Beyond Herd Immunity Against Strategic Attackers
Beyond Herd Immunity Against Strategic Attackers
INVITED PAPER
ABSTRACT Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a
large fraction of the population of devices is immune against a virus or malware. The few individuals who
have not taken countermeasures against the threat are assumed to have very low chances of infection, as they
are indirectly protected by the rest of the devices in the network. Although very fundamental, herd immunity
does not account for strategic attackers scanning the network for vulnerable nodes. In face of such attackers,
nodes who linger vulnerable in the network become easy targets, compromising cybersecurity. In this paper,
we propose an analytical model which allows us to capture the impact of countermeasures against attackers
when both endogenous as well as exogenous infections coexist. Using the proposed model, we show that a
diverse set of potential attacks produces non-trivial equilibria, some of which go counter to herd immunity;
e.g., our model suggests that nodes should adopt countermeasures even when the remainder of the nodes has
already decided to do so.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 8, 2020 66365
V. Q. Rufino et al.: Beyond Herd Immunity Against Strategic Attackers
a lethal combination of social engineering and software vul- practical considerations. In fact, although countermeasures
nerabilities, where the infection of local machines is usually like vaccination or patching are very effective, they typically
performed using viral phishing attacks able to hijack a large cause collateral effects, such as system downtime or slow-
base of social network accounts [7], [10] and by leveraging down. In some cases, e.g., in industrial control systems [34],
trojans in order to take control of local machines. the resulting performance losses are unacceptable at the busi-
Models for virus propagation have been thoroughly studied ness level. Therefore, one needs to trade off the benefits of
since the seminal work of Kermack and McKendrick [11], applying such countermeasures against their corresponding
[12], mainly focusing on epidemic thresholds and immu- costs, given the probability of infection in the presence of
nization policies. In the last 20 years, new research lines in strategic attackers [15], [21].
computational epidemiology have unveiled the crucial role of A further major challenge in network security is the typ-
network topology in the propagation of epidemics [13], [14]. ically autonomous nature of decision making. Given that
As a consequence, in order to manage network security, sig- devices are interconnected, if the owner of a device or a group
nificant effort has been devoted to understand how computer of devices is not willing to pay for stringent countermeasures
viruses spread in a network, and how to efficiently design and thus decides to take the risks of contamination, neighbors
countermeasures able to mitigate such threats [15]–[17]. Tra- are directly impacted and other nodes may be indirectly
ditionally, many countermeasures account for herd immunity, affected [35]–[37]. Hence, decisions makers face a game in
a form of indirect protection of network nodes from infections which the countermeasure strategy selected by a given user
that occurs when a large percentage of devices becomes impacts the security landscape of the population as a whole.
immune to an infection, providing a measure of protection Cost–benefit analyses of vaccination programs usually
for individuals who are not immune [18]–[21]. account for the positive externality of vaccination [21], [38];
In fact, vaccination is one of the most prevalent counter- i.e., in a population where only a few individuals are not
measures against the spread of epidemics, since it reduces immune, these individuals benefit from the vaccination that
the fraction of vulnerable nodes [22], [23]. In the realm of the others have undergone. Hence, they have less incentive to
computer systems, however, there are light and heavyweight incur the relative costs of vaccination. Indeed, their rational
forms of vaccination. Lightweight vaccination is typically decision is to avoid the crowd, and ignore the vaccine. Such
performed through the update of anti-virus software. Such analyses, however, do not account for exogenous infections
updates are executed regularly, usually once a day or once caused by malicious and strategic attackers.
a week, giving rise to the so-called Internet security ‘‘cat and Nowadays, it is possible to scan the whole IPv4 space
mouse game’’. Actually, as soon as an anti-virus software in less than an hour, and efficiently detect a few vulnerable
update is released, by using dedicated bot update modules nodes [39], [40]. We refer to attackers performing such port
[24]–[27] botmasters change the signature code of the virus scans to find vulnerable nodes as strategic attackers, as they
and its behavior. Novel fully undetectable versions of the can strategically invest their attack budget towards vulnera-
virus are produced and the virus ultimately evolves through ble users. Vulnerable users, in turn, must follow the crowd,
multiple generations [28]–[30]. i.e., apply a countermeasure although most of the other users
New releases of anti-virus software need to cope with such have already done so.
virus evolution, also known as polymorphism. In this context, In this paper, we consider the problem of determin-
networked nodes are typically modeled using a susceptible- ing whether to invest in heavyweight forms of protection
infectious-susceptible (SIS) model [31], according to which accounting for positive and negative externalities of vaccina-
they switch over time between being susceptible (S) to the tion. Our goals are:
malware infection and being actually infected (I), and then 1) To compute the node infection probability in a network
susceptible again after malware removal. Ultimately, most as a function of the rates of endogenous and exogenous
anti-virus products are subscription-based and deploy regular infection; i.e., we assess the risks of not applying a
updates to anti-virus databases. stringent countermeasure.
Alternative countermeasures against viruses include very 2) To determine the system equilibria; i.e., given the rel-
stringent treatments, such as quarantine, e.g., the disconnec- ative vaccination costs and an estimate of the infec-
tion of nodes from the network, clean-state restarts with full tion probability, we determine the expected number of
operating system and firmware upgrades, or the execution of agents that incur the heavyweight relative vaccination
heavyweight anti-virus software [32], [33]. The latter may costs.
detect viruses more promptly compared to their lightweight To this aim, we propose a simple epidemic model, which
counterparts, at the expense of more significant CPU and extends the multiplicative SIS model and is amenable to
memory overhead. For all practical purposes, devices imple- steady-state closed-form solutions. We assume an attacker
menting such countermeasures can be assumed to be immune with a limited average infection budget of 3 infections per
to the target malware. time unit. Such power is uniformly distributed among N
Among the challenges faced by system administrators, nodes that the attacker identifies as vulnerable. Then, each
we focus on the dilemma involved in applying stringent of such nodes is subject to exogenous infections which occur
countermeasures, whose applicability is often limited by at rate 3/N . Such exogenous infections due to strategic
attackers limited by a budget, investigated in this work, give In this work, we assume that a transition from an
rise to a rich set of novel insights in the realm of epidemic infected to a susceptible state occurs at nodes deploying
models. lightweight countermeasures. Those transitions reflect that an
We summarize our key contributions as follows. infected node, after lightweight countermeasures, becomes
1) Analytical model: We propose an analytical model susceptible again for new variants of the same malware. The
which captures positive and negative externalities use of the SIS model to capture those transitions is standard
associated with countermeasures in security games. in the literature of epidemic models applied to computer
It accounts for an attacker with a finite budget, lead- systems.
ing to a threat model wherein the exogenous infection The classical SIS epidemic model is borrowed from Biol-
rate per node decreases as the number of vulnerable ogy. As such, it captures the propagation of non-intentional
nodes grows. The model is simple and tractable, while viruses. Propagation of malware in a computer network,
still having expressive power to capture the trade- in contrast, must capture intentional and targeted infections,
offs related to the vaccination of networked nodes as pointed out in [8], [46], [47].
(Sections III-V); One way to capture strategic behavior is to extend the
2) Infection probability assessment: We provide sim- model by exogenous strategic infections. Exogenous infec-
ple closed-form expressions to approximate the infec- tions have previously been considered in the realm of bio-
tion probability as estimated by the proposed model. logical networks [42], [43], [48]. However, to the best of our
In particular, one of the proposed approximations is knowledge there is no prior epidemic model using exogenous
based on Newton’s Approximation Method (NAM). infections to account for strategic attackers with a finite attack
The accuracy of the approximation can be arbitrarily budget. In particular, attackers that can scan the whole net-
increased at the expense of additional computational work in a few hours have been considered by the security
cost (Section VI and Appendix A); community from a systems-oriented standpoint [39], [49],
3) Vaccination game and analysis of equilibria: We [50] but not from an epidemics point of view. One of our
pose a vaccination game in which each player selects goals is to bridge this gap. To that aim, we consider exogenous
a countermeasure as a function of the estimated infec- infections per node whose rates depend on the population
tion probability. We investigate system equilibria, indi- size. We are unaware of previous works wherein such threat
cating two extreme regimes; under the first (second) model has been considered (see Section III-C).
one, the infection probability monotonically decreases Network externalities play an important role in the adop-
(increases) as a function of the size of the vulnera- tion of software and countermeasures. A community of users
ble population, corresponding to a follow-the-crowd of a particular software, for instance, benefits from addi-
(avoid-the-crowd) behavior (Section VII-A); tional members [38], [51], e.g., when accounting for inter-
4) Simulations: We perform experiments using a detailed operability or collaboration functionality. In [52], network
malware simulator inspired by Mirai botnet epi- externalities play an important role for strategic decisions
demics under different configuration scenarios. We ver- taken by each community in an attacker-susceptible environ-
ify that the proposed model qualitatively captures ment. In our work, we assume that increasing the number
the simulated botnet behavior (Section VIII and of vulnerable nodes implies decreasing the probability of
Appendix G). an exogenous infection towards a tagged, randomly-chosen
node.
This paper is organized as follows. Section II presents Maille et al. [53] have also studied network externalities
related work. The considered system is briefly introduced in related to security countermeasures, but without accounting
Section III. Section IV defines the vaccination game and the for epidemic aspects. Their focus is on financial and eco-
concepts of follow and avoid the crowd in the presence of a nomic motivations behind malicious actions, assuming that
strategic attacker in an epidemic context. After the proposed the number of vulnerable devices is directly proportional
model has been described in Section V, Section VI develops to the incentives an attacker has to produce an exploit for
an approximate solution to the model, in closed form. The that vulnerability. A similar economic perspective from the
system equilibria are analyzed in Section VII. Section VIII standpoint of attackers has been considered in [28]. In our
illustrates some properties of the considered system through research, in contrast, the focus is mainly on strategic attackers
simulation experiments and contrast them against our find- who leverage existing exploits, and are able to identify targets
ings obtained using the model, Section IX presents additional by scanning the IP address space.
discussion on broader implications of the work and Section X We indicate that the proposed model gives rise to both
concludes the paper. stable and unstable equilibria. Those equilibria are similar in
spirit to the ones obtained in the analysis of medium access
II. RELATED WORK protocols, such as Aloha [54], [55]. Nonetheless, our analysis
There is a vast literature on epidemic models, accounting for intrinsically accounts for strategic decision makers, whereas
transient and stationary aspects [41] as well as endogenous traditional performance models, such as those used to analyze
and exogenous infections [42]–[45]. Aloha [54], [55], account for non-strategic agents.
C. EQUILIBRIA
Next, we further explain and formally define the notion of
FIGURE 2. Illustrative biological and computational epidemics. equilibrium considered throughout this paper. We start by
Computational epidemic has two types of behavior: the first is dominated illustrating the concepts through an example which is simple
by exogenous infections, while the second is dominated by endogenous
infections. but already helps us appreciate the nature of our definitions.
Then, we proceed by introducing the formal definitions.
Figure 3(b) shows three points of equilibria: i) The first
B. FOLLOW OR AVOID THE CROWD? point is the trivial equilibrium, in which there is no vulnerable
Figure 3 illustrates in red the relative vaccination costs C node and no infected node. ii) The second point is an inter-
for a computational epidemic. If the risk (probability) of nal unstable equilibrium; few steps towards to the left with
infection of a node is above these relative vaccination costs, respect to the numbers of vulnerable nodes (x axis) implies
the node is motivated to vaccinate. Inversely, if the probability more motivation to vaccinate, and few steps towards the right
of infection of a node is below the relative vaccination costs, implies less motivation to vaccinate. iii) The third point is
the node is not motivated to vaccinate. the internal stable equilibrium, a small modification in the
According to Figure 3(a), this vaccination strategy leads number of vulnerable nodes (x axis) to the left or the right
to three decision moments: i) the first moment occurs under results in incentives to return to the equilibrium.
the initial regime with the infection probability above the For each vaccination game we define its corresponding
relative vaccination costs: each node is motivated to vacci- state graph. The state graph of the game illustrated above is
nate, and hence the number of vulnerable nodes decreases; shown at the bottom of Figure 3(b).
in this case, the best strategy is to follow the crowd. ii) Definition 1 (State Graph [58], [59]): A state graph is a
the second moment occurs when the infection probability is directed graph where each vertex corresponds to a strategy
below the relative vaccination costs: no node is motivated to profile Z. There is a directed arc from vertex Z to vertex Z 0
vaccinate, and thus the number of vulnerable nodes tends to with label v if the only difference between Z and Z 0 is the
increase; in this case, the best strategy is to avoid the crowd. strategy of a single player and the payoff of that player in Z is
iii) the third moment occurs under the final regime with the strictly less than its payoff in Z 0 , the modulus of the difference
infection probability above the relative vaccination costs: the being equal to v.
node is motivated to vaccinate and the number of vulnerable Next, we specialize the above general definition of state
nodes decreases; in this case, the best strategy is to follow graphs to the vaccination games considered in this paper.
the crowd. In particular, we consider two simplifying assumptions:
• symmetry: we assume all users to be symmetric, i.e., all Definition 3 subsumes that the index of each vertex in the
users have the same number of neighbors and are subject state graph corresponds to the expected number of vulnerable
to the same curing rates, as well as the same stationary users in the system at that state, assuming a large population
exogenous and endogenous infection rates. This yields of users. Under such an interpretation, two adjacent states
a lumped state space wherein each state is character- in the state graph are now separated by a continuum set of
ized solely by the number of vulnerable users, i.e., the virtual states in between them. Then, a virtual equilibrium
number of users that decided not to implement stringent is a virtual state wherein relative vaccination costs equal
countermeasures; infection probability. Accordingly, Definition 3 refers to the
• incentives: we assume that the infection probability of set of states surrounding that virtual equilibrium state as an
vulnerable users together with the relative vaccination equilibrium.
costs at the current state of the state graph fully deter- Definition 4: A stable equilibrium of the vaccination game
mine the incentives that drive users to change their is an equilibrium comprising up to two adjacent vertices
strategies, i.e., users have an incentive to change their n and n + 1 in its state graph wherein users have no
strategy if the current infection probability is greater incentive to change their strategies and cause the system
than relative vaccination costs. to transition to a vertex of the state graph outside of the
Intuitively, the latter assumption implies that each user does considered set.
not account for the difference in the infection probability of Note that Definition 4 is rather intuitive, as it captures the
the population after a single change of individual strategy is notion of a set of strategy profiles such that users have no
performed. Such assumption allows us to determine the value incentive to make the system transition out of this set.
v of an edge from state Z to Z 0 of the state graph solely The set of vertices corresponding to a stable equilibrium
based on properties of state Z. Such assumption is inspired may comprise a single vertex n or a pair of adjacent vertices
by [60], wherein its applicability and implications are further n and n + 1. If an equilibrium comprises two states n and
discussed. n + 1, and at state n (state n + 1) the infection probability is
Definition 2: The state graph of a vaccination game con- less (greater) than the relative vaccination costs, the equilib-
sists of N + 1 vertices, with each vertex n ∈ {0, 1, . . . , N } rium is stable as (4) implies that the population indefinitely
corresponding to a strategy profile wherein there are n vul- transitions back and forth between those two states.
nerable users, and each edge corresponding to a transition Definition 5: Any non stable equilibrium of the vaccina-
wherein the system state decreases (or increases) by one unit, tion game is referred to as an unstable equilibrium.
representing the fact that a user starts (or stops) adopting a According to Definition 3, an equilibrium of the vaccina-
stringent countermeasure. The value v of an edge from state tion game is characterized by a minimal set of up to two
Z to Z 0 is given by adjacent vertices n and n + 1 in its state graph. If at state
n (state n + 1) the infection probability is greater (less) than
v(Z) = |H ρ(Z) − V |, (3) the relative vaccination costs, Definition 5 together with (4)
imply that the equilibrium is unstable.
where ρ(Z) is the infection probability at state Z. In addition, Next, we further distinguish between boundary and inter-
nal equilibria.
Z − 1, if H ρ(Z) > V and Z ≥ 1
Definition 6: A boundary equilibrium of the vaccination
(incentive to start adopting stringent game is an equilibrium corresponding to either vertex 0 or
vertex N of the corresponding state graph. Any equilibrium
countermeasure)
0
Z = Z + 1, if H ρ(Z) < V and Z ≤ N − 1 (4) that is not a boundary one is referred to as an internal
equilibrium.
(incentive to stop adopting stringent
The fact that the infection probability is zero at state 0 and
countermeasure), that relative vaccination costs are assumed to be non-negative,
Z, otherwise. together with the two considered simplifying assumptions,
motivates the following definition.
Given the definition of state graphs of vaccination games, Definition 7: The trivial equilibrium is the boundary equi-
we are ready to introduce the notion of stable and unstable librium wherein all nodes are vaccinated, corresponding to
equilibria of such games. Note that according to (4), at state Z vertex 0 of the state graph.
a user has incentive to adopt (resp., stop adopting) a stringent The above definitions will be used in Section VII to establish
countermeasure if H ρ(Z) > V (resp., H ρ(Z) < V ). In what structural results of the vaccination game. To that aim, we first
follows, we formalize the notion of an equilibrium. introduce the SIS epidemic model and its approximate solu-
Definition 3: An equilibrium of the vaccination game is tion in the two sections that follow. The role of the SIS
characterized by a minimal set of up to two adjacent vertices model and its approximate solution in the general framework
n and n + 1 in its state graph such that there exists a value considered in this paper is illustrated in Figures 4(a) and 4(b),
n0 ∈ [n, n + 1] for which ρ(n0 ) = V /H , n0 ∈ R, n ∈ N. respectively.
π̃(x) E(I )
π(x) = , x ∈ X, (6) ρ(N ) = , (11)
Z N
where where
1T x N
λ T
X π̃(ι)
π̃(x) = γ x Ax/2 (7) E(I ) = ι (12)
µ ι=0
Z
and is the expected number of infected nodes. The infection prob-
ability plays a key role in the modeling framework proposed
X
Z= π̃(x). (8)
in this work, as summarized in Figure 4(a).
x∈X
In the expressions above, matrix A is the adjacency matrix
The number of infected nodes at state x is given by as defined in Section III-B. In the remainder of this paper,
N
1T x =
P
xk . In addition, the number of edges with both we will consider a fully-connected network, unless otherwise
k=1 noted. For such a network, ak,l = 1 ∀k 6= l.
VI. AN APPROXIMATE SOLUTION TO THE Lemma 1: The node infection probability under the bino-
EPIDEMIC MODEL mial approximation is given by
In this section we introduce an approximate solution to the 1
epidemic model. We start by presenting the binomial approx- ρ̂(N ) = µ −N ?
. (19)
imation.
1+ λ(N ) γ
C. REGULAR NETWORKS
The analysis in the previous section accounted for fully
connected networks, and can be easily extended to regular
networks. A regular network is a network wherein each node
has degree d̃. In a regular network the expected number of
infected neighbors of each node is d̃ ρ̂(N ). Then, under the
binomial approximation, Equation (19) can be rewritten as
1
ρ̂(N ) = ? −1
. (25)
1 + µ λγ d
In particular, let
d ? = d̃ ρ̂(N ). (26)
Using (26) we are able to obtain accurate approximations
of the infection probability. For the special case of fully
connected networks where d̃ = N − 1, ρ̂(N ) estimated
by (25)-(26) equals (23).
Let d be the average node degree in a network. If the
FIGURE 5. Infection probability behavior and model parameterization:
(a) infection probability ρ(N) as a function of number of vulnerable nodes distribution of node degrees is concentrated around its mean,
N, and its approximations ρ̂(N, N ? ), letting N ? = N (upper bound), the analysis above still holds replacing d̃ by d. In what
N ? = N/2 (lower bound), and optimal N ? ; (b) finding the best
approximation for N ? under the binomial approximation, with γ = 1.09,
follows, we illustrate the approximations above in bipartite
µ = 1, 3 = 10 and λ = 3/N. networks.
Illustrative Example: To illustrate the accuracy of the
approximation above, Figures 6 and 7 show the infection
given node is (N − 1)ρ(N ). Then, in a fully connected net- probability as a function of the number of vulnerable nodes,
work, under the binomial approximation, Equation (19) can obtained through Equation (25). Figure 6 considers a fully
be rewritten as connected bipartite network and Figure 7 accounts for a
1 bipartite network with maximum node degree equal 3. In both
ρ̂(N ) = −1 . (23) cases, setting d ? to its optimal value we obtain very accurate
1 + µ λγ −1)ρ̂(N )
(N
approximations, and (26) typically provides a good approxi-
where we let mation for the optimal value of d ? (see Figures 6(c) and 7(c)).
Setting d ? = d, we note that the resulting approximation
N ? = (N − 1)ρ̂(N ) (24)
upper bounds the infection probability. Alternatively, setting
in Equation (19). d ? = d/2 we obtain a lower bound. Those examples serve
Figure 5(a) shows the infection probability as a func- to illustrate that the proposed approximations are helpful to
tion of the number of vulnerable nodes, with γ = 1.09, analyze topologies other than the complete graph. Additional
µ = 1, 3 = 10 and λ = 3/N . The full orange line results on bipartite graphs and more general topologies are
is obtained through the fix point solution of Equation (23), reported in Appendices E and G, respectively.
which accurately captures the exact solution of the model
(see Appendix D). Setting N ? to its optimal value also leads VII. MODEL ANALYSIS: PROPERTIES OF EQUILIBRIUM
to an accurate approximation of the infection probability, Next, our goal is to characterize structural properties of the
as indicated by the circles in Figure 5(a). Alternatively, letting equilibria. We start with general results before specializing to
N ? = N (resp., letting N ? = N /2) in Equation (19) leads to the case wherein the attacker budget is distributed uniformly
an upper (resp., lower) bound for the infection probability, at random across vulnerable nodes.
shown by the green (resp., blue) curve.
Figure 5(b) further illustrates how to optimally set N ? . A. GENERAL RESULTS
In particular, it indicates that the curves corresponding to Under the general setting illustrated in Figure 4(b), the fol-
the optimal N ? parameterization and (N − 1)ρ̂(N ) match lowing theorem states that the model admits at most two
d ρ̂(N )/dN are greater than zero, except d9/dN : admits at most a single root. Therefore, ρ̂(N ) admits at
most one internal minimum point, and ρ̂(N ) intercepts any
d9
1 dλ N ? ? horizontal line in at most two points. Those points are the
N ? dN
= γ + λ(log γ )γ candidate internal equilibria.
dN µ dN dN
?
Illustrative Example: Figures 8 and 9 illustrate the results
λγ N ?
= log γ
dN
+
dλ 1
. (27) discussed so far, under the setup of µ = 1, 3 = 10 and
µ dN dN λ λ = 3/N . Theorem 1 is in agreement with the results shown
ρ(N ) − C = 0, (31)
ρ̂(N ) − C = 0. (32)
FIGURE 8. Infection probability of a tagged node as a function of the
population size, ρ(N). When the endogenous infection rate γ is small
(big), the system is dominated by the exogenous (endogenous) infection
Letting again N ? = N /2, the values of N that satisfy the
rate, and the infection probability decreases (increases) with respect to above equation are
the vulnerable population size. When γ ≈ 1, the infection probability first
decreases and then increases, in agreement with Equation (6). µ = 1, (C − 1)3 log γ
2
3 = 10 and λ = 3/N. N =− W , (33)
log γ 2Cγ 1/2
in Figure 8. This figure shows that for γ > 1 the infection where W (x) is the Lambert relation [63], defined as follows,
probability first decreases and then increases. The infection
probability admits a single global minimum and at most two x = W (x)eW (x) . (34)
equilibrium points. When the system admits two internal
equilibrium points, one of those equilibria is stable, while the The Lambert relation W (x) admits two real values for each
other is unstable. For γ = 1.09, Figure 9 shows the possible given value of x, corresponding to the branches −1 and 0.
population states with corresponding gains envisioned by For 3 = 10, γ = 1.09 and C = 0.6, for instance, the values
users who decide to vaccinate (blue arrows pointing upwards) of N corresponding to the −1 and 0 branches are 45.6 and
or not to vaccinate (red arrows pointing downwards). States 9.7, respectively. Figure 9 shows that 45.6 significantly over-
11 and 12 compose an unstable equilibrium, while states shoots the stable equilibrium involving states 30 and 31, while
30 and 31 constitute a stable equilibrium. The minimal infec- 9.7 is a good approximation for the unstable equilibrium
tion probability is attained at state 21. involving states 11 and 12. The overshooting occurs due to
the rough approximation N ? = N /2, which is not very
B. SPECIAL CASE: VULNERABLE NODES SELECTED accurate as shown in Figure 5(a). More accurate results can be
UNIFORMLY AT RANDOM, λ(N) = 3/N obtained by using Newton’s approximation method (NAM),
Next, we specialize our results to the setting wherein vulner- as indicated in Appendix A.
able nodes are selected uniformly at random. To that aim, Although the approximations presented in this section are
we leverage the closed-form result derived in Lemma 1, not extremely accurate, they serve to illustrate the qualita-
setting λ(N ) = 3/N . Note that letting λ(N ) = 3/N tive properties of the model. In particular, the fact that the
corresponds to considering an attacker who has a finite attack Lambert relation has at most two real branches implies that
budget of 3 infections per time unit, which is uniformly the system admits at most two internal equilibria. This result,
distributed across N vulnerable nodes. In that case, in turn, is in agreement with Theorem 1, allowing us to obtain
a quick assessment of the equilibrium points.
dλ 3
= − 2. (28)
dN N
VIII. EXPERIMENTS
For the purposes of the following analysis, it suffices to We developed an epidemic simulator to evaluate a network’s
consider a rough approximation for N ? , and let N ? = N /2 behavior under a wide range of configurations, including
(see our discussion in Section VI-B). Then, those not directly captured in our analytical model (e.g.,
d 1 1 when the number of vulnerable nodes N varies over time,
ρ̂(N ) = κ log γ − , (29) when the time between infections is not exponentially dis-
dN 2 N
tributed, or when the epidemic model is additive rather than
where κ is a positive constant. The root of Equation (29)
multiplicative). We compare the experimental results with
corresponds to the population size which yields minimum
analytical results, discussing similarities and differences.
infection probability, and is given by
Our simulator is publicly available.1
2
N = . (30)
log γ 1 https://github.com/queupe/miraisim
FIGURE 9. Dynamics of the number of vulnerable nodes. The endogenous infection rate and the relative vaccination cost are set to
γ = 1.09 and 0.6, using the same setup as for Figure 8. There are two stable Nash equilibria [62], the first one at 0 and the other one at 31.
In Figure 8, the horizontal line at y = 0.6 crosses the magenta curve at two points. The first point corresponds to an unstable equilibrium
(where the expected number of vulnerable nodes is between 11 and 12), and the second one corresponds to a stable equilibrium
(between 30 and 31 vulnerable nodes).
TABLE 2. Simulation parameters and their reference values. TABLE 3. Simulation and fitting of the model parameters.
FIGURE 10. Outcome of Mirai Botnet simulation experiments, in the presence of a strategic attacker, under a fully connected network. The
reference values of the simulator parameters are: 3 = 1500, γ̃ = 5 × 10−5 , 3̃ = 2 × 10−2 and τ = 65. Model parameters are shown in Table 3.
simulations, the 95% confidence interval is also reported Generally, the model tends to overestimate the infection
(shaded area). In addition, we also report the fraction of nodes probability vis-à-vis the experiments. This is due to the
that were infected through endogenous and exogenous infec- following reasons: i) The model assumes that the nodes
tions, in dotted and dashed red lines, respectively. In each are always active (on-time), whereas the simulator assumes
plot, the fraction of infected nodes (solid red line) is the sum that the nodes alternate between active and inactive states
of the fraction of endogenously and exogenously infected (on-time and off-time). ii) The model assumes a multiplica-
nodes. Column I (left) varies the endogenous infection rate tive infection rate, while the simulator assumes an additive
γ̃ , Column II (center) varies the exogenous infection rate 3̃, one. iii) In the model, the periods between events are expo-
and Column III (right) varies the node uptime τ . nentially distributed, whereas in the simulator l and T follow
a uniform distribution. iv) The model assumes instantaneous
3) MODEL VALIDATION infections and state transitions, while the simulator captures
The outcome of the experiments is qualitatively in agree- the time it takes bots to scan for vulnerabilities (attempt
ment with the findings from the analytical model. Under the connections) and infect vulnerable hosts.
initial regime with a few nodes, the system is dominated
by exogenous infection. As the number of nodes increases, C. EXPERIMENTAL RESULTS AND INSIGHTS
the infection probability first decreases and then increases, As the number of vulnerable nodes increases, the frac-
and the system is then dominated by endogenous infection. tion of infected nodes first decreases and then increases.
The system (model and simulator) undergoes two regimes, Host uptimes significantly impact the fraction of
first being dominated by exogenous infections and then by infected nodes. The asymptotic value of the proportion of
endogenous infections. In Figure 10 the dashed curve repre- infected nodes depends on the average uptime, as shown
sents the probability of exogenously infected hosts, which is in Figure 10, Column III. When nodes stay active for longer
decreasing while the number of vulnerable hosts increases, periods of time, the number of infections attempted by each
and the dotted curve represents the probability of endoge- individual bot increases, resulting in an increase of the frac-
nous infected hosts, which is increasing while the number tion of infected nodes.
of vulnerable hosts increases. The behavior observed in the
experiments agrees with the one predicted by the proposed IX. DISCUSSION
model (see Lemma 1 and Appendix 2). In this section we indicate some of the broader implications
Figure 10 shows that under the first regime the proportion of the results presented in this work.
of exogenously infected hosts is greater than the proportion
of the endogenously infected ones (the dashed curve is above A. CYBERSECURITY INSURANCE
the dotted curve). Under the final regime, the proportion of Cybersecurity insurance (or cyber liability insurance) is a
the endogenously infected hosts is greater than the proportion product that an entity can purchase to help reduce the finan-
of the exogenously infected ones (the dotted curve is over the cial risks associated with online business. It encompasses a
dashed curve). contract wherein, in exchange for a fee, the insurance pol-
The minimal proportion of (endogenously and exoge- icy transfers some of the risk to the insurer [64], [65]. Our
nously) infected hosts occurs when the dashed curve crosses results imply that the modeling and pricing of cybersecurity
the dotted curve (as the curves are concave increasing and insurance should take into account both positive and nega-
convex decreasing, respectively). At that point, the proportion tive externalities derived from immunization. In particular,
of infected hosts as assessed by simulations (solid curve) the model proposed in this paper may serve as an additional
reaches its minimum. ingredient when assessing insurance prices [65].
Note that when γ̃ = 8 × 10−5 (Figure 10(a.I)) the
analytical model underestimates the infection probability, B. RISK SCORE PARAMETERIZATION
going counter the behavior observed in the other scenarios Standard risk scores, such as the common vulnerability scor-
considered in Figure 10. Except for the scenario consid- ing system [66], account for environmental aspects when
ered in Figure 10(a.I), the number of vulnerable nodes that determining risks. Such environmental aspects may embrace
minimizes the infection probability according to simulations the security countermeasures taken by the neighbors of a
(solid curve) is typically close to that obtained through the node when assessing its risk. Our results indicate that even if
analytical model (dotted-dashed blue curve). most of the neighbors of a given node are already protected,
As the number of vulnerable nodes increases, the infec- the risks faced by a node may remain high, which serves to
tion probability is more sensitive to the endogenous, motivate lingering nodes to also deploy the available security
rather than the exogenous, infection rate. Endogenous countermeasures.
infections are boosted as the number of infected nodes in the
network increases, whereas the exogenous infection rate is C. IMMUNIZATION STRATEGIES BEYOND HERD
limited by the power of the bot master. From top to bottom, IMMUNITY
in Figure 10 Column I the endogenous infection rate was The models presented in this work serve to bring awareness to
increased by about factor 60, while in Column II the exoge- system administrators about risks incurred due to old vulner-
nous infection rate had to be increased around 400 times to abilities for which a significant fraction of the population has
produce similar effects. already applied a patch. Strategic attackers may still be able to
Model parameters are more sensitive to host uptimes find vulnerable nodes that linger in the network. Such nodes
and exogenous infection rates as opposed to endogenous may correspond, for instance, to industrial control systems
rates. As shown in Table 3, model parameters µ and γ are which are difficult to patch, or to devices which are not
more sensitive to 3̃ and τ (second and third columns of automatically patched after being installed off-the-shelf [34].
Figure 10) as opposed to γ̃ (first column of Figure 10). This Strategic attackers may target those devices, requiring system
occurs even though endogenous infection rate was varied in a administrators to adopt preventive measures beyond herd
range between 8 × 10−5 and 500 × 10−5 , which allows us to immunity.
appreciate the roles of endogenous and exogenous infections
as the number of vulnerable nodes increases. Further increas- D. ADDITIONAL PRACTICAL IMPLICATIONS
ing the endogenous infection rate does increase the sensitiv- Next, we provide a discussion on the implications of our
ity of model parameters, however, this results in scenarios results from the attack generation and defense points of
where endogenous infection rates dominate system behavior, view. From the attack standpoint, our model suggests that
which can be captured through classical epidemic models, scanning the network to target vulnerable nodes can signifi-
e.g., [11], [12]. cantly impact infection probability. This, in turn, implies that
engineering solutions to counteract the automated exploita- protecting against multiple malware using the same attack
tion of vulnerabilities in the wild are key in face of strategic vector. It is also worth pointing that in this work we focused
attackers [39], [67]. From the defense standpoint, our model on networks with a finite number of nodes. The study of
suggests that there is an optimal number of vulnerable nodes scaling laws of epidemics when the number of vulnerable
that minimizes infection probability. We envision that the nodes grows to infinity [69], accounting for strategic attackers
assessment of infection probability, in turn, can be used to whose budget increases as the population of vulnerable nodes
decide how to invest in security countermeasures, such as grows, is another avenue for future research.
vaccination, rejuvenation and quarantine [17], accounting for
the whole population ecosystem. In addition, the number APPENDIXES
of vulnerable nodes that minimizes infection probability as APPENDIX A
derived from the proposed model can also be instrumental ITERATIVE MODEL SOLUTION THROUGH NEWTON
to determine how to deploy honeypots based on first princi- APPROXIMATION
ples [68], which we leave as subject for future work. In this appendix we indicate that the Newton Approximation
Method (NAM) may be instrumental to approximate the
X. CONCLUSION infection probability. The use of NAM to obtain approximate
In this paper we have proposed a new epidemic analyti- closed form expressions to estimators is not novel. A similar
cal model to assess the infection probability of nodes in a idea has been used by Wilks [70], for instance, to obtain
network which face a strategic attacker with finite power. approximations in closed form to optimal estimators for the
For this model, the infection probability can be expressed covariance matrix of the bivariate Gaussian distribution (see
in closed form, allowing us to verify its equilibrium points Section 4 in [70]).
and its further attributes. Administrators can use this model to
choose the best countermeasure to be applied to the network. A. A NOTE ABOUT NOTATION
To facilitate this process, the model provides: i) a vaccination In all the appendices that follow, we are interested in approx-
game in which the player must choose the best strategy to imations to ρ(N ). Then, to simplify notation we refer to the
minimize the maintenance costs depending on the infection infection probability as estimated by the Markovian model
probability; ii) some points of equilibrium supporting the and to its approximation through the binomial approximation
concept of follow or avoid the crowd in the presence of a as ρ(N ). It should be clear from the context the quantity which
strategic attacker. is being referred to.
In order to validate the proposed model we have carried
out numerous experiments using a simulator in which we B. INTRODUCTION TO NEWTON APPROXIMATION
provoked infections using the Mirai botnet malware. The METHOD (NAM)
proposed model was able to capture the behavior qualita- Next, we show how to apply NAM to obtain approximations
tively and accurately. The experiments have also allowed to for the infection probability. In a fully connected network,
understand what happens if some assumptions of the pro- under the binomial approximation, Equation (19) can be
posed model are relaxed. The experiments have shown that rewritten as
the exogenous infection rate has to be increased around 400 1
times to attain effects similar to those observed when the ρ(N ) = −1 . (35)
1 + µ λγ −1)ρ(N )
(N
endogenous infection rate is increased by about a factor of 60.
Some interesting results from the experiments and related The definition of ρ(N ) uses ρ(N ) itself as an exponent of γ .
analysis include the following. i) There are two distinct Isolating ρ(N ) is non-trivial, but we can approximate it. With
regimes, the first one being dominated by exogenous infec- ρ(N ) = ρ and n = N − 1, define function f (ρ) as
tions and the second one by endogenous infections. ii) The
µ µ
f (ρ) = ρ 1 + γ −ρn − 1 = ρ + ρ γ −ρn − 1. (36)
role of endogenous infection is prevalent whenever the num- λ λ
ber of vulnerable nodes is big. iii) In contrast to classical Then,
epidemiology research, a few vulnerable nodes may become ∂f (ρ) µ
preferred targets, and increasing the number of vulnerable f 0 (ρ) ≡ = 1 + γ −ρn (1 − ρn ln γ ) (37)
∂ρ λ
nodes may decrease the infection probability of a given
∂ 2 f (ρ) µn ln γ −ρn
tagged node. The latter observation, in turn, may be used to f 00 (ρ) ≡ = γ (ρn ln γ − 2) (38)
position honeypots in a network based on epidemiological ∂ ρ2 λ
first principles, which we leave as subject for future work. We are now ready to report the two key results from this
We envision that this work opens up a number of directions section.
for future research, including the analysis of the spread of Theorem 1: If γ > 1, starting from ρ0 = 0 NAM con-
two or more distinct malware. Protective measures can then verges without overshoot to the solution of f (ρ ? ) = 0, where
be implemented either at the host level, e.g. upgrades to ρ ? approximates the node infection probability.
OSes/firmware that add address space layout randomization Proof: Finding a solution for Equation (35) is equiv-
(ASLR), or at the network level, e.g. blocking SMB ports and alent to detecting a root of Equation (36). If γ > 1 and
(0)
f (0) × f 00 (0) > 0 it follows from Darboux’s theorem [71] Let ρi be the approximate infection probability after i
that starting from ρ0 = 0 NAM converges without any over- iterations of NAM, with ρ0 = 0. Then,
shoot to the solution. To check the hypothesis of Darboux’s λ
(0)
theorem note that ρ1 = ,
λ+µ
µ λ − µγ −ρ1 n ρ12 n ln γ
f (0) = −1 and f (1) = > 0, ρ2
(0)
(44)
λγ =
λ − µγ −ρ1 n (ρ1 n ln γ − 1)
where µ, λ > 0 and γ > 1. In addition, where ρ1 = ρ1 .
(0)
(1)
µ µn ln γ Similarly, let ρi be the approximate infection probability
f 0 (0) = and f 00 (0) = −2 . after i iterations of NAM, with ρ0 = 1,
λγ λ
λ − µγ −n (n ln γ )
The result follows from the fact that ln γ > 0, which implies (1)
ρ1 = , (45)
that γ > 1 and f (0) × f 00 (0) > 0. λ − µγ −n (n ln γ − 1)
Theorem 2: The expression of ρi+1 at iteration i + 1, as a (1)
and with ρ2 given by Equation (44), replacing ρ1 by ρ1 .
(1)
function of ρi produced at iteration i, is given by
D. HEURISTIC TO SET INITIAL VALUE
λ − µγ −ρi n (ρi2 n ln γ )
ρi+1 = . (39) As indicated in Appendix A-C, the accuracy of NAM is
λ − µγ −ρi n (ρi n ln γ − 1) very dependent on the considered initial condition. We have
shown that to produce tractable closed-form expressions for
Proof: According to the Newton Approximation the infection probability, we can consider two initial condi-
Method (NAM), tions that simplify the resulting expressions, namely ρ0 = 0
and ρ0 = 1. In what follows, we indicate an heuristic to
f (ρi )
ρi+1 = ρi − (40) choose between those two initial conditions. The heuristic is
f 0 (ρi ) inspired by the numerical results presented in Figure 11(a)
from (36) and Figure 11(b) for ρ0 = 0 and ρ0 = 1, respectively,
z
µ
}| { with the same parameters as in Figure 8 (µ = 1, 3 = 10
ρi + ρi γ −ρi n − 1 and λ = 3/N ). Note that ρ0 = 1 typically produces good
= ρi − λ (41)
µ −ρi n approximations, except when the obtained values evaluate to
1+ γ (1 − ρi n ln γ ) quantities beyond the range of interest which varies between
| λ {z } 0 and 1. In those cases, the approximation through ρ0 = 0
from (37)
produces accurate estimates.
ρi µλ γ −ρi n − (ρi µλ γ −ρi n )(ρi n ln γ ) − ρi µλ γ −ρi n + 1 The discussion in the previous paragraph motivates the fol-
=
1 + µλ γ −ρi n (1 − ρi n ln γ ) lowing heuristic. First, evaluate the infection probability con-
sidering the initial value ρ0 = 1. If the resulting expression
1 − ( µλ γ −ρi n )(ρi2 n ln γ ) to estimate the infection probability produces a value greater
= (42) than 1 or less than 0, then switch to ρ0 = 0. We denote by
1 − µλ γ −ρi n (ρi n ln γ − 1)
ρ2 (N ) the infection probability obtained through that simple
λ − µγ −ρi n (ρi2 n ln γ ) heuristic,
= (43)
λ − µγ −ρi n (ρi n ln γ − 1)
(
(1) (1)
ρ2 (N ), if 0 ≤ ρ2 (N ) ≤ 1
ρ2 (N ) = (0) (46)
ρ2 (N ), otherwise.
Figure 11(c) illustrates the behavior of the proposed heuristic
C. CLOSED-FORM APPROXIMATION FOR for ρ ≥ 1.06. In the considered example, ρ0 = 1 produced
INFECTION PROBABILITY accurate results except when γ = 1.03. In the latter case,
Using the precedent approach it is possible to obtain a closed- as shown in Figure 11(b), setting ρ0 = 1 produces results that
form expression for an approximation of the infection proba- are outside the range [0,1]. Hence, for γ = 1.03 we should
bility. Numerically, we experimentally found that using only set ρ0 = 0 which again produces accurate results as shown
two iterations of NAM is enough to obtain accurate approxi- in Figure 11(a).
mations. In what follows, we refine the considered heuristic in
The initial value ρ0 for NAM is key for the gener- order to contemplate scenarios such as those corresponding to
ation of accurate results. We consider two initial values γ = 1.03 in the considered setup. To that aim, note that in
ρ0 = 0 and ρ0 = 1 to obtain two approximations the numerical examples presented above, when γ ≥ 1.06,
of the infection probability. In Appendix A-D we present large values of N produce an infection probability close to 1,
a simple heuristic to determine which is the best initial which in turn favor NAM with initial condition ρ0 = 1
value. as opposed to ρ0 = 0. Accordingly, when γ ≤ 1.03 the
APPENDIX B
MULTIPLICATIVE VERSUS ADDITIVE
INFECTION MODELS
Next, we further discuss the relationship between additive
and multiplicative infection models. First, note that with a
logarithmic change of variables, namely, letting λ = log λ̃
and γ = log γ̃ , we have
λ + γ d = log λ̃γ̃ d . (49)
The equation above allows us to relate the infection rates
under the additive and multiplicative models. A similar idea
has been considered in [72], wherein the authors rely on
geometric programming for epidemic control after replacing
summations by products.
Throughout this paper, we considered the multiplicative
model under the assumption that γ > 1. As argued in
Section III-E, it is always possible to set γ > 1, as far as time
units are conveniently normalized. In the remainder of this
appendix, we briefly discuss an interpretation of the model
under γ < 1, which is out of the scope of this paper but may
be of interest on its own.
If γ < 1, the multiplicative model can be interpreted as
follows. The infection occurs if the external attacker infects
a node and all neighbors infect that node as well. The ‘‘and’’
comes in as the multiplication of probabilities, assuming that
the respective events are all independent.
Note that under the additive model, a node may be infected
FIGURE 11. Infection probability, obtained through NAM: (a) initial externally or by any of its neighbors. In that case, the ‘‘or’’
condition ρ0 = 0; (b) ρ0 = 1; and (c) initial condition chosen by the
proposed heuristic. comes in as the addition. In particular, the aggregation of
independent Poisson processes is also a Poisson process with
infection probability is decreasing with respect to N in the rate equal to the sum of the rates of the independent processes.
range of interest, favoring ρ0 = 0 irrespectively of N . As in this work we consider the setup wherein the infection
(z)
Let ρ̄2 (N ) be the value of NAM at its second iteration, rate increases as the number of infected neighbors grows,
under initial condition z, if the produced value is in the range we assume γ > 1. In this setting, the multiplicative model
between 0 and 1, for all n ≤ N , and −∞ otherwise. Then, is contrasted against the additive model in Section III-E.
(z) (z)
ρ2 (N ), if 0 ≤ ρ2 (N ) ≤ 1
APPENDIX C
(z) (z)
ρ̄2 (N ) = and ρ̄2 (N − 1) 6 = −∞, (47) ALTERNATIVE DERIVATION OF BINOMIAL
−∞, otherwise, APPROXIMATION
Zhang and Moura [45] describe an alternative approach to
where z, 0 ≤ z ≤ 1, is the initial value for ρ0 . Equation (47) derive a result similar in spirit to Lemma 1 taking into account
explicitly sets the dependence of ρ on N = n+1 (in Lemma 1 the most-probable state x ∈ X .
which yields
dπj,I (t) X
= −µπj,I (t) + λ + γ πk,I (t) πj,0 (t). (72) FIGURE 13. Additive model under complete graph topology: comparing
exact solution against NIMFA approximation. We let λ = 1/N and µ = 1,
dt
k6=j varying γ between 0.2, 0.3 and 0.4.
tation, γ E(X ) . In the numerical experiments that follow, we indicate that (76)
Under the two approximations above, the endogenous typically provides better approximations than (77). This
infection rate towards node j by its neighbors, at time t, occurs as we empirically observed that (76) slightly overesti-
is given by mates the infection probability. This, in turn, is in agreement
with [76], [77]. Then, approximation (A2) serves as a correc-
k6=j πk,I (t)
P P
rj (t) = γ k6=j Xk,I (t) ≈γ tion. Indeed, it follows from Jensen inequality that
which yields
E γ X ≥ γ E(X ) , γ > 1, 0 ≤ X ≤ 1. (78)
dπj,I (t)
= −µπj,I (t) + λγ k6=j πk,I (t) πj,0 (t).
P
(74)
dt The inequality above implies that approximation (A2) favors
Leveraging the symmetry between nodes, we let a reduction in the infection probability, and that together
(A1) and (A2) balance out to produce better approximations
lim πj,I (t) = ρ. (75)
t→∞ through (76) when compared against (77).
Then, in stationary regime it follows from (74) that Figure 14 shows the infection probability ρ as a function
of N , letting µ = 1, 3 = 10 and λ = 3/N . The full
0 = −µρ + λγ (N −1)ρ (1 − ρ) lines are obtained through the exact solution of the Markov
Therefore, chain (Equations (59)-(61)) whereas the stars, squares and
1 circles are obtained through the NIMFA approximation for
ρ= −1 . (76) γ = 1.1, 1.15 and 1.2, respectively. Equation (76) is used
1 + µ λγ (N −1)ρ to obtain Figure 14(a), under approximations (A1) and (A2),
The above derivation indicates that the NIMFA approxi- and Equation (77) is used to obtain Figure 14(b), under
mation provides an alternative derivation and rationale to approximation (A1).
approximation (35), referred to as the binomial approxima- As in Appendix D-D, the NIMFA approximation cap-
tion in this paper. tures the behavior of the exact MC solution, allowing to
Alternatively, if we consider only approximation (A1), but find the number of vulnerable nodes that minimizes the
not (A2), the infection probability is given by the root of the infection probability. In addition, the NIMFA approxima-
following equation, tion again overestimates the infection probability. Applying
(N −1) approximation (A2) on top of (A1) favors a correction of the
0 = −µρ + λ(1 − ρ) γρ + (1 − ρ) . (77) overshooting, as evidenced by the closer agreement between
APPENDIX E
EXACT MODEL SOLUTION AND APPROXIMATIONS FOR
BIPARTITE NETWORK TOPOLOGIES
Next, we consider the solution of the model for bipartite
network topologies. Figure 15 shows the Markov chains cor-
responding to the proposed epidemic model accounting for up
to 4 vulnerable nodes, assuming a bipartite network topology.
The Markov chains leverage symmetry in the bipartite graph.
In what follows, we solve the corresponding Markov chains.
To appreciate the analysis that follows through a very
simple example, we start considering the case of a single
vulnerable node. The solution in this simple case, as well as in
the case of two vulnerable nodes, is in agreement with the full
topology considered so far. Then, we consider three and four
nodes, indicating the specifics of the role played by topology
on the model solution.
π0 λ = µπ1
π0 + π1 = 1
Therefore,
µ λ
π0 = , π1 =
λ+µ λ+µ
Alternatively, we can rely on results from the detailed state
space introduced in Section V-C to derive the same results.
In this appendix, we refer to a state of the Markov chain
considered in the rest of this paper as a detailed state, and
to the lumped states considered in this appendix simply as
states. To each state i we associated its corresponding class
of symmetric detailed states. The symmetric detailed states
in each class have all the same steady state probability. Let
νi be the number of symmetric detailed states in the class of
state i. The steady state probability of each of those symmetric
detailed states equals πi /νi . It follows from (6)-(8) that
1x T
λ T
π̃i = νi γ x Ax/2 (79) FIGURE 15. Markov chains for the bipartite topology with up to
µ 4 vulnerable nodes.
π̃i and
πi = P (80)
π̃j
π̃0 1 µ
∀j π0 = P = λ
=
π̃j 1+ µ
λ+µ
Then, ∀j
λ
π̃1 λ
0
λ µ
π̃0 = γ0 = 1 π1 = P = λ
=
µ π̃j 1+ µ
λ+µ
∀j
λ1 0 λ
π̃1 = γ = The infection probability is given by ρ = π1 .
µ µ
66386 VOLUME 8, 2020
V. Q. Rufino et al.: Beyond Herd Immunity Against Strategic Attackers
and 2λ
µ
1 µ2 π1 = 2λ λ γ +λ
π0 = = 1+ µ + µ µ
1+ 2λ
+ λ2 γ µ2 + 2λµ + λ2 γ
µ µ2
λ γ +λ
2λµ µ µ
π1 = 2 π2 = λ γ +λ
µ + 2λµ + λ2 γ 1+ 2λ
µ + µ µ
λ2 γ
π2 = 2 The infection probability is given by ρ = (π1 + 2π2 )/2,
µ + 2λµ + λ2 γ
λ λ(γ +λ)
E(I ) µ + µ2
As discussed in the previous section, those results can also be ρ= = λ(λ+γ )
. (82)
similarly obtained using the detailed state space introduced 2 1 + 2λ
µ + µ2
in Section V-C. Considering the same terminology as the one
introduced in the previous section (see Equations (79)-(80)), C. THREE VULNERABLE NODES
In this case, the bipartite topology is composed of two
λ0 0 subgraphs. One subgraph contains one node, and the other
π̃0 = 1 γ =1
µ contains two nodes. The fact that the number of nodes in
λ1 2λ each subgraph is distinct breaks symmetry, and requires us
π̃1 = 2 γ 0 = to keep track of two state variables at four states, where the
µ µ
λ2 1 λ2 γ first state variable characterizes the state of the subgraph
π̃2 = 1 γ = 2 comprised of a single node, and the second state variable
µ µ
corresponds to the state of the other subgraph. State 0 cor-
Then, responds to 0 infected nodes. State (1,0) corresponds to one
isolated node being infected in the subgraph comprised of
π̃0 1 µ2 a single node. State (0,1), in contrast, corresponds to one
π0 = P = = node being infected in the subgraph comprised of two nodes.
π̃j 1 + 2λ λ2 γ µ2 + 2λµ + λ2 γ
∀j µ + µ2 As pointed out above, we need to distinguish states (1,0)
π̃1 2 µλ 2λµ
and (0,1) due to symmetry breaking. Similarly, states (1,1)
π1 = P = = and (0,2) correspond to one node in each subgraph being
π̃j 1 + 2λ λ2 γ µ2 + 2λµ + λ2 γ
∀j µ + µ2 infected, and two nodes in the same subgraph being infected,
respectively. Finally, state 3 corresponds to all nodes being
λ2 γ
π̃2 µ2 λ2 γ infected.
π2 = P = =
π̃j 1+ 2λ
+ λ2 γ µ2 + 2λµ + λ2 γ
∀j µ µ2 1) MULTIPLICATIVE MODEL
The Markov chain corresponding to the multiplicative model
The infection probability is given by ρ = (π1 + 2π2 )/2, is shown in Figure 15(c). The flow balance equations are
λ γ 2 given as follows,
λ
E(I ) µ + µ2
ρ= = . (81) π0 3λ = µ(π0,1 + π1,0 ) (83)
2 λ2 γ
1 + 2λ
µ + µ2
(π1,0 2γ + π0,1 (1 + γ ))λ = 2µ(π0,2 + π1,1 ) (84)
The first three equations above are obtained by considering π0 + π1,0 + π0,1 + π0,2 + π1,1 + π3 = 1
the balance of flow in and flow out between the four layers of
states, i.e., accounting for sets of states 0, {0, (1, 0), (0, 1)}, Symbolically solving the system of equations above is a
and {0, (1, 0), (0, 1), (1, 1), (0, 2)}, respectively. The follow- daunting task, which evidences the benefits of the multiplica-
ing two equations correspond to flow in balancing flow out tive model for which there are closed form expressions for
in states (1,0) and (0,1), respectively. the stationary state probabilities. Nonetheless, with the help
Using the detailed state space introduced in Section V-C, of the Matlab symbolic solver, we are able to express all
we compute the steady state probabilities. Considering the quantities in closed form. Letting µ = 1,
same terminology as the one introduced in the previous
section (see (79)-(80)), π̃i
πi =
Z
λ0 0 5
π̃0 = 1 γ =1
X
µ Z = ζi λi
i=0
λ1 λ
π̃1,0 = 1 γ0 =
µ µ where
λ1 0 λ
π̃0,1 = 2 γ =2 π̃0 14λ2 + (21γ + 19)λ + ζ0
=
µ µ
2 π̃10 30λ3 + (39γ + 43)λ2 + (33γ + 12γ 2 + 9)λ
=
λ λ2 γ
π̃1,1 = 2 γ1 = 2 2 π̃01 12λ3 + (24γ + 14)λ2 + (12γ 2 + 12γ + 18)λ
=
µ µ
2
λ λ 2 π̃02 60λ4 + (138γ + 102)λ3 +
=
π̃0,2 = 1 γ0 = 2 + (170γ +102γ 2 +42)λ2 + (36γ + 70γ 2 + 24γ 3 )λ
µ µ
3
λ λ3 γ 2 π̃11 = 12λ4 + (30γ + 6)λ3 + (10γ + 24γ 2 + 6)λ2 +
π̃3 = 1 γ2 = + (4γ 2 + 6γ 3 )λ
µ µ3
π̃3 = ζ5 λ5 + (84γ + 36)λ4 + (98γ + 108γ 2 + 16)λ3 +
Then,
+ (30γ +88γ 2 +60γ 3 )λ2 +(12γ 2 + 26γ 3 + 12γ 4 )λ
π̃i
πi = , i = 0, 1, 2, 3, 4. (91) and
3λ λ2 (1+2γ ) λ3 γ 2
1+ µ + µ2
+ µ3
ζ5 = 24
It can be readily verified that the solution above satis- ζ4 = 84γ + 108
fies (83)-(90).
ζ3 = 108γ 2 + 266γ + 166
The infection probability of a uniformly selected node is
given by ζ2 = 60γ 3 + 214γ 2 + 273γ + 119
ζ1 = 12γ 4 + 56γ 3 + 110γ 2 + 102γ + 46
2 π01 + π11
1
ρ = (π10 + +π11 + π3 ) + + π02 + π3 ζ0 = 8γ 2 + 15γ + 9
3 3 2
Contrasting the equation above against the solution to the
λ λ2 γ λ2 λ3 γ 2
E(I ) 1 3 µ + 4 µ2 + 2 µ2 + 3 µ3 multiplicative model (see Equation (91)), we note that the
= = . multiplicative model is instrumental to analyze and study
3 3 1 + 3λ + λ2 (1+2γ ) + λ3 γ 2
µ µ 2 µ 3
general topologies.
h i Ñ + 1
B(`) = q`
2 q
FIGURE 17. Two topologies with central hubs: (a) star graph with 11 nodes and (b) star-ring
graph with 8 branches and 25 nodes.
F. NIMFA APPROXIMATION
For the additive model, the analysis that leads to Equa-
tion (73) still holds.
√
−(λ + µ) + (Ñ − 1)γ + 1
ρ(2(Ñ − 1)) = (109)
2(Ñ − 1)γ
where
1 = ((λ + µ) − (Ñ − 1)γ )2 + 4(Ñ − 1)γ λ. (110)
If λ = 0 and (Ñ − 1)γ > µ the solution is given by
1
ρ(2(Ñ − 1); λ = 0) = 1 − . (111)
γ (Ñ − 1)/µ
which is in agreement with [15].
Similarly, under the multiplicative model the NIMFA
FIGURE 19. Star-cliques graph with 8 clusters and 32 nodes.
approximation for bipartite networks is given by
1 Comparing the equations above against those presented in
ρ(2(Ñ − 1)) = −1 . (112)
Appendix D, we note that the same equations hold in the two
1 + µ λγ (Ñ −1)ρ
considered scenarios. The fact that the NIMFA equations for
The equation above is in agreement with (25), noting that all the complete and bipartite graphs are the same reflects the fact
nodes have the same degree equal Ñ − 1, i.e., d̃ = Ñ − 1. that NIMFA, in this setup, is insensitive to the specifics of the
FIGURE 20. Outcome of the simulation experiments in a star network (Figure 17(a)), under the action of the Mirai Botnet in presence of a
strategic attacker. The reference values of the simulator parameters are: 3 = 1500, γ̃ = 5 × 10−5 , 3̃ = 2 × 10−2 and τ = 65. Model parameters
are shown in Table 3.
topology, which are captured only through node degrees. This topologies, in this scenario we exceptionally assume that λ
is due to the fact that NIMFA captures the direct impact of the decays according to (113) under the complete topology rather
neighbors of a node, but not second order effects, e.g., due to than λ = 3/Ñ .
neighbors of neighbors. Figure 16 shows that even though NIMFA does not dis-
Figure 16 shows the NIMFA solution for the bipartite tinguish between the two topologies, in reality there is a gap
graph (dotted lines), and contrasts it against the exact solution between the exact solution of the two. Figure 16(a) shows that
of complete graphs (full line) and bipartite graphs (circles, under the additive model, the infection probability estimated
squares and dots). Figures 16(a) and 16(b) correspond to by NIMFA is typically larger than the infection probabilities
the additive and multiplicative models, respectively. In all of bipartite graphs and complete graphs. In addition, the for-
scenarios, we assume mer is typically larger than the latter. In all cases, the infection
3 probability first decreases and then increases as the number
λ= (113) of vulnerable nodes grows.
2(Ñ − 1)
Figure 16(b) shows that under the multiplicative model
where Ñ − 1 is the number of vulnerable nodes in each the infection probability of a bipartite graph with Ñ − 1
partition of the bipartite graphs. In the complete graphs, Ñ nodes per partition is typically larger than that of a complete
is the number of vulnerable nodes in the network. Note that graph with Ñ nodes in the intermediary regime wherein
to allow for a comparison between the bipartite and complete the system transitions from being dominated by exogenous
FIGURE 21. Outcome of the simulation experiments in a star-ring network with 7 branches (Figure 17(b)), under the action of the Mirai Botnet in
presence of a strategic attacker. The reference values of the simulator parameters are: 3̃ = 2 × 10−2 and τ = 65.
FIGURE 22. Outcome of the simulation experiments in a tree-cluster network (Figure 18), under the action of the Mirai Botnet in
presence of a strategic attacker. The reference values of the simulator parameters are: 3̃ = 2 × 10−2 and τ = 65.
FIGURE 23. Outcome of the simulation experiments in a star-cliques network (Figure 19), under the action of the Mirai Botnet in presence of a
strategic attacker. The reference values of the simulator parameters are: 3̃ = 2 × 10−2 and τ = 65.
In particular, letting 3 = µ = 1, (see Figures 17-19). The topologies are further described in
the sections that follows, and the parameters used in our
ρ(1) > ρ(2) ⇒ 1.5 > γ
simulations are those reported in Table 2. We run simulations
Hence, there is an initial decrease in ρ as N increases from for 10,000 time units, which is long enough to estimate the
1 to 2 if 3 = µ = 1 and 0 < γ < 1.5. As under the network’s steady state. Each configuration was executed three
multiplicative model, there are a number of other scenarios times; in Figures 20-23 we plot the infection probability
under which the considered behavior holds, and an extensive average with a 95% confidence interval as a function of the
analysis of necessary and sufficient conditions is left as sub- number of vulnerable hosts.
ject for future work.
