Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Push- and pull-based epidemic spreading in networks: thresholds and deeper insights
Xu S., Lu W., Xu L. ACM Transactions on Autonomous and Adaptive Systems7 (3):1-26,2012.Type:Article
Date Reviewed: Mar 14 2013

The authors of this paper first analyze recent work on the epidemic spreading of malware in arbitrary networks, noting that all previous studies only considered push-based infection (where infected hosts actively infect neighbors). They extend this research to include pull-based infections, such as drive-by downloads. To this end, they introduce three parameters (α, β, and γ), denoting the probability that a given node (α) suffers a push-based infection, (β) is infected using a pull-based method, or (γ) is cured.

The researchers then describe a general sufficient condition (also called an epidemic threshold) under which the spreading becomes stable, and a more succinct version that holds true under more specific assumptions. They follow with a theorem for upper and lower bounds of the infection rate, “regardless of the stability of the spreading.”

The theorems presented in the previous sections are confirmed using simulations. The paper uses datasets from Epinions, a social network, and “a graph representing Enron’s internal email communications.” Although “both networks exhibit power-law degree distributions,” it should be noted that the theorems apply to arbitrary networks as well.

The authors then discuss the influence of a node’s degree on its infection rate, formulating an approximating equation in which the degree is a nonlinear factor and confirming it via simulation.

Furthermore, they examine whether “the mean field approach is applicable in arbitrary networks.” This approach is a statistical method in which random variables are replaced with their expected (mean) values. The authors argue that this procedure is indeed viable under the condition that the probability of a push-based infection is very small.

Lastly, the authors show that the global mean infection rate can be accurately approximated by monitoring only a small constant number of nodes with average degrees and certain second-order degrees.

The target audience for this paper includes graduate students and researchers with a theoretical background in computer science or mathematics. The formalization makes it hard reading for practitioners; simply put, there are lots of formulas.

Reviewer:  Edgar R. Weippl Review #: CR141021 (1308-0759)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy