Quantitative model to measure the spread of Security attacks in Computer Networks

Size: px
Start display at page:

Download "Quantitative model to measure the spread of Security attacks in Computer Networks"

Transcription

1 Quantitative model to measure the spread of Security attacks in Computer Networks SAURABH BARANWAL M.Sc.(Int.) 4 th year Mathematics and Sci. Computing Indian Institute of Technology, Kanpur saurabhbrn@gmail.com, baranwal@iitk.ac.in Project Guide Dr. N Raghu Kisore Assistant Professor IDRBT, Hyderabad INSTITUTE OF DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY (IDRBT) ROAD NO. 1, CASTLE HILLS, MASAB TANK, HYDERABAD

2 CERTIFICATE This is to certify that Mr. Saurabh Baranwal, pursuing M.Sc.(Int.) course at Indian Institute of Technology, Kanpur in the School of Mathematics and Scientific Computing has undertaken a project as an intern at IDRBT, Hyderabad from May 8, 2013 to July 7, He was assigned the project Quantitative model to measure the spread of security attacks in Computer Networks under my guidance. During the course of the project he has undertaken a study of Mathematical Modelling and Security in Computer Networks and also has done excellent work. I wish him all the best for all his endeavours. Dr. N Raghu Kisore (Project Guide) Assistant Professor IDRBT, Hyderabad

3 Acknowledgment I express my deep sense of gratitude to my Guide Dr. N Raghu Kisore, Assistant Professor, IDRBT for giving me an opportunity to do this project in the Institute for development and research in Banking Technology and providing all the support and guidance needed which made me complete the project on time. I am also thankful to Mathematics and Scientific Computing, Indian Institute of Technology, Kanpur for giving me this golden opportunity to work in a high-end research institute like IDRBT. Saurabh Baranwal M.Sc.(Int.) 4 th year Mathematics and Sci. Computing Indian Institute of Technology, Kanpur

4 Abstract The objective of the proposed work is to build mathematical model to measure the financial losses due to a security attack on a computer network. A digitalized economy depends on internet for all of its services. One of these services is maintaining digital currency and transfer of the same between a creditor and debtor (payments). This involves building of secure payment protocols based on strong mathematical proofs. But in reality the success of such a system is limited by trust of the end user. That is the end system is only as successful as the security of the software realization of the cryptographic protocols. The propagation of fake currency in a physical society is largely restricted by logistics and hence the impact on the overall economy is limited. But in case of financial services like delivery and management of digital currency, infusion of fake currency into the network is subject to the security of the system. Further it is well understood that in spite of the best efforts to secure a piece of software, there is a non-zero probability of a security breach. The impact of a security breach is further magnified in a digital world due to the higher level of interconnections between systems. Hence the spread of fake currency in the event of a security or cyber attack grows exponentially. This work delivers a model that can be used to measure the number of nodes that will be attacked in the event of a cyber attack.

5 1 Introduction Propagation of computer virus is of great threat in the Internet generation, and is a serious problem in our highly information oriented society. For secure and reliable computer/communication network systems, it is an important issue to counter the propagation of computer virus. The computer virus is one of thousands of programs that can invade computer systems, and it may execute a variety of malicious activities, such as deletion files, destruction of hard disk and transmission of system information. Nowa-day, the computer virus can be classified into three types: Viruses, Worms and Trojan horses. In recent years, as a variety of services are available for many users on Internet, the damage of worms propagating via Internet, is drastically spreading. In general, the Internet worm is a self-propagation program and can propagate through the Internet services such as and Web. In other words, the Internet worm possesses the strong force of propagation. Hence the quantitative evaluation of Internet worm propagation is regarded as a major topic in network security problems. The most vivid example is the Code-Red worm which has explosively increased. On July 2001, the Code Red worm infected more than 359,000 hosts on the Internet within only 14 hours. The experience by explosive propagation of Code-Red worm motivates both network administrators and users to control and counter the Internet worms. In order to control and counter the propagation of computer viruses and Internet worms, considerable attention has been paid to examine the behaviour of virus and worm for recent years. Then the mathematical epidemic models are often used to represent the propagation of virus and worm. We will discuss some of the mathematical models in the next sections. Generally speaking, there are two main research directions: security issue and measurement. The objectives of security issue are, in short, to develop the security system which controls and counters the propagation of computer virus for reduction of its damage. Chen and Ranka[1] discuss the early warning system where the worm attack can be detected by a propagation model. On the other hand, for purposes of measurement, several virus and worm propagation models are proposed, which are based on the existing epidemic models.

6 2 Deterministic Models Various models have been used in the field of epidemiology. SIS and SIR models are the most prominent ones. These models are deterministic models and are valid only in case of sufficiently large populations. The transition rates from one class to another are mathematically expressed as derivatives, hence the model is formulated using differential equations. While building such models, it must be assumed that the population size in a compartment is differentiable with respect to time and that the epidemic process is deterministic. 2.1 SIS Model By using epidemic theory we can model worm propagation. The representative deterministic model is susceptible/vulnerable-infected-susceptible/vulnerable (SIS) model. In the deterministic SIS model, it is assumed that the Internet worm propagates in vulnerable computer hosts, and that the host from which the Internet worm is removed is still vulnerable. Let s(t) and v(t) denote the deterministic numbers of vulnerable and worm-infected hosts, respectively. Then the dynamics on the numbers of vulnerable and worm-infected hosts in the network can be described by dv(t) dt = βs(t)v(t) δv(t) ds(t) dt = βs(t)v(t) + δv(t) where β(> 0) and δ(> 0) are the infection rate and removal rate respectively. Assuming that the total number of hosts is given by a finite constant K = s(t) + v(t), the number of infections follows the logistic model: dv(t) dt = {δ(r 0 1) βv(t)}v(t) where R 0 = βk δ. 2.2 KS Model The SIS model is a simple epidemic model to characterize the propagation of computer virus, but cannot take account of the immunity to computer virus. The model with the framework of immunity is often called the susceptibleinfected-removed/immune-susceptible(sirs) model. In the computer virus prevalence, Kephart and White introduce the concept of kill signal(ks),

7 which is regarded as a warning for propagation of computer virus. Let v(t) and w(t) denote the number of infected and non-vulnerable hosts at time t, respectively. Then the dynamics of the infected and nonvulnerable hosts are described by the following differential equations: d dt v(t) = {Kβ δ (β + β r)w(t) βv(t)}v(t) d dt v(t) = {Kβ r δ r β r w(t) βw(t)}w(t) + δv(t) where K is the total number of hosts in the network, β is the propagation rate of computer virus, δ is the removal rate of computer virus, β r is the KS-spreading rate and δ r is the re-vulnerability rate. 3 Stochastic Models But in case the population is small or when parameters like the infection rates are transient in nature stochastic models are preferable. Stochastic epidemic models are described by birth and death processes which have specific state transitions. Dissimilar to deterministic models, stochastic models describe the probabilistic behaviour of virus propagation using probability mass functions for Markov states, and can represent rare events such as virus extinction. These models have an absorption state where number of infected nodes is zero. That is they assume that a virus attack eventually gets terminated with a probability of 1. Most of the published work build stochastic SIS and SIR models based on Markovian arrival process (MAP). MAP is a counting process whose arrival rate is governed by a Continuous Time Markov Chain (CTMC). The number of infected hosts is represented by a Continuous Time Markov chain (CTMC). Some of the measurements made by a stochastic model are: the basic reproduction number the probability of virus extinction the mean time to virus hazard the mean time to virus extinction In each of the above cases the most important metric that defines the ability of an infection to spread is the reproduction number, R. The following inferences can be made from value of reproduction number, R

8 1 indicates the whole process converges to disease free state. > 1 indicates the infection to b e epidemic in nature and infection would spread until there is no more susceptible population. 3.1 Stochastic SIS model In the stochastic modelling, dynamics of propagation can be modelled by a birth-and-death process. Especially, the stochastic SIS model is introduced from the classical epidemic theory to analyze worm propagation. If there are K computer hosts in the network, the worm propagation is given by the birth-and-death process with the following birth and death rates: λ i = β(k i)i, i = 0, 1, 2..., K µ i = δi, i = 0, 1, 2..., K where β(> 0) and δ(> 0) are the propagation rate of worm and the removal rate of infected worm respectively. Note that the birth rate λ i depends on the number of both worm-infected and vulnerable hosts in the network. Also in the stochastic SIS model, it is assumed that the host from which a worm is removed is still vulnerable. Let a stochastic process {V (t) : t 0} be the number of worm-infected hosts at time t, and p v (t), v = 0,..., K denote the probabilities that there are v worm-infected hosts in the network at time t. Based on the analysis technique of CTMC, the probabilities are given by the following: 1 dt p 0(t) = µ 1 p 1 (t) 1 dt p 1(t) = µ 2 p 2 (t) (λ 1 + µ 1 )p 1 (t) 1 dt p i(t) = λ v 1 p v 1 (t) (λ v + µ v )p 1 (t) + µ v+1 p v+1 (t) 1 dt p i(t) = λ v 1 p v 1 (t) (λ v + µ v )p 1 (t) + µ v+1 p v+1 (t) 1 dt p K(t) = λ K 1 p K 1 (t) µ K p K (t) Solving above equations by using numerical methods such as the Runge- Kutta method, we can investigate the stochastic behaviour of infection. Unlike deterministic models, the number of worm-infected hosts almost surely goes to zero because the state where all the worms are combated is an absorbing state. In other words, extinction of worm always occurs in the stochastic SIS model. This viewpoint provides a remarkable difference between deterministic and stochastic models.

9 3.2 Stochastic Kill Signal Model Define the stochastic processes V (t) and W (t) which are the number of worm-infected and non-vulnerable hosts at time t, respectively. We consider the CTMC with the state (V (t), W (t)) = (v, w). Then the transition rates at the state (v, w) can be described as follows: 1. Worms are propagating to the other vulnerable hosts, so that the transition rate to state (v + 1, m) is given by λ v,w = βv(k v w) 2. When worms are removed from hosts, the hosts become non-vulnerable. Hence, the transition rate to the state (v 1, w) is zero. 3. There are two cases on the removal of worm; infected hosts remove worms from themselves or worms are removed by receiving KSs. Then, the transition rate to the state (v 1, w+1) is the sum of the transition rates in these two cases: µ v,w = δv + β r vw 4. Non-vulnerable hosts send KSs to vulnerable hosts. The transition rate to the state (v, w + 1) is given by γ v,w = β r w(k v w). 5. Non-vulnerable hosts can be vulnerable again by detection of unknown vulnerable factors. The transition rate to the state (v, w 1) is given by θ v,w = δ r w Then the transition diagram of CTMC is depicted in Figure 1. Consider the probability: p v,w = P r{v (t) = v, W (t) = w}. Using the above listed equations, we obtain the following differential equations: 1 dt p v,w(t) = λ v 1,w p v 1,w (t) + µ v+1,w 1 p v+1,w 1 (t) + γ v,w 1 p v,w 1 (t) + θ v,w+1 p v,w+1 (t) v v,w p v,w (t) for v = 0,..., K, w = 0,...K v where v = λ v,w + µ v,w + γ v,w + θ v,w. Note that K v + w, because the total number of hosts is finite.

10 Figure 1: Transition diagram on the propagation model with KS 4 Models Surveyed 4.1 Winfried Gleissner Model Representation: Adjacency Matrix is used to represent program interactions. Viral state is represented as a row vector. v = (v 1, v 2,..., v N ). Formula Derived: % of computer infected Vs no. of function calls. probability of reaching a viral state v from state v after executing k calls Symbol Definitions: N : No.of User accounts in a system. m i : No.of programs for user account i. v i virus programs in user account i. Assumptions: All programs and interactions between them are identical. A program once infected remain infected.

11 Remarks: Models spread of virus in a single system. Process is the fundamental unit. Infection of the whole system (all programs) is the absorbing state. This definition of absorbing state is the key difference with respect to other models. The absorbing state is represented as v F = (m 1, m 2,.., m N ). 4.2 Okamura Et.al Model Representation: MAP Process. Deals with stochastic SIS and SIR models. Uses 2D Markov Chain. Formula Derived: D 0 Infinitesimal Generator Matrix (withdrawls). transitions. Represents phase D 1 Rate Matrix. Represents new arrivals. R reproduction number. Symbol Definitions: β Infection rate. γ Recovery Rate. v birth/death process. (i, j) represents a Markov State. Read as (Infected, Recovered). Remarks: Takes into account population changes due to birth/death of nodes. Birth is because of new nodes joining the network and death is due to either disruptions in the network or death of infected node.

12 4.3 Okamura Et.al Model Representation: MAP Process. Deals with stochastic SIS and SIR models. Uses 2D Markov Chain. Formula Derived: probabilities of hazard (PH). Mean time to Hazard (MTTH). Variance of Time to hazard (VTTH). coefficient of variance to hazard time(cvh). Expected maximum number of infected hosts(mx). Mean Time to Extinction(MTTE). Variance of time to extinction(vtte). coefficient of variance of extinction time(cve). Symbol Definitions: β Infection rate. γ Recovery Rate. v birth/death process. (i, j) represents a Markov State. Read as (Infected, Recovered). Assumptions: The authors evaluate virus propagation by defining two probabilistic events called hazard and extinction. That is the Markov process has two absorbing states. Hazard: All the computer hosts in the network are infected. Extinction: No computer host in the network is infected. Remarks: Introduces a Kill Signal (KS) that represents a means to notify each no de the existence of infection. KS is also used to model immunity level in living organisms and to model the impact of any remedial action taken by system administrators.

13 4.4 Wang Model Representation: Stochastic SIS and SIR models are used. The user vigilance is modelled as Susceptible Infected Immune Susceptible model(siis). Formula Derived: dη t dt = β < k > η t ε e δε (1 η) δη t dη t dt = β < k > η t (1 η δφ t t v η sds) δη t Symbol Definitions: Infection delay is represented as ε. Vigilance is modelled as: φ represents vigilance coefficient and quantity between 0 and 1. 0 indicates full susceptibility and 1 indicates complete immunity. v represents vigilance period, indicates the time during the node is vigilant against reinfection attempts. At the end of the period the node becomes fully susceptible to infections again. Assumptions: Vigilance delays and infection delays are modelled as exponential distributions. Remarks: Takes into account the latent state of virus infections in a computer. That is there is a delay between the virus first enters a computer and the time it starts to infect other computers. This delay is modelled though two different components infection delay and user vigilance. Infection delay could be because most viruses require appropriate user activity like opening of an attachment or launching an app. This delay also helps to deal with situations where a node once infected becomes cured before it becomes infectious. Vigilance delay is because the user of a system once attacked tends to be more vigilant. 4.5 Aditya Prakash Et.al Model Representation: A 2 N state markov chain is used to represent all the possible viral states. Viral state itself is defined by random variables x N, x N 1,..., x 2, x 1. Each of these random variables can take two values 0 or 1. 0 represents no infection

14 and 1 represents infected state. The viral state is represented by random variable Y and is represented as x N x N 1...x 2 x 1. Symbol Definitions: N represents the number of nodes in the network. Q represents the infinitesimal generator. The computer network G = (N, L) is represented as symmetric adjacency matrix A. Remarks: Takes into account the dynamic nature of network topology. 4.6 Kooij Et.al Model Representation: The problem is formulated as Non-Linear Dynamic. system (NLDS). SIS model is used. Formula Derived: Epidemic threshold λ s. This threshold is derived using Jacobian matrix and eigen vectors of the adjacent matrix and the viral state of the network. This threshold is then used to designing an optimum way to control the epidemic by using appropriate immunization policies. Basically a quality metric to measure is impact of immunization is determined. Symbol Definitions: The viral state is represented as a row vector: p t = (p 1,t, p 2,t,..., p n,t ) T : represents the total numb er of alternating behaviours. A T : represents adjacency matrix corresponding to alternating behaviour state T. p 2t+1 : probability of infection vector for odd days. p 2t : probability of infection vector for even days. Remarks: The major contributions are: formulating the problem by approximating it by a Non-linear Dynamical system (NLDS), derive the first closed formula for the epidemic threshold of timevarying graphs under the SIS model,

15 we show the usefulness of our threshold by presenting efficient heuristics and evaluate the effectiveness of our methods on synthetic and real data like the MIT reality mining graphs. 5 Modified Model In all the above cases value of β was constant. But according to figure 2 value of β should depend upon the characteristics of infected node and suspected node. As the viruses/worms are not that smart so they keep attacking the infected nodes again and again that s why value of β is the exponential decaying function. In case of deterministic network systems, Figure 2: Relationship between Value of β and Nodes changing the dependency of β value on other factors better results can be obtained which have been shown in figure 3. In the next pages, graphs have Figure 3: Simulink Model of Proposed Work been drawn for the following equation: dv dt = β newve λv δv

16 WORM BRAID.A (Braid) β= δ= Dash line is the curve obtained by the experimental data. Solid line represents the graph of the stochastic kill signal model. β=0.48 λ= δ= Curve obtained by Simulink model X-axis -No. of days Y-axis- No. of Infected Nodes

17 WORM DATOM.A (Datom) β= δ= Dash line is the curve obtained by the experimental data. Solid line represents the graph of the stochastic kill signal model. β=0.13 λ= δ= Curve obtained by Simulink model X-axis -No. of days Y-axis- No. of Infected Nodes

18 6 Conclusion We can use the mathematical models to measure the return on investment made by banks on security features by measuring the effectiveness of these measures in reducing financial losses in the event of a wide spread cyber attack. Using these models companies can measure the expected value of how much a company/government should spend on the security systems. The major shortcomings in existing models are they do not take into account the effect of security measures built into the system to stop the growth. As in the case of virus propagation models security protection measures cab be either deterministic or randomized. Deterministic protection measure are largely algorithm based like canary based buffer overflow protection. In such cases we agree that the time taken to overcome the protection mechanism is constant. Therefore no changes need to be made to the models proposed so far. But in case of protection mechanisms like memory layout randomization, the success of an attack is probabilistic and is subject to correctly guess the randomizing key. In such cases the reproduction factor R will be dependent on parameters such as size of randomization key. Finally, the purpose of an attack on a financial system is not to reduce productivity by taking away valuable computational resources, but to make the V2V system do a meaningful task from the attacker point of view. Hence an attack can remain latent inside the system and not b e activated until the attacker chooses to launch the attack. So there is a need to evaluate the spread of an attack in a financial network by applying SEIS and SEIR models rather than simple SIS and SIR models. In this modern era mobile banking is also becoming prominent. So we may work in the direction to build a mathematical model for virus propagation on time varying networks. 7 References W. Gleissner, A mathematical theory for the spread of computer viruses, Comput. Secur., vol. 8, no. 1, pp , H. Okamura, H. Kobayashi and T. Dohi, Markovian Modelling and Analysis of Internet Worm Propagation, Proc. 16th IEEE Intl. Symp. Eng. Software Reliability, H. Okamura and T. Dohi, Estimating Computer Virus Propagation Based on Markovian Arrival Processes, Proc. 16th IEEE Pacific Rim

19 Intl. Symp. on Dependable Computing, pp , Y. Wang and C. Wang, Modelling the effects of timing parameters on virus propagation, Proc. of the 2003 ACM workshop on Rapid malcode, ACM, New York, NY, USA, pp , B. A. Prakash, T. Hanghang, N. Valler, M. Faloutsos, and C. Faloutsos, Virus propagation on time-varying networks: theory and immunization algorithms, Proc. European Conf. on Machine learning and know ledge discovery in databases: Part III Springer-Verlag, Berlin, Heidelb erg, pp , P. V. Mieghem, J. Omic, and R. Kooij, Virus Spread in Networks, IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1-14, Feb

SIS epidemics on Networks

SIS epidemics on Networks SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,

More information

SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2

SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2 ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.13(2012) No.3,pp.357-362 SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network Bimal Kumar

More information

Die-out Probability in SIS Epidemic Processes on Networks

Die-out Probability in SIS Epidemic Processes on Networks Die-out Probability in SIS Epidemic Processes on etworks Qiang Liu and Piet Van Mieghem Abstract An accurate approximate formula of the die-out probability in a SIS epidemic process on a network is proposed.

More information

Global Stability of a Computer Virus Model with Cure and Vertical Transmission

Global Stability of a Computer Virus Model with Cure and Vertical Transmission International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global

More information

Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet

Stability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet Vol.8 No.7 5 pp.-8 http://dx.doi.org/.57/ijhit.5.8.7. Stability Analysis of a Quarantined Epidemic Model with Latent and reaking-out over the Internet Munna Kumar a imal Kumar Mishra b and T. C. Panda

More information

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor

More information

Stochastic modelling of epidemic spread

Stochastic modelling of epidemic spread Stochastic modelling of epidemic spread Julien Arino Centre for Research on Inner City Health St Michael s Hospital Toronto On leave from Department of Mathematics University of Manitoba Julien Arino@umanitoba.ca

More information

Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks

Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Zesheng Chen Department of Computer Science Indiana University - Purdue University Fort Wayne, Indiana 4685 Email: chenz@ipfw.edu

More information

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,

More information

Spread of Malicious Objects in Computer Network: A Fuzzy Approach

Spread of Malicious Objects in Computer Network: A Fuzzy Approach Available at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 8, Issue 2 (December 213), pp. 684 7 Applications and Applied Mathematics: An International Journal (AAM) Spread of Malicious Objects

More information

Research Article Dynamical Models for Computer Viruses Propagation

Research Article Dynamical Models for Computer Viruses Propagation Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 28, Article ID 9426, 11 pages doi:1.11/28/9426 Research Article Dynamical Models for Computer Viruses Propagation José R. C. Piqueira

More information

Stochastic modelling of epidemic spread

Stochastic modelling of epidemic spread Stochastic modelling of epidemic spread Julien Arino Department of Mathematics University of Manitoba Winnipeg Julien Arino@umanitoba.ca 19 May 2012 1 Introduction 2 Stochastic processes 3 The SIS model

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University Announcements: Please fill HW Survey Weekend Office Hours starting this weekend (Hangout only) Proposal: Can use 1 late period CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu

More information

Analysis of Numerical and Exact solutions of certain SIR and SIS Epidemic models

Analysis of Numerical and Exact solutions of certain SIR and SIS Epidemic models Journal of Mathematical Modelling and Application 2011, Vol. 1, No. 4, 51-56 ISSN: 2178-2423 Analysis of Numerical and Exact solutions of certain SIR and SIS Epidemic models S O Maliki Department of Industrial

More information

CS 6604: Data Mining Large Networks and Time-series. B. Aditya Prakash Lecture #8: Epidemics: Thresholds

CS 6604: Data Mining Large Networks and Time-series. B. Aditya Prakash Lecture #8: Epidemics: Thresholds CS 6604: Data Mining Large Networks and Time-series B. Aditya Prakash Lecture #8: Epidemics: Thresholds A fundamental ques@on Strong Virus Epidemic? 2 example (sta@c graph) Weak Virus Epidemic? 3 Problem

More information

Network Science & Telecommunications

Network Science & Telecommunications Network Science & Telecommunications Piet Van Mieghem 1 ITC30 Networking Science Vision Day 5 September 2018, Vienna Outline Networks Birth of Network Science Function and graph Outlook 1 Network: service(s)

More information

Markov-modulated interactions in SIR epidemics

Markov-modulated interactions in SIR epidemics Markov-modulated interactions in SIR epidemics E. Almaraz 1, A. Gómez-Corral 2 (1)Departamento de Estadística e Investigación Operativa, Facultad de Ciencias Matemáticas (UCM), (2)Instituto de Ciencias

More information

Spectral Graph Theory for. Dynamic Processes on Networks

Spectral Graph Theory for. Dynamic Processes on Networks Spectral Graph Theory for Dynamic Processes on etworks Piet Van Mieghem in collaboration with Huijuan Wang, Dragan Stevanovic, Fernando Kuipers, Stojan Trajanovski, Dajie Liu, Cong Li, Javier Martin-Hernandez,

More information

An Improved Computer Multi-Virus Propagation Model with User Awareness

An Improved Computer Multi-Virus Propagation Model with User Awareness Journal of Information & Computational Science 8: 16 (2011) 4301 4308 Available at http://www.joics.com An Improved Computer Multi-Virus Propagation Model with User Awareness Xiaoqin ZHANG a,, Shuyu CHEN

More information

WE FOCUS ON A simple continuous-time model for the

WE FOCUS ON A simple continuous-time model for the IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 1, FEBRUARY 2009 1 Virus Spread in Networks Piet Van Mieghem, Member, IEEE, Jasmina Omic, and Robert Kooij Abstract The influence of the network characteristics

More information

A new centrality measure for probabilistic diffusion in network

A new centrality measure for probabilistic diffusion in network ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 5, No., September 204 ISSN : 2322-557 A new centrality measure for probabilistic diffusion in network Kiyotaka Ide, Akira Namatame,

More information

Three Disguises of 1 x = e λx

Three Disguises of 1 x = e λx Three Disguises of 1 x = e λx Chathuri Karunarathna Mudiyanselage Rabi K.C. Winfried Just Department of Mathematics, Ohio University Mathematical Biology and Dynamical Systems Seminar Ohio University November

More information

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan

More information

Introduction to SEIR Models

Introduction to SEIR Models Department of Epidemiology and Public Health Health Systems Research and Dynamical Modelling Unit Introduction to SEIR Models Nakul Chitnis Workshop on Mathematical Models of Climate Variability, Environmental

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

OPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA

OPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA International Journal of Pure and Applied Mathematics Volume 17 No. 3 216, 749-758 ISSN: 1311-88 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 1.12732/ijpam.v17i3.21

More information

Link Operations for Slowing the Spread of Disease in Complex Networks. Abstract

Link Operations for Slowing the Spread of Disease in Complex Networks. Abstract PACS: 89.75.Hc; 88.80.Cd; 89.65.Ef Revision 1: Major Areas with Changes are Highlighted in Red Link Operations for Slowing the Spread of Disease in Complex Networks Adrian N. Bishop and Iman Shames NICTA,

More information

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia

Department of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia ISS: 978-602-71169-7-9 Proceeding of 5th International Seminar on ew Paradigm and Innovation on atural Science and Its Application (5th ISPISA) Mathematical Modeling of worm infection on computer in a

More information

Forecasting of ATM cash demand

Forecasting of ATM cash demand Forecasting of ATM cash demand Ayush Maheshwari Mathematics and scientific computing Department of Mathematics and Statistics Indian Institute of Technology (IIT), Kanpur ayushiitk@gmail.com Project guide:

More information

Research Article Towards the Epidemiological Modeling of Computer Viruses

Research Article Towards the Epidemiological Modeling of Computer Viruses Discrete Dynamics in Nature and Society Volume 2012, Article ID 259671, 11 pages doi:10.1155/2012/259671 Research Article Towards the Epidemiological Modeling of Computer Viruses Xiaofan Yang 1, 2 and

More information

Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network

Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network Mathematical Problems in Engineering Volume 2012, Article ID 407064, 13 pages doi:10.1155/2012/407064 Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network Bimal

More information

A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS

A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS U.P.B. Sci. Bull., Series A, Vol. 76, Iss. 2, 2014 ISSN 1223-7027 A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS Yilun SHANG 1 Epidemiological network models study the spread

More information

AARMS Homework Exercises

AARMS Homework Exercises 1 For the gamma distribution, AARMS Homework Exercises (a) Show that the mgf is M(t) = (1 βt) α for t < 1/β (b) Use the mgf to find the mean and variance of the gamma distribution 2 A well-known inequality

More information

An Optimal Control Problem Over Infected Networks

An Optimal Control Problem Over Infected Networks Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 214 Paper No. 125 An Optimal Control Problem Over Infected Networks Ali Khanafer,

More information

Preventive behavioural responses and information dissemination in network epidemic models

Preventive behavioural responses and information dissemination in network epidemic models PROCEEDINGS OF THE XXIV CONGRESS ON DIFFERENTIAL EQUATIONS AND APPLICATIONS XIV CONGRESS ON APPLIED MATHEMATICS Cádiz, June 8-12, 215, pp. 111 115 Preventive behavioural responses and information dissemination

More information

Thursday. Threshold and Sensitivity Analysis

Thursday. Threshold and Sensitivity Analysis Thursday Threshold and Sensitivity Analysis SIR Model without Demography ds dt di dt dr dt = βsi (2.1) = βsi γi (2.2) = γi (2.3) With initial conditions S(0) > 0, I(0) > 0, and R(0) = 0. This model can

More information

Research Article An Impulse Model for Computer Viruses

Research Article An Impulse Model for Computer Viruses Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu

More information

Epidemic Spreading in Technological Networks

Epidemic Spreading in Technological Networks Epidemic Spreading in Technological Networks Jasmin Leveille Information Infrastructure Laboratory HP Laboratories Bristol HPL-2002-287 October 23 rd, 2002* computer security, viruses, worms, infection

More information

GEMF: GENERALIZED EPIDEMIC MODELING FRAMEWORK SOFTWARE IN PYTHON

GEMF: GENERALIZED EPIDEMIC MODELING FRAMEWORK SOFTWARE IN PYTHON GEMF: GENERALIZED EPIDEMIC MODELING FRAMEWORK SOFTWARE IN PYTHON HEMAN SHAKERI Network Science and Engineering Group (NetSE) Department of Electrical and Computer Engineering Kansas State University Manhattan,

More information

Epidemics in Complex Networks and Phase Transitions

Epidemics in Complex Networks and Phase Transitions Master M2 Sciences de la Matière ENS de Lyon 2015-2016 Phase Transitions and Critical Phenomena Epidemics in Complex Networks and Phase Transitions Jordan Cambe January 13, 2016 Abstract Spreading phenomena

More information

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population

Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,

More information

Copyright Warning & Restrictions

Copyright Warning & Restrictions Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions

More information

LOCAL AND GLOBAL STABILITY OF IMPULSIVE PEST MANAGEMENT MODEL WITH BIOLOGICAL HYBRID CONTROL

LOCAL AND GLOBAL STABILITY OF IMPULSIVE PEST MANAGEMENT MODEL WITH BIOLOGICAL HYBRID CONTROL International J. of Math. Sci. & Engg. Appls. (IJMSEA) ISSN 0973-9424, Vol. 11 No. II (August, 2017), pp. 129-141 LOCAL AND GLOBAL STABILITY OF IMPULSIVE PEST MANAGEMENT MODEL WITH BIOLOGICAL HYBRID CONTROL

More information

An Optimization Approach In Information Security Risk Management

An Optimization Approach In Information Security Risk Management Advances in Management & Applied Economics, vol.2, no.3, 2012, 1-12 ISSN: 1792-7544 (print version), 1792-7552 (online) Scienpress Ltd, 2012 An Optimization Approach In Information Security Risk Management

More information

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

More information

Simulating stochastic epidemics

Simulating stochastic epidemics Simulating stochastic epidemics John M. Drake & Pejman Rohani 1 Introduction This course will use the R language programming environment for computer modeling. The purpose of this exercise is to introduce

More information

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC R. G. DOLGOARSHINNYKH Abstract. We establish law of large numbers for SIRS stochastic epidemic processes: as the population size increases the paths of SIRS epidemic

More information

Stability of SEIR Model of Infectious Diseases with Human Immunity

Stability of SEIR Model of Infectious Diseases with Human Immunity Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 1811 1819 Research India Publications http://www.ripublication.com/gjpam.htm Stability of SEIR Model of Infectious

More information

Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy

Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 1, Article ID 3868, 18 pages doi:1.11/1/3868 Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine

More information

Lecture VI Introduction to complex networks. Santo Fortunato

Lecture VI Introduction to complex networks. Santo Fortunato Lecture VI Introduction to complex networks Santo Fortunato Plan of the course I. Networks: definitions, characteristics, basic concepts in graph theory II. III. IV. Real world networks: basic properties

More information

The Spreading of Epidemics in Complex Networks

The Spreading of Epidemics in Complex Networks The Spreading of Epidemics in Complex Networks Xiangyu Song PHY 563 Term Paper, Department of Physics, UIUC May 8, 2017 Abstract The spreading of epidemics in complex networks has been extensively studied

More information

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees 1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project

More information

MATHEMATICAL MODELS Vol. III - Mathematical Models in Epidemiology - M. G. Roberts, J. A. P. Heesterbeek

MATHEMATICAL MODELS Vol. III - Mathematical Models in Epidemiology - M. G. Roberts, J. A. P. Heesterbeek MATHEMATICAL MODELS I EPIDEMIOLOGY M. G. Roberts Institute of Information and Mathematical Sciences, Massey University, Auckland, ew Zealand J. A. P. Heesterbeek Faculty of Veterinary Medicine, Utrecht

More information

Bayesian Inference for Contact Networks Given Epidemic Data

Bayesian Inference for Contact Networks Given Epidemic Data Bayesian Inference for Contact Networks Given Epidemic Data Chris Groendyke, David Welch, Shweta Bansal, David Hunter Departments of Statistics and Biology Pennsylvania State University SAMSI, April 17,

More information

Attack Strategies on Complex Networks

Attack Strategies on Complex Networks Attack Strategies on Complex Networks Lazaros K. Gallos 1, Reuven Cohen 2, Fredrik Liljeros 3, Panos Argyrakis 1, Armin Bunde 4, and Shlomo Havlin 5 1 Department of Physics, University of Thessaloniki,

More information

Introduction to Stochastic SIR Model

Introduction to Stochastic SIR Model Introduction to Stochastic R Model Chiu- Yu Yang (Alex), Yi Yang R model is used to model the infection of diseases. It is short for Susceptible- Infected- Recovered. It is important to address that R

More information

Analytically tractable processes on networks

Analytically tractable processes on networks University of California San Diego CERTH, 25 May 2011 Outline Motivation 1 Motivation Networks Random walk and Consensus Epidemic models Spreading processes on networks 2 Networks Motivation Networks Random

More information

Analysis Based on SVM for Untrusted Mobile Crowd Sensing

Analysis Based on SVM for Untrusted Mobile Crowd Sensing Analysis Based on SVM for Untrusted Mobile Crowd Sensing * Ms. Yuga. R. Belkhode, Dr. S. W. Mohod *Student, Professor Computer Science and Engineering, Bapurao Deshmukh College of Engineering, India. *Email

More information

Linear Algebra Methods for Data Mining

Linear Algebra Methods for Data Mining Linear Algebra Methods for Data Mining Saara Hyvönen, Saara.Hyvonen@cs.helsinki.fi Spring 2007 2. Basic Linear Algebra continued Linear Algebra Methods for Data Mining, Spring 2007, University of Helsinki

More information

Partially Observed Stochastic Epidemics

Partially Observed Stochastic Epidemics Institut de Mathématiques Ecole Polytechnique Fédérale de Lausanne victor.panaretos@epfl.ch http://smat.epfl.ch Stochastic Epidemics Stochastic Epidemic = stochastic model for evolution of epidemic { stochastic

More information

Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms

Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms B. Aditya Prakash *, Hanghang Tong *, Nicholas Valler +, Michalis Faloutsos +, and Christos Faloutsos * * Computer Science

More information

Mathematical Modeling and Analysis of Infectious Disease Dynamics

Mathematical Modeling and Analysis of Infectious Disease Dynamics Mathematical Modeling and Analysis of Infectious Disease Dynamics V. A. Bokil Department of Mathematics Oregon State University Corvallis, OR MTH 323: Mathematical Modeling May 22, 2017 V. A. Bokil (OSU-Math)

More information

GLOBAL DYNAMICS OF A MATHEMATICAL MODEL OF TUBERCULOSIS

GLOBAL DYNAMICS OF A MATHEMATICAL MODEL OF TUBERCULOSIS CANADIAN APPIED MATHEMATICS QUARTERY Volume 13, Number 4, Winter 2005 GOBA DYNAMICS OF A MATHEMATICA MODE OF TUBERCUOSIS HONGBIN GUO ABSTRACT. Mathematical analysis is carried out for a mathematical model

More information

MCMC 2: Lecture 2 Coding and output. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham

MCMC 2: Lecture 2 Coding and output. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham MCMC 2: Lecture 2 Coding and output Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham Contents 1. General (Markov) epidemic model 2. Non-Markov epidemic model 3. Debugging

More information

Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda 4

Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda 4 Int. J. Complex Systems in Science vol. 3(1) (2013), pp. 97 105 Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda

More information

Dynamic network sampling

Dynamic network sampling Dynamic network sampling Steve Thompson Simon Fraser University thompson@sfu.ca Graybill Conference Colorado State University June 10, 2013 Dynamic network sampling The population of interest has spatial

More information

Kalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA

Kalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA International Journal of Pure and Applied Mathematics Volume 09 No. 4 206, 799-82 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu doi: 0.2732/ijpam.v09i4.4 PAijpam.eu

More information

Available online at Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN:

Available online at   Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN: Available online at http://scik.org Commun. Math. Biol. Neurosci. 216, 216:17 ISSN: 252-2541 OPTIMAL CONTROL OF A COMPUTER VIRUS MODEL WITH NETWORK ATTACKS HONGYUE PEI 1, YONGZHEN PEI 1,2,, XIYIN LIANG

More information

Pricing of Cyber Insurance Contracts in a Network Model

Pricing of Cyber Insurance Contracts in a Network Model Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December

More information

ECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks

ECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks ECS 289 / MAE 298, Lecture 7 April 22, 2014 Percolation and Epidemiology on Networks, Part 2 Searching on networks 28 project pitches turned in Announcements We are compiling them into one file to share

More information

Supporting Statistical Hypothesis Testing Over Graphs

Supporting Statistical Hypothesis Testing Over Graphs Supporting Statistical Hypothesis Testing Over Graphs Jennifer Neville Departments of Computer Science and Statistics Purdue University (joint work with Tina Eliassi-Rad, Brian Gallagher, Sergey Kirshner,

More information

Research Article Modeling Computer Virus and Its Dynamics

Research Article Modeling Computer Virus and Its Dynamics Mathematical Problems in Engineering Volume 213, Article ID 842614, 5 pages http://dx.doi.org/1.1155/213/842614 Research Article Modeling Computer Virus and Its Dynamics Mei Peng, 1 Xing He, 2 Junjian

More information

Network Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis, and Muriel Medard

Network Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis, and Muriel Medard Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-214-28 December 2, 214 Network Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis,

More information

The minimal spectral radius of graphs with a given diameter

The minimal spectral radius of graphs with a given diameter Linear Algebra and its Applications 43 (007) 408 419 www.elsevier.com/locate/laa The minimal spectral radius of graphs with a given diameter E.R. van Dam a,, R.E. Kooij b,c a Tilburg University, Department

More information

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E

More information

Oscillatory epidemic prevalence in g free networks. Author(s)Hayashi Yukio; Minoura Masato; Matsu. Citation Physical Review E, 69(1):

Oscillatory epidemic prevalence in g free networks. Author(s)Hayashi Yukio; Minoura Masato; Matsu. Citation Physical Review E, 69(1): JAIST Reposi https://dspace.j Title Oscillatory epidemic prevalence in g free networks Author(s)Hayashi Yukio; Minoura Masato; Matsu Citation Physical Review E, 69(1): 016112-1-0 Issue Date 2004-01 Type

More information

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point

Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point Nicholas Valler, B. Prakash, Hanghang Tong, Michalis Faloutsos, Christos Faloutsos To cite this version: Nicholas Valler, B. Prakash,

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Section 8.1 Def. and Examp. Systems

Section 8.1 Def. and Examp. Systems Section 8.1 Def. and Examp. Systems Key Terms: SIR Model of an epidemic o Nonlinear o Autonomous Vector functions o Derivative of vector functions Order of a DE system Planar systems Dimension of a system

More information

Lecture 10. Under Attack!

Lecture 10. Under Attack! Lecture 10 Under Attack! Science of Complex Systems Tuesday Wednesday Thursday 11.15 am 12.15 pm 11.15 am 12.15 pm Feb. 26 Feb. 27 Feb. 28 Mar.4 Mar.5 Mar.6 Mar.11 Mar.12 Mar.13 Mar.18 Mar.19 Mar.20 Mar.25

More information

Appendix A Prototypes Models

Appendix A Prototypes Models Appendix A Prototypes Models This appendix describes the model of the prototypes used in Chap. 3. These mathematical models can also be found in the Student Handout by Quanser. A.1 The QUANSER SRV-02 Setup

More information

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1 Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to

More information

An Introduction to Stochastic Epidemic Models

An Introduction to Stochastic Epidemic Models An Introduction to Stochastic Epidemic Models Linda J. S. Allen Department of Mathematics and Statistics Texas Tech University Lubbock, Texas 79409-1042, U.S.A. linda.j.allen@ttu.edu 1 Introduction The

More information

A Method for Evaluating the Distribution of the Total Cost of a Random Process over its Lifetime

A Method for Evaluating the Distribution of the Total Cost of a Random Process over its Lifetime A Method for Evaluating the Distribution of the Total Cost of a Random Process over its Lifetime P.K. Pollett a and V.T. Stefanov b a Department of Mathematics, The University of Queensland Queensland

More information

Complex networks: an introduction Alain Barrat

Complex networks: an introduction Alain Barrat Complex networks: an introduction Alain Barrat CPT, Marseille, France ISI, Turin, Italy http://www.cpt.univ-mrs.fr/~barrat http://cxnets.googlepages.com Plan of the lecture I. INTRODUCTION I. Networks:

More information

Chapter 1. Introduction. 1.1 Stochastic process

Chapter 1. Introduction. 1.1 Stochastic process Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.

More information

SIR Epidemic Model with total Population size

SIR Epidemic Model with total Population size Advances in Applied Mathematical Biosciences. ISSN 2248-9983 Volume 7, Number 1 (2016), pp. 33-39 International Research Publication House http://www.irphouse.com SIR Epidemic Model with total Population

More information

Dynamical models of HIV-AIDS e ect on population growth

Dynamical models of HIV-AIDS e ect on population growth Dynamical models of HV-ADS e ect on population growth David Gurarie May 11, 2005 Abstract We review some known dynamical models of epidemics, given by coupled systems of di erential equations, and propose

More information

Mathematical modelling and controlling the dynamics of infectious diseases

Mathematical modelling and controlling the dynamics of infectious diseases Mathematical modelling and controlling the dynamics of infectious diseases Musa Mammadov Centre for Informatics and Applied Optimisation Federation University Australia 25 August 2017, School of Science,

More information

Epidemics in Networks Part 2 Compartmental Disease Models

Epidemics in Networks Part 2 Compartmental Disease Models Epidemics in Networks Part 2 Compartmental Disease Models Joel C. Miller & Tom Hladish 18 20 July 2018 1 / 35 Introduction to Compartmental Models Dynamics R 0 Epidemic Probability Epidemic size Review

More information

Any live cell with less than 2 live neighbours dies. Any live cell with 2 or 3 live neighbours lives on to the next step.

Any live cell with less than 2 live neighbours dies. Any live cell with 2 or 3 live neighbours lives on to the next step. 2. Cellular automata, and the SIRS model In this Section we consider an important set of models used in computer simulations, which are called cellular automata (these are very similar to the so-called

More information

Finding Robust Solutions to Dynamic Optimization Problems

Finding Robust Solutions to Dynamic Optimization Problems Finding Robust Solutions to Dynamic Optimization Problems Haobo Fu 1, Bernhard Sendhoff, Ke Tang 3, and Xin Yao 1 1 CERCIA, School of Computer Science, University of Birmingham, UK Honda Research Institute

More information

Epidemic Thresholds in Real Networks

Epidemic Thresholds in Real Networks IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Epidemic Thresholds in Real Networks Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jurij Leskovec and Christos Faloutsos deepay@cs.cmu.edu, yangwang@andrew.cmu.edu,

More information

MCMC 2: Lecture 3 SIR models - more topics. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham

MCMC 2: Lecture 3 SIR models - more topics. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham MCMC 2: Lecture 3 SIR models - more topics Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham Contents 1. What can be estimated? 2. Reparameterisation 3. Marginalisation

More information

On Influential Node Discovery in Dynamic Social Networks

On Influential Node Discovery in Dynamic Social Networks On Influential Node Discovery in Dynamic Social Networks Charu Aggarwal Shuyang Lin Philip S. Yu Abstract The problem of maximizing influence spread has been widely studied in social networks, because

More information

The decoupling assumption in large stochastic system analysis Talk at ECLT

The decoupling assumption in large stochastic system analysis Talk at ECLT The decoupling assumption in large stochastic system analysis Talk at ECLT Andrea Marin 1 1 Dipartimento di Scienze Ambientali, Informatica e Statistica Università Ca Foscari Venezia, Italy (University

More information

On a stochastic epidemic SEIHR model and its diffusion approximation

On a stochastic epidemic SEIHR model and its diffusion approximation On a stochastic epidemic SEIHR model and its diffusion approximation Marco Ferrante (1), Elisabetta Ferraris (1) and Carles Rovira (2) (1) Dipartimento di Matematica, Università di Padova (Italy), (2)

More information

4452 Mathematical Modeling Lecture 16: Markov Processes

4452 Mathematical Modeling Lecture 16: Markov Processes Math Modeling Lecture 16: Markov Processes Page 1 4452 Mathematical Modeling Lecture 16: Markov Processes Introduction A stochastic model is one in which random effects are incorporated into the model.

More information

Qualitative Analysis of a Discrete SIR Epidemic Model

Qualitative Analysis of a Discrete SIR Epidemic Model ISSN (e): 2250 3005 Volume, 05 Issue, 03 March 2015 International Journal of Computational Engineering Research (IJCER) Qualitative Analysis of a Discrete SIR Epidemic Model A. George Maria Selvam 1, D.

More information

Whitepaper. All Currency, One Wallet!

Whitepaper. All Currency, One Wallet! Whitepaper BitStupm All Currency, One Wallet! All Currency, One Wallet! TABLE OF CONTENTS: BitStupm 1. WHAT IS CRYPTOCURRENCY? 2. HISTORY OF CRYPTOCURRENCY. 3. STRENGTH OF CRYPTOCURRENCY. 4. WHAT IS BITS?

More information