SHIS Model of E-mail Virus Propagation[J]. Chinese Journal of Electronics, 2012, 21(4): 619-622.
Citation: SHIS Model of E-mail Virus Propagation[J]. Chinese Journal of Electronics, 2012, 21(4): 619-622.

SHIS Model of E-mail Virus Propagation

  • Received Date: 2011-08-01
  • Rev Recd Date: 2011-09-01
  • Publish Date: 2012-10-25
  • By analyzing the characteristics of many E-mail viruses in reality, we address an SHIS (Susceptiblehidden- infected-susceptible) model in this paper. In our model, on the one hand, the state H is introduced, which denotes user receives some E-mails with virus but s/he doesn’t activate them and they aren’t infectious. On the other hand, the topology of E-mail network is considered. The model not only describes better the practical condition of E-mail virus propagation than existing models, but also makes it possible to analyze the users’ behavior. By analyzing the rate equation of the model, we study the epidemic threshold and the equilibrium point. We also present the relationship between the infected density and two important parameters: the percentage of activating Email with virus and the frequency, in which users check the Email box. Finally, some numerical simulations are also presented to show the correctness of theoretical analysis. Our model would help to understand and control E-mail virus spreading.
  • loading
  • J.O. Kephart, S.R. White, “Directed-graph epidemiologicalmodels of computer viruses”, in Proc. of IEEE Symposium onSecurity and Privacy 91’, Oakland: IEEE Computer Society,pp.343-359, 1991.
    Y. Hayashi, M. Minoura, J. Matsukubo, “Oscillatory epidemicprevalence in growing scale-free networks”, Physical Review E,Vol.69, No.1, pp.016112-8, 2004.
    R. Albert, A.L. Barabasi, “Statistical mechanics of complex networks”,Reviews of Modern Physics, Vol.74, No.1, pp.47-94,2002.
    L.S. Liebovitch, I.B. Schwartz, “Information flow dynamics andtiming patterns in the arrival of email viruses”, Physical ReviewE, Vol.68, No.1, pp.017101-4, 2003.
    N. Schwartz, R. Cohen, D. Ben-Avraham et al., “Percolation indirected scale-free networks”, Physical Review E, Vol.66, No.1,pp.015104-4, 2002.
    M.E.J. Newman, S. Forrest, J. Balthrop, “Email networks andthe spread of computer viruses”, Physical Review E, Vol.65,No.1, pp.035101-4, 2002.
    R. Pastor-Satorras, A. Vespignani, “Epidemic spreading inscale-free networks”, Physical Review Letters, Vol.86, No.14,pp.3200-3223, 2001.
    M. Boguñá, R. Pastor-Satorras, A. Vespignani, “Absence of epidemicthreshold in scale-free networks with degree correlations”,Physical Review Letters, Vol.90, No.2, pp.028701-4, 2003.
    H.J. Shi, Z.S. Duan, G.L. Chen, R. Li, “Epidemic spreading onnetworks with vaccination”, Chinese Physics B, Vol.18, No.8,pp.3309-3317, 2009.
    N. Masuda, N. Konno, “Multi-state epidemic processes on complexnetworks”, Journal of Theoretical Biology, Vol.243, No.1,pp.64-75, 2006.
    L.Q. Gao, J. Mena-Lorca, Hethcote H.W., “Four SE1 endemicmodels with periodicity and separatrices”, Mathematical Biosciences,Vol.128, No.1, pp.157-184, 1995.
    R. Albert, A.L. Barabási, “Topology of evolving networks: localevents and universality physical”, Review Letters, Vol.85,No.24, pp.5234-5237, 2000.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (435) PDF downloads(1201) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint