Network worm virus11/14/2022 ![]() ![]() Such self-modifying viruses are a considerable threat to computer security, since traditional methods of virus signature identification may not work against them. Try making a model similar to this one, but where the virus has the ability to mutate itself. Since being in someone's address book is not a symmetric relationship, change this model to use directed links instead of undirected links.Ĭan you model multiple viruses at the same time? How would they interact? Sometimes if a computer has a piece of malware installed, it is more vulnerable to being infected by more malware. Suppose the virus is spreading by emailing itself out to everyone in the computer's address book. ![]() Try experimenting with various alternative network structures, and see how the behavior of the virus differs. Real computer networks are more often found to exhibit a "scale-free" link-degree distribution, somewhat similar to networks created using the Preferential Attachment model. The real computer networks on which viruses spread are generally not based on spatial proximity, like the networks found in this model. Under what conditions will the virus still die out? How long does it take? What conditions are required for the virus to live? If the RECOVERY-CHANCE is bigger than 0, even if the VIRUS-SPREAD-CHANCE is high, do you think that if you could run the model forever, the virus could stay alive? EXTENDING THE MODEL What is the ratio of the number of immune nodes to the number of susceptible nodes? How is this affected by changing the AVERAGE-NODE-DEGREE of the network? THINGS TO TRY THINGS TO NOTICEĪt the end of the run, after the virus has died out, some nodes are still susceptible, while others have become immune. The NETWORK STATUS plot shows the number of nodes in each state (S, I, R) over time. The VIRUS-SPREAD-CHANCE, VIRUS-CHECK-FREQUENCY, RECOVERY-CHANCE, and GAIN-RESISTANCE-CHANCE sliders (discussed in "How it Works" above) can be adjusted before pressing GO, or while the model is running. The model will stop running once the virus has completely died out. The INITIAL-OUTBREAK-SIZE slider determines how many of the nodes will start the simulation infected with the virus. This process is repeated until the network has the correct number of links to give the specified average node degree. A node is randomly chosen and connected to the nearest node that it is not already connected to. The network that is created is based on proximity (Euclidean distance) between nodes. Using the sliders, choose the NUMBER-OF-NODES and the AVERAGE-NODE-DEGREE (average number of links coming out of each node). When a node becomes resistant, the links between it and its neighbors are darkened, since they are no longer possible vectors for spreading the virus. If a node does recover, there is some probability that it will become resistant to this virus in the future (given by the GAIN-RESISTANCE-CHANCE slider). When the virus has been detected, there is a probability that the virus will be removed (determined by the RECOVERY-CHANCE slider). This might correspond to a regularly scheduled virus-scan procedure, or simply a human noticing something fishy about how the computer is behaving. Only every so often (determined by the VIRUS-CHECK-FREQUENCY slider) do the nodes check whether they are infected by a virus. Infected nodes are not immediately aware that they are infected. This might correspond to up-to-date antivirus software and security patches that make a computer immune to this particular virus. Resistant nodes (colored gray) cannot be infected. This might correspond to the probability that someone on the susceptible system actually executes the infected email attachment. Susceptible neighbors (colored green) will be infected with a probability given by the VIRUS-SPREAD-CHANCE slider. HOW IT WORKSĮach time step (tick), each infected node (colored red) attempts to infect all of its neighbors. In the academic literature such a model is sometimes referred to as an SIR model for epidemics. Each node may be in one of three states: susceptible, infected, or resistant. Although the model is somewhat abstract, one interpretation is that each node represents a computer, and we are modeling the progress of a computer virus (or worm) through this network. This model demonstrates the spread of a virus through a network. You can also Try running it in NetLogo Web If you download the NetLogo application, this model is included. NetLogo Models Library: Virus on a Network ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |