IDEAS home Printed from https://ideas.repec.org/a/spr/ijsaem/v8y2017i2d10.1007_s13198-016-0441-3.html
   My bibliography  Save this article

Mathematical model on vulnerability characterization and its impact on network epidemics

Author

Listed:
  • Kaushik Haldar

    (Birla Institute of Technology, Mesra)

  • Bimal Kumar Mishra

    (Birla Institute of Technology, Mesra)

Abstract

Mathematical modeling and accurate representation of malware spread in a network is a difficult process because of our lack of understanding of several features that form the basis of such spread. Models have been used to analyze and predict the behavior of epidemic spread in networks over the years, to gain a better understanding of the process. The aim of this paper is to understand the process of emergence of vulnerabilities and its relationship with a network epidemic. Eighteen years of vulnerability emergence data has been used in this work. The data includes the total count of vulnerabilities emerging every month. The pattern reveals several important characteristics of the process including frequency peaks at seasonal locations. A steady state distribution of the process is defined. The transition of vulnerability into an exploit is characterized. Finally an interface between this vulnerability model and epidemic models is established through a description of the relationship between the epidemic force of infection and types of vulnerabilities. The paper concludes with several results that can be useful in our attempts to better approximate the spread of malware in networks.

Suggested Citation

  • Kaushik Haldar & Bimal Kumar Mishra, 2017. "Mathematical model on vulnerability characterization and its impact on network epidemics," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 8(2), pages 378-392, June.
  • Handle: RePEc:spr:ijsaem:v:8:y:2017:i:2:d:10.1007_s13198-016-0441-3
    DOI: 10.1007/s13198-016-0441-3
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s13198-016-0441-3
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s13198-016-0441-3?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to

    for a different version of it.

    References listed on IDEAS

    as
    1. Roubos, Alex & Jouini, Oualid, 2013. "Call centers with hyperexponential patience modeling," International Journal of Production Economics, Elsevier, vol. 141(1), pages 307-315.
    2. Eusgeld, Irene & Kröger, Wolfgang & Sansavini, Giovanni & Schläpfer, Markus & Zio, Enrico, 2009. "The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 954-963.
    3. Alex Roubos & Oualid Jouini, 2013. "Call centers with hyperexponential patience modeling," Post-Print hal-00779104, HAL.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Naumov, Sergey & Oliva, Rogelio, 2025. "Structural feedback and behavioral decision making in queuing systems: A hybrid simulation framework," European Journal of Operational Research, Elsevier, vol. 324(3), pages 855-870.
    2. Achal Bassamboo & Rouba Ibrahim, 2021. "A General Framework to Compare Announcement Accuracy: Static vs. LES-Based Announcement," Management Science, INFORMS, vol. 67(7), pages 4191-4208, July.
    3. Futalef, Juan-Pablo & Di Maio, Francesco & Zio, Enrico, 2025. "A dynamic importance function for accidental scenarios generation by RESTART in the computational risk assessment of cyber-physical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 253(C).
    4. Nan, Cen & Eusgeld, Irene, 2011. "Adopting HLA standard for interdependency study," Reliability Engineering and System Safety, Elsevier, vol. 96(1), pages 149-159.
    5. Hao, Yucheng & Jia, Limin & Zio, Enrico & Wang, Yanhui & He, Zhichao, 2024. "A network-based approach to improving robustness of a high-speed train by structure adjustment," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
    6. Rocco S., Claudio M. & Emmanuel Ramirez-Marquez, José, 2013. "Identification of top contributors to system vulnerability via an ordinal optimization based method," Reliability Engineering and System Safety, Elsevier, vol. 114(C), pages 92-98.
    7. Johansson, Jonas & Hassel, Henrik, 2010. "An approach for modelling interdependent infrastructures in the context of vulnerability analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(12), pages 1335-1344.
    8. Dunn, Sarah & Holmes, Matthew, 2019. "Development of a hierarchical approach to analyse interdependent infrastructure system failures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    9. Liu, Honglu & Tian, Zhihong & Huang, Anqiang & Yang, Zaili, 2018. "Analysis of vulnerabilities in maritime supply chains," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 475-484.
    10. Zio, E. & Golea, L.R. & Rocco S., C.M., 2012. "Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 172-177.
    11. Henry, Elise & Furno, Angelo & Faouzi, Nour-Eddin El & Rey, David, 2022. "Locating park-and-ride facilities for resilient on-demand urban mobility," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 158(C).
    12. Wu, Baichao & Tang, Aiping & Wu, Jie, 2016. "Modeling cascading failures in interdependent infrastructures under terrorist attacks," Reliability Engineering and System Safety, Elsevier, vol. 147(C), pages 1-8.
    13. Zio, Enrico & Piccinelli, Roberta, 2010. "Randomized flow model and centrality measure for electrical power transmission network analysis," Reliability Engineering and System Safety, Elsevier, vol. 95(4), pages 379-385.
    14. Stefan Greiving & Mark Fleischhauer & Christian D. León & Leonie Schödl & Gisela Wachinger & Iris Katherine Quintana Miralles & Benjamín Prado Larraín, 2021. "Participatory Assessment of Multi Risks in Urban Regions—The Case of Critical Infrastructures in Metropolitan Lima," Sustainability, MDPI, vol. 13(5), pages 1-21, March.
    15. Costa, Rodrigo & Haukaas, Terje & Chang, Stephanie E. & Dowlatabadi, Hadi, 2019. "Object-oriented model of the seismic vulnerability of the fuel distribution network in coastal British Columbia," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 11-23.
    16. Sperstad, Iver Bakken & Kjølle, Gerd H. & Gjerde, Oddbjørn, 2020. "A comprehensive framework for vulnerability analysis of extraordinary events in power systems," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
    17. Nan, Cen & Eusgeld, Irene & Kröger, Wolfgang, 2013. "Analyzing vulnerabilities between SCADA system and SUC due to interdependencies," Reliability Engineering and System Safety, Elsevier, vol. 113(C), pages 76-93.
    18. Zhengqi He & Dechun Huang & Changzheng Zhang & Junmin Fang, 2018. "Toward a Stakeholder Perspective on Social Stability Risk of Large Hydraulic Engineering Projects in China: A Social Network Analysis," Sustainability, MDPI, vol. 10(4), pages 1-15, April.
    19. Øystein Amundrud & Terje Aven & Roger Flage, 2017. "How the definition of security risk can be made compatible with safety definitions," Journal of Risk and Reliability, , vol. 231(3), pages 286-294, June.
    20. Hans Haller, 2015. "Network Vulnerability: A Designer-Disruptor Game," Working Papers e07-50, Virginia Polytechnic Institute and State University, Department of Economics.

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:8:y:2017:i:2:d:10.1007_s13198-016-0441-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.