A. STAR AND STAR-RING TOPOLOGIES
APPENDIX G In the star topology, all nodes are connected with the central
SIMULATIONS UNDER DIFFERENT TOPOLOGIES node, as shown in Figure 17(a). In the star-ring topology,
Next, our goal is to investigate the role of network topologies each branch is connected with the central node, as shown
on the spread of epidemics, beyond the complete and bipar- in Figure 17(b). Those type of topologies are widely used in
tite graphs studied so far. To that aim, we use the simula- computer networks, where nodes may be physically intercon-
tor presented in Section VIII. We considered the following nected through a central hub or switch, or logically connected
four topologies: star, star-ring, tree-cluster and star-cliques to a single central point that controls all communications.
[23] Z. Wang, Y. Moreno, S. Boccaletti, and M. Perc, ‘‘Vaccination and [45] J. Zhang and J. M. F. Moura, ‘‘Who is more at risk in heteroge-
epidemics in networked populations—An introduction,’’ Chaos, Solitons nous networks?’’ in Proc. IEEE Int. Conf. Acoust., Speech Signal Pro-
Fractals, vol. 103, pp. 177–183, Oct. 2017. cess. (ICASSP). Calgary, AB, Canada: IEEE, Apr. 2018, pp. 4174–4178.
[24] Z. Bederna and T. Szadeczky, ‘‘Cyber espionage through botnets,’’ Secur. [46] M. T. Gardner, C. Beard, and D. Medhi, ‘‘Using SEIRS epidemic models
J., vol. 33, no. 1, pp. 43–62, Mar. 2020, doi: 10.1057/s41284-019-00194-6. for IoT botnets attacks,’’ in Proc. 13th Int. Conf. Design Reliable Commun.
[25] B. Vignau, R. Khoury, and S. Halle, ‘‘10 years of IoT malware: A feature- Netw. (DRCN), Munich, Germany, Apr. 2017, pp. 1–8.
based taxonomy,’’ in Proc. IEEE 19th Int. Conf. Softw. Qual., Rel. Secur. [47] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein,
Companion (QRS-C). Sofia, Bulgaria: IEEE, Jul. 2019, pp. 458–465. J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi,
[26] L. Böck, E. Vasilomanolakis, J. H. Wolf, and M. Mühlhäuser, M. Kallitsis, D. Kumar, C. Lever, Z. Ma, J. Mason, D. Menscher,
‘‘Autonomously detecting sensors in fully distributed botnets,’’ Comput. C. Seaman, N. Sullivan, K. Thomas, and Y. Zhou, ‘‘Understanding
Secur., vol. 83, pp. 1–13, Jun. 2019, doi: 10.1016/j.cose.2019.01.004. the Mirai botnet,’’ in Proc. 26th USENIX Secur. Symp. USENIX
[27] A. Iqbal, L. J. Gunn, M. Guo, M. Ali Babar, and D. Abbott, ‘‘Game Secur. Vancouver, BC, Canada: USENIX Association, Aug. 2017,
theoretical modelling of Network/Cybersecurity,’’ IEEE Access, vol. 7, pp. 1093–1110. [Online]. Available: https://www.usenix.org/conference/
pp. 154167–154179, 2019, doi: 10.1109/ACCESS.2019.2948356. usenixsecurity17/technical-sessions/presentation/antonakakis
[48] P. Van Mieghem and E. Cator, ‘‘Epidemics in networks with nodal self-
[28] L. Allodi, ‘‘Economic factors of vulnerability trade and exploita-
infection and the epidemic threshold,’’ Phys. Rev. E, Stat. Phys. Plasmas
tion,’’ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS).
Fluids Relat. Interdiscip. Top., vol. 86, no. 1, Jul. 2012, Art. no. 016116,
New York, NY, USA: Association for Computing Machinery, Oct. 2017,
doi: 10.1103/PhysRevE.86.016116.
pp. 1483–1499.
[49] L. Metongnon and R. Sadre, ‘‘Fast and efficient probing of heteroge-
[29] J.-M. Borello and L. Mé, ‘‘Code obfuscation techniques for metamorphic neous IoT networks,’’ Int. J. Netw. Manage., vol. 28, no. 1, Jan. 2018,
viruses,’’ J. Comput. Virol., vol. 4, no. 3, pp. 211–220, Aug. 2008. Art. no. e1997, doi: 10.1002/nem.1997.
[30] P. O’Kane, S. Sezer, and K. McLaughlin, ‘‘Obfuscation: The hidden mal- [50] P. Richter and A. Berger, ‘‘Scanning the scanners: Sensing the Internet
ware,’’ IEEE Secur. Privacy, vol. 9, no. 5, pp. 41–47, Sep. 2011. from a massively distributed network telescope,’’ in Proc. Internet Meas.
[31] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, ‘‘Epidemic spreading Conf. Amsterdam, The Netherlands: Association for Computing Machin-
in real networks: An eigenvalue viewpoint,’’ in Proc. 22nd Int. Symp. ery, Oct. 2019, pp. 144–157.
Reliable Distrib. Syst. Florence, Italy: IEEE, Oct. 2003, pp. 25–34. [51] D. Dey and G. Zhang, ‘‘Impact of network externality in the security
[32] N. Skorin-Kapov, M. Furdek, S. Zsigmond, and L. Wosinska, ‘‘Physical- software market,’’ in Proc. Theory Econ. Inf. Syst., Incline Village,
layer security in evolving optical networks,’’ IEEE Commun. Mag., vol. 54, NV, USA, Jun. 2011, pp. 1–37. [Online]. Available: http://www.teis-
no. 8, pp. 110–117, Aug. 2016. workshop.org/papers/2011/Deb%20Dey%20paperSecMkt-DeyZhang-
[33] N. Paul, S. Gurumurthi, and D. Evans, ‘‘Towards disk-level malware 2011-05-11.pdf
detection,’’ in Proc. 1st Int. Workshop Code Based Softw. Secur. [52] J. Grossklags, N. Christin, and J. Chuang, ‘‘Secure or insure?: A game-
Assessments (CoBaSSA), Pittsburgh, PA, USA, Nov. 2005, pp. 13–16. theoretic analysis of information security games,’’ in Proc. 17th Int. Conf.
[Online]. Available: https://web.eecs.utk.edu/~pauln/papers/disk-level- World Wide Web (WWW). Beijing, China: Association for Computing
malware-cobassa05.pdf Machinery, Apr. 2008, pp. 209–218, doi: 10.1145/1367497.1367526.
[34] B. Wang, X. Li, L. P. de Aguiar, D. S. Menasché, and Z. Shafiq, ‘‘Char- [53] P. Maillé, P. Reichl, and B. Tuffin, ‘‘Interplay between security providers,
acterizing and modeling patching practices of industrial control systems,’’ consumers, and attackers: A weighted congestion game approach,’’ in
ACM Meas. Anal. Comput. Syst., vol. 1, no. 1, Jun. 2017, Art. no. 18. Proc. Int. Conf. Decis. Game Theory for Secur. (GameSec), J. S. Baras,
[35] L. Buttyán and J.-P. Hubaux, Security And Cooperation In Wireless Net- J. Katz, and E. Altman, Eds. College Park, MD, USA: Springer, Nov. 2011,
works: Thwarting Malicious And Selfish Behavior In The Age Of Ubiqui- pp. 67–86, LNCS, vol. 7037, doi: 10.1007/978-3-642-25280-8_8.
tous Computing. Cambridge, U.K.: Cambridge Univ. Press, 2007. [Online]. [54] P. Johansson and R. Forchheimer. (2007). Course Information Networks
Available: http://secowinet.epfl.ch/ Slides, Lecture 3 (MAC2: System Modeling and Assumptions). [Online].
[36] Z. Han, D. Niyato, W. Saad, T. Başar, and A. Hjørungnes, Game Theory Available: https://www.icg.isy.liu.se/courses/tsin01/material/slides/3_
in Wireless and Communication Networks: Theory, Models, and Applica- MAC2.pdf
tions. Cambridge, U.K.: Cambridge Univ. Press, Jan. 2012. [55] Y.-C. Jenq, ‘‘On the stability of slotted ALOHA systems,’’ IEEE Trans.
[37] S. Wang and N. Shroff, ‘‘Security game with non-additive utilities and Commun., vol. COM-28, no. 11, pp. 1936–1939, Nov. 1980.
multiple attacker resources,’’ Proc. ACM Meas. Anal. Comput. Syst., vol. 1, [56] J. Zhang and J. M. F. Moura, ‘‘Diffusion in social networks as SIS epi-
no. 1, pp. 1–32, Jun. 2017, doi: 10.1145/3084450. demics: Beyond full mixing and complete graphs,’’ IEEE J. Sel. Topics
Signal Process., vol. 8, no. 4, pp. 537–551, Apr. 2014.
[38] R. Anderson and T. Moore, ‘‘The economics of information security,’’
[57] P. Van Mieghem, J. Omic, and R. Kooij, ‘‘Virus spread in networks,’’
Science, vol. 314, no. 5799, pp. 610–613, Oct. 2006.
IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 1–14, Feb. 2009.
[39] Z. Durumeric, E. Wustrow, and J. A. Halderman, ‘‘Zmap: Fast [58] Q. Ma, E. Yeh, and J. Huang, ‘‘How bad is selfish caching?’’ in Proc. 20th
Internet-wide scanning and its security applications,’’ in Proc. 22nd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (Mobihoc). Catania, Italy:
USENIX Secur. Symp. Washington, DC, USA: USENIX Associa- Association for Computing Machinery, Jul. 2019, pp. 11–20.
tion, Aug. 2013, pp. 605–619. [Online]. Available: https://www.usenix.
[59] M. X. Goemans, L. Li, V. S. Mirrokni, and M. Thottan, ‘‘Market sharing
org/conference/usenixsecurity13/technical-sessions/paper/durumeric
games applied to content distribution in ad hoc networks,’’ IEEE J. Sel.
[40] A. Quach, Z. Wang, and Z. Qian, ‘‘Investigation of the 2016 Linux TCP Areas Commun., vol. 24, no. 5, pp. 1020–1033, May 2006.
stack vulnerability at scale,’’ ACM Meas. Anal. Comput. Syst., vol. 1, no. 1, [60] A. Haurie and P. Marcotte, ‘‘On the relationship between Nash—Cournot
Jun. 2017, Art. no. 4. and Wardrop equilibria,’’ Networks, vol. 15, no. 3, pp. 295–308, 1985.
