategies.
Keywords :
computer viruses; digital simulation; antivirus strategies; competing species; computer security; computer virus prevalence; countermeasure competing strategy; countermeasure propagation; countermeasure-propagation network; network topology; software patches; virus infection problems; virus-spreading network; Computer networks; Computer security; Computer simulation; Computer viruses; Computer worms; Electronic mail; Immune system; Productivity; Public policy; Uncertainty; Computer Communication Networks; Computer Security; Computer Simulation; Models, Theoretical; Software;
Journal_Title :
Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on
DOI :
10.1109/TSMCB.2003.817098