JAIST Repository >
b. 情報科学研究科・情報科学系 >
b30. リサーチレポート >
Research Report - School of Information Science : ISSN 0918-7553 >
IS-RR-2014 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/12085
|
タイトル: | Analyzing the Impact of Mitigation Strategies on the Spread of a Virus |
著者: | Nguyen, Thanh Dang Bonnet, Francois Defago, Xavier |
発行日: | 2014-05-19 |
出版者: | 北陸先端科学技術大学院大学情報科学研究科 |
誌名: | Research report (School of Information Science, Japan Advanced Institute of Science and Technology) |
巻: | IS-RR-2014-002 |
開始ページ: | 1 |
終了ページ: | 16 |
抄録: | The spread of a virus and the containment of the spread have been widely studied in the literature. These two problems can be generalized in an abstraction of a two-side problem in which one side tries to spread the infection as much as possible while the other side tries to detect and limit the spread. The spread of a virus and the containment of the spread have been widely studied in the literature. These two problems can be generalized in an abstraction of a two-side problem in which one side tries to spread the infection as much as possible while the other side tries to detect and limit the spread. Three parameters play an important role: (1) the probability of a successful infection, (2) the probability of a successful detection, and (3) the topology of the network. The existing studies consider both sides of this problem separately. They either study the spread without detection or study the containment when detection is perfectly accurate. A natural question that arises when attack detection may possibly be inaccurate, is whether it is possible to contain the spread and, if it is, then under what conditions? This paper studies the two-side problem with defense strategies that can be grouped into two main classes; (1) Killing strategies, where a node decides to sacrifice itself and possibly deactivate some of its neighbors, and (2) Cutting strategies, where a node decides to cut or deactivate some communication links. Both classes aim at containing the epidemic by disconnecting infected nodes from healthy ones. |
URI: | http://hdl.handle.net/10119/12085 |
資料タイプ: | publisher |
出現コレクション: | IS-RR-2014
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
IS-RR-2014-002.pdf | | 8462Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|