[41] M. J. Keeling and K. T. D. Eames, ‘‘Networks and epidemic models,’’ [61] F. P. Kelly, Reversibility and Stochastic Networks. Chichester, U.K.: Wiley,
J. Roy. Soc. Interface, vol. 2, no. 4, pp. 295–307, Sep. 2005, doi: 10.1098/ 1979. [Online]. Available: http://www.statslab.cam.ac.uk/~frank/rsn.html
rsif.2005.0051. [62] M. J. Osborne and A. Rubinstein, A Course in Game Theory. Cambridge,
[42] E. Altman, A. Avritzer, R. El-Azouzi, D. S. Menasche, and L. P. D. Aguiar, MA, USA: MIT Press, 1994.
‘‘Rejuvenation and the spread of epidemics in general topologies,’’ in [63] S. Yi, P. W. Nelson, and A. G. Ulsoy, Time-Delay Systems: Analysis and
Proc. IEEE Int. Symp. Softw. Rel. Eng. Workshops. Naples, Italy: IEEE, Control Using the Lambert W Function. Singapore: World Scientific, 2010.
Nov. 2014, pp. 414–419. [64] M. Rouse. (2019). Cybersecurity Insurance. [Online]. Available:
[43] J. Zhang, J. M. F. Moura, and J. Zhang, ‘‘Contact process with exogenous https://whatis.techtarget.com/definition/cybersecurity-insurance
infection and the scaled SIS process,’’ J. Complex Netw., vol. 5, no. 5, [65] M. Xu and L. Hua, ‘‘Cybersecurity insurance: Modeling and pricing,’’
pp. 712–733, Oct. 2017. North Amer. Actuarial J., vol. 23, no. 2, pp. 220–249, Apr. 2019.
[44] J. Zhang, ‘‘Network process: How topology impacts the dynamics [66] P. Mell, K. Scarfone, and S. Romanosky, ‘‘Common vulnerability scoring
of epidemics and cascading failures,’’ Ph.D. dissertation, Carnegie system,’’ IEEE Secur. Privacy Mag., vol. 4, no. 6, pp. 85–89, Nov. 2006.
Mellon Univ., Pittsburgh, PA, USA, Sep. 2015. [Online]. Available: [67] Z. Durumeric, M. Payer, V. Paxson, J. Kasten, D. Adrian, J. A. Halderman,
https://kilthub.cmu.edu/articles/Network_Process_How_Topology_ M. Bailey, F. Li, N. Weaver, J. Amann, and J. Beekman, ‘‘The matter of
Impacts_the_Dynamics_of_Epidemics_and_Cascading_Failures/ heartbleed,’’ in Proc. Conf. Internet Meas. Conf. (IMC). Vancouver, BC,
7346633/files/13575083.pdf Canada: Association for Computing Machinery, 2014, pp. 475–488.
[68] J. Ren and Y. Xu, ‘‘A compartmental model to explore the interplay DANIEL SADOC MENASCHÉ received the Ph.D.
between virus epidemics and honeynet potency,’’ Appl. Math. Model., degree in computer science from the University of
vol. 59, pp. 86–99, Jul. 2018. Massachusetts, Amherst, in 2011. He is currently
[69] S. Singh and C. R. Myers, ‘‘Outbreak statistics and scaling laws for exter- an Assistant Professor with the Computer Science
nally driven epidemics,’’ Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Department, Federal University of Rio de Janeiro,
Interdiscip. Top., vol. 89, no. 4, Apr. 2014, Art. no. 042108, doi: 10.1103/ Rio de Janeiro, Brazil. His research interests are
PhysRevE.89.042108. in modeling, analysis, security, and performance
[70] S. S. Wilks, ‘‘Moments and distributions of estimates of population
evaluation of computer systems. He was a recipient
parameters from fragmentary samples,’’ Ann. Math. Statist., vol. 3, no. 3,
of the best paper awards at GLOBECOM 2007,
pp. 163–195, Aug. 1932.
[71] M. Darboux, ‘‘Sur la méthode d’approximation de Newton,’’ Nouvelles CoNEXT 2009, INFOCOM 2013, and ICGSE
Annales De Mathématiques, vol. 8, no. 2, pp. 17–27, 1869. [Online]. 2015. He is currently an Affiliated Member of the Brazilian Academy of
Available: http://www.numdam.org/item/NAM_1869_2_8__17_0 Sciences.
[72] C. Enyioha, A. Jadbabaie, V. Preciado, and G. J. Pappas, ‘‘Distributed
resource allocation for epidemic control,’’ 2015, arXiv:1501.01701.
[Online]. Available: http://arxiv.org/abs/1501.01701
[73] L. Landau and E. Lifshitz, Statistical Physics (Course of Theoretical
Physics), vol. 5, 3rd ed. London, U.K.: Butterworth, 1980.
[74] P. Van Mieghem, ‘‘The N-intertwined SIS epidemic network model,’’ Com-
puting, vol. 93, nos. 2–4, pp. 147–169, Dec. 2011, doi: 10.1007/s00607-
011-0155-y.
[75] B. Qu and H. Wang, ‘‘The accuracy of mean-field approximation for
susceptible-infected-susceptible epidemic spreading with heterogeneous
infection rates,’’ in Proc. Int. Workshop Complex Netw. Appl. Milan, Italy:
Springer, Nov. 2016, pp. 499–510.
[76] E. Cator and P. Van Mieghem, ‘‘Nodal infection in Markovian susceptible-
infected-susceptible and susceptible-infected-removed epidemics on net-
works are non-negatively correlated,’’ Phys. Rev. E, Stat. Phys. Plasmas
Fluids Relat. Interdiscip. Top., vol. 89, no. 5, May 2014, Art. no. 052802,
doi: 10.1103/PhysRevE.89.052802.
[77] P. Van Mieghem, ‘‘Approximate formula and bounds for the time-varying CABRAL LIMA received the Ph.D. degree in
susceptible-infected-susceptible prevalence in networks,’’ Phys. Rev. E, computer science from Université Pierre et Marie
Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top., vol. 93, no. 5, Currie (Paris 6), France. He is currently a Full
May 2016, Art. no. 052312, doi: 10.1103/PhysRevE.93.052312. Professor with the Computer Science Department,
[78] P. M. Rodríguez, A. Roldán-Correa, and L. A. Valencia, ‘‘Comment Federal University of Rio de Janeiro, Rio de
on ‘Nodal infection in Markovian susceptible-infected-susceptible and Janeiro, Brazil. His research interests are modeling
susceptible-infected-removed epidemics on networks are non-negatively and analysis of computer systems, optimization,
correlated,’’’ Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdis- and intelligent robotics. He was a recipient of
cip. Top., vol. 98, no. 2, Aug. 2018, Art. no. 026301, doi: 10.1103/ the Best Paper Award at ICONS 2014 and the
PhysRevE.98.026301. Meritorious Award at the International Institute for
[79] E. Cator, P. Donnelly, and P. Van Mieghem, ‘‘Reply to ‘Comment on ‘Nodal Advanced Studies in System Research and Cybernetics, Germany, in 2002.
infection in Markovian susceptible-infected-susceptible and susceptible-
infected-removed epidemics on networks are non-negatively correlated,’’’
Phys. Rev. E, Stat. Phys. Plasmas Fluids Relat. Interdiscip. Top., vol. 98,
no. 2, Aug. 2018, Art. no. 026302, doi: 10.1103/PhysRevE.98.026302.
EITAN ALTMAN (Fellow, IEEE) received the ALBERTO AVRITZER received the B.Sc. degree
B.Sc. degree in electrical engineering, the B.A. from the Technion—Israel Institute of Technology,
degree in physics, and the Ph.D. degree in elec- the M.Sc. degree from the Federal University of
trical engineering from the Technion–Israel Insti- Minas Gerais, Brazil, and the Ph.D. degree from
tute of Technology, Haifa, 1984, 1984, and 1990, the University of California at Los Angeles, all
respectively, and the B.Mus. degree in music com- in computer engineering. He served as a Lead
position from Tel-Aviv University, Israel, in 1990. Performance Engineer for Sonatype, MD, USA,
Since 1990, he has been a Researcher with the and as a Senior Member of the Technical Staff for
National Institute for Research in Computer Sci- the Software Engineering Department, Siemens
ence and Control (INRIA). His articles (245 in Corporate Research, Princeton, NJ, USA. Before
international scientific journals and 423 in international conferences with moving to Siemens Corporate Research, he spent 13 years at AT&T Bell
peer reviews) have had a large impact and have in google scholar more than Laboratories, where he developed tools and techniques for performance
21 300 citations. He is the coauthor of four monographs which includes his testing and analysis. He spent the summer of 1987 at IBM Research, York-
book on the foundations of constrained Markov Decision Processes. His town Heights. He is the Founder and the CEO of eSulabSolutions Inc.,
areas of interests include network engineering games, social networks and the preferred source for methods for scalability assessment of mission-
their control, and the analysis through game theoretical models of network critical systems in the telecom and banking domains. He led the automated
neutrality issues. He received the Best Paper Award from Networking 2006, performance testing and analysis of New York subway public announcement
Globecom 2007, IFIP Wireless Days 2009, and CNSM 2011 (Paris) con- and customer information system (PA/CIS), where he was responsible for
ferences. He has also received the Grand Prix de France Telecom from the the certification of system scalability to support 550 stations. His research
French Academy of Sciences, in 2012, the ISAACS Award from the Society interests are in software engineering, particularly software testing, monitor-
of Dynamic Games for his contribution in game theory, in July 2014, and the ing and rejuvenation of smoothly degrading systems, and metrics to assess
Distinguished Technical Achievement Recognition Award from the IEEE TC software architecture. He has published over 70 articles in journals and
on Big Data conference (TCBD), for his outstanding technical leadership and refereed conference proceedings in those areas. He is a Senior Member of
achievement in stochastic modeling and big data analysis, in December 2017. the ACM. He has presented several tutorials at international conferences,
He has been in the editorial boards of the journals Wireless Networks such as LADC, the IEEE ISSRE, and ACM ICPE.
(WINET), Computer Networks (COMNET), Computer Communications
(Comcom), Journal of Discrete Event Dynamic Systems (JDEDS), SIAM
Journal of Control and Optimization (SICON), Stochastic Models, and Jour-
nal of Economic Dynamics and Control (JEDC). His detailed information can
be found at http://www-sop.inria.fr/members/Eitan.Altman/.