An Immunization Strategy Based on Propagation Mechanism

With the ubiquity of smart phones, wearable equipment, and wireless sensors, the topologies of networks composed by them change along with time. The immunization strategies in which network immune nodes are chosen by analyzing the static aggregation network topologies have been challenged. The studies about interaction propagations between two pathogens show that the interaction can change propagation threshold and the final epidemic size of each other, which provides a new thinking of immunization method. The eradication or inhibition of the virus can be achieved through the spread of its opposite party. Here, we put forward an immunization strategy whose implementation does not depend on the analysis of network topology. The immunization agents are randomly placed on a few of individuals of network and spread out from these individuals on network in a propagation method.The immunization agents prevent virus infecting their habitat nodes with certain immune success rate. The analysis and simulation of evolution equation of the model show that immune propagation has a significant impact on the spread threshold and steady-state density of virus on a finite size of BA networks. Simulations on some real-world networks also suggest that the immunization strategy is feasible and effective.


Introduction
Every year, there are a lot of new viruses that appeared on the Internet and the Mobile Internet, which threaten not only the safety of networks and hosts, but also the information security of network users, including their accounts, passwords, confidentiality, and privacy.To inhibit the spread of viruses, a variety of immune strategies are put forward, such as target immunization, annular immunization, acquaintances immunization, local immunization, and first delete edge immunization [1][2][3][4][5].An immunization strategy is often defined as the choice of a set of individuals who neither catch nor transmit the disease.The choice method is mainly based on the attributes of nodes in the network topology.However, it is not always effective and feasible to access and calculate properties of each node in order to pick out immune nodes in a large network.Wireless connection devices are ubiquitous in modern society, such as smart phones, wearable equipment, and wireless sensors.Various online social networks and services spring up on the Internet.
The edges between nodes change along with time on these networks [6][7][8].There is often a greater difference between the actual property values of network nodes and the topology attributes or dynamic attributes of network nodes computed on the basis of static aggregation networks.
At the beginning of the 21st century, the worm Red Code had almost paralyzed the whole Internet by flooding a lot of useless packets [9].Thereafter, there appeared a new worm called Green Code and its goal is to find and remove the worm Red Code.The worm Green Code also spread by means of flooding.Its harm is even more than its benefits, but it gives us a new idea about the inhibition method of the virus spread.Immunization agents and countermeasures [10,11] can be spread just like viruses do.Immunization agent's role is to inhibit the spread of virus, which can be seen as a competitive spread between good viruses and bad viruses.
There are growing researches about dynamic interactions of multiple epidemics in recent years.The method of generating function was used by Newman et al. to study the competing epidemics of two kinds of virus agents, which promote or inhibit the spread of each other [12][13][14].Bond percolation theory and the generating function method can exactly demonstrate the various attributes of the network structure and analyze the final size of the epidemic outbreak and epidemic threshold of virus.But they ignore the time evolution process during the outbreak.Another mathematical modeling method for theoretical analysis of infectious disease spread is the compartment model.It describes the time evolution of the epidemic and yet simplifies propagation model parameters.The studies of dynamic interaction between multiple pathogens spreading on overlay networks need to consider more factors such as joint degree distribution of overlapping nodes.Reference [15] adopts the bond percolation theory and [16] uses compartment method to model and analyze dynamic interaction of two pathogens on overlay networks.These models and analyses of their evolution equations are often more complex and difficult to be handled.Moreover, the interaction of two pathogens is not always symmetrical.The interaction model from [17] consists of two propagation particle species A and B, in which A induces B while B suppresses A. For another thing, the spread of infectious diseases tends to cause increasing awareness of individual about disease and changes of individual behavior [18][19][20][21].The changes of individual consciousness and behavior make healthy people reduce their susceptibility about disease to avoid being infected and infected persons reduce their infectivity by self-imposed quarantine and practice of better hygiene, which shorten duration of infection and extend duration of immunity.In computer networks, the behavioral responses to computer virus from users are often shown as the alteration of user operation behaviors, for example, more willing to update the antivirus software and accept patches, avoiding clicking on strange suspicious links, and opening the strange spam.
The immunization strategies whose implementations depend on the analysis of network global topology structure are difficult to quickly implement on the real-world networks.Here, we put forward a simple immunization strategy on the basis of interaction propagation of virus and immunization agent.The vaccine against a given virus or worm, namely, immunization agent, propagates on networks analogous to the spread behavior of virus.If an individual is infected by immunization agent and successfully obtain immunization, it will be free from infection by the virus, which curbs the spread of the virus, just like the inhibitory effect of the worm Green Code on the worm Red Code.

