A contribution to this paper is the simplicity of
the approximated and analytical solution. We require
only the three parameters of a quadratic
function
12
,,cf fto model a generic virus infection
and its remedy.
Our next step is to conduct experiments and/or
investigations to determine these parameters that are
specific to the scenario. To do that, we would also
need to consider the number of platforms, the
number of computers, the network topology, etc.
ACKNOWLEDGEMENTS
I would like to thank Prof. Suruz Miah of Bradley
University and Dr. Kevin Ng of Defence R&D
Canada – Centre for Operational Research and
Analysis (DRDC CORA) for discussions. The
content of this paper comes from an internal
document of DRDC.
REFERENCES
Bailey, Norman T. J., 1975, The mathematical theory of
infectious diseases and its applications, Charles Griffin
& Company LTD, 2nd edition, pp. 39-42.
Blake A., The first Trump-Clinton presidential debate
transcript, the Washington Post 26 Sep 2016 (online),
https://www.washingtonpost.com/news/the-fix/wp/
2016/09/26/the-first-trump-clinton-presidential-deba
te-transcript-annotated/ (Access date: 27 Oct. 2016)
Bondy J. A. and Marty U. S. R., 2008, Graph theory.
Springer, p. 4.
Chakrabarti D., Wang Y., Wang C., Leskovec J., and
Faloutsos C., 2008. Epidemic thresholds in real
networks, Association for Computing Machinery
Transaction Information System Security. 10:4,pp.1–26.
Ganesh A., Massoulie L., and Towsley D., 2005, The
effect of network topology on the spread of epidemics,
Proceedings of IEEE Infocom.
Gradshteyn, I. S., and I. M. Ryzhik, 1979. Tables of
integrals, series, and products, 6th ed. Academic Press,
San Diego, CA. 6th Ed., p. 1100.
Greenberg, A., 2016a. Hackers remotely kill a Jeep on the
highway – with me in it, https://www.wired.com/2015/
07/hackers-remotely-kill-jeep-highway/ (Access date:
26 Oct. 2016).
Greenberg, A., 2016b. The Jeep hackers are back to prove
car hacking can get much worse, Andy Greenberg,
https://www.wired.com/2016/08/jeep-hackers-return-
high-speed-steering-acceleration-hacks/ (Access date:
26 Oct. 2016).
Greenberg, A., 2016c. Hackers can disable a sniper rifle or
change its target, Andy Greenberg, https://www.
wired.com/2015/07/hackers-can-disable-sniper-rifleor-
change-target/ (Access date: 26 Oct 2016).
Hethcote, H., 2000. The mathematics of infectious
diseases, SIAM Review, Vol. 42, No. 4, pp. 599-653.
Higham, N. J. etal, 2015. The Princeton companion to
applied mathematics, Princeton University Press, pp.
151-154.
Horton J and Seberry J, 1997, Computer Viruses: an
Introduction, Proceedings of the Twentieth
Australasian Computer Science Conference eb. 1997, -
Aust. Computer Science Communications, Vol. 19,
No. 1, pp. 122-131.
Keeling Matt J. and Rohani, P., 2007. Modeling Infectious
Diseases in Humans and Animals, Princeton
University Press, p. 4.
Kesan J, and Hayes C., 2012. Mitigative counterstriking:
self-defense and deterrence in cyberspace, Harvard
Journal of Law and Technology (forthcoming,
available at SSRN: http://ssrn.com/abstract=1805163).
Krishnan G. S. S. et al., 2013. Computational intelligence,
cybersecurity and computational models: proceedings
of ICC3, Springer.
Morris-King, J. and Cam, H., 2015. Ecology-inspired
cyber risk model for propagation of vulnerability
exploitation in tactical edge, Proceedings of the IEEE
2015 Military Communications Conference
MILCOM'2015, pp. 336-341.
Sanger, D., 2017. A Eureka moment for two times
reporters: North Korea’s missile launches were failing
too often, the New York Times, Mar 06 2017.
Smith? R., 2008a. Modelling disease ecology with
mathematics, American Institute of Mathematical
Sciences, p 1.
Smith? R., 2008b. Modelling disease ecology with
mathematics, American Institute of Mathematical
Sciences, p 1.
Smith? R., 2008c. Modelling disease ecology with
mathematics, American Institute of Mathematical
Sciences, 2008, pp. 14-16.
Smith? R., 2008d. Modelling disease ecology with
mathematics, American Institute of Mathematical
Sciences, 2008, pp. 25-30.
Xu S., Lu W., and Li H., 2015. A stochastic model of
active cyber defense dynamics, Internet Mathematics
Vol. 11, pp. 28–75.
NATO fact sheet (online), 2016. http://www.nato.int/
nato_static_fl2014/assets/pdf/pdf_2016_07/20160627
_1607-factsheet-cyber-defence-eng.pdf (Access date:
26 Oct 2016)
Net losses: estimating the global cost of cybercrime,
Centre for strategic and international studies, Jun 2014
(online), http://www.mcafee.com/ca/resources/reports/
rp-economic-impact-cybercrime2.pdf (Access date: 27
Oct. 2016).
Norton Report (online), 2013. http://www.symantec.com/
region/reg_eu/resources/virus_cost.html (Access date:
26 Oct. 2016).
The global risks report 2016, 11th edition, World
Economic Forum (online), http://reports.weforum.org/
global-risks-2016/executive-summary/ (Access date:
26 Oct. 2016).