Model
When the virus is epidemic on the network, the immunization agent is placed on a random chosen node and begins to propagate on network, whose works are similar to that of the worm program in the computer network.The transmission way of immunization agent is designed for SIS (susceptibleinfected-susceptible) propagation mode [22].Based on the version of the SIS model, each individual belongs to either a susceptible (S) or infected (I) state at any given time.When a  (1)    (2)   (2)    (1)    (1)    (2)   (2)   (1 − ) (1)   (S, S) (S, I) (I, S) (I, I) susceptible individual and an infected individual interact, the former may be infected by the latter at some infection rate.The immunization agent is transmitted in SIS mode rather than SI mode.First, the example of worm Green Code shows that its cost brought by excessive propagation (flood propagation mode) and complex function far exceeds the resulting revenue.Second, immunization is not permanent in many cases of reality.On a host, immunization programs are likely to be treated as malicious programs by a security software or conflict with some application software and therefore be shut down or even removed.Immune program itself may be out of order and unable to run.The host systems possibly collapse and are reinstalled.These make the host turn back to the susceptible state from the immune state.Finally, SI transmission mode is a special case of SIS transmission mode where the recovery rate is zero.
Figure 1 shows the state transition diagram of the immune model.Due to the influence of two kinds of spread agents, there are two spread state values on each node of the system at the same time.The spread states of any node  are denoted by ( (1) ,  (2) )  , where the symbols  (1) and  (2) signify the spread state of virus and immunization agent, respectively.
Immunization agents have two functions, namely, immune function and spread function.Immune function is that the immunization agents prevent successfully the transmission of the virus to the immunized nodes from their neighbors with probability  at each time step.Spread function of immunization agent is described as follows.At each time step, each infected node by immunization agent propagates immunization agent in its neighbor nodes in probability  (2) and recover itself into a susceptible state in probability  (2) .In fact, the spreading mode of immunization agents is the pure SIS spreading mode.
As shown in Figure 1, each node infected by the virus infects its neighbor nodes with transmission rates  (1) in each time step, but the infectious success rate for a neighbor node infected by immunization agent is only 1 − .If the node  is the neighbor of node  and node  has been infected by virus, the node  has the following three situations in the spread of the virus.
(1) If the node  is not infected by virus and immunization agent, the probability that the node  is infected by virus from its neighbor node  is  (1) .
(2) If the node  is not infected by virus but is infected by immunization agent, the probability that the node  is infected by virus from its neighbor node  is (1 − ) (1) .
If the node  is a neighbor node of node , the node  has the following two situations in the spread of immunization agent.Consider the following: ( * , S)  + ( * , I)   (2)   → ( * , I)  + ( * , * )  , ( * , I)   (2)   → ( * , S)  . ( The expression  (1)   () and  (2)   () denotes the infectious density of virus and immunization agents on nodes with degree  of network at time , respectively.Then, 1 −  (2)   () is the probability that a node with degree  is not infected by immunization agent at time .The expression (1 − ) (2)   () is the probability that a node with degree  is infected by immunization agent and immunized failure, which means that a node is infected by immunization agent that is unsuccessful to prevent invasion from virus.The combination of the above two probabilities equals 1− (2)   (), which signifies the probability that a node with degree  of network is not immunized.Therefore, the evolution equation of virus propagation is obtained as  (1)   ()  =  (1)  [1 −  (1)   ()] × [1 −  (2)   ()]  ( (1) ()) −  (1)  (1)   () . ( The evolution equation of immunization agents spread is where ( (2)

Threshold Analysis on the BA Networks
When system reaches steady state, the left side of (4) equals zero.We can obtain the infectious density of immunization agents on nodes with degree  of network: The symbol  2 =  2 / 2 is the effective transmission rate of immune spread.Parameter  2 is the abbreviation of the symbol ( (2) ()) of ( 4), which is a function about  2 .
In BA network with  nodes and  new edges of each node, its parameters can be obtained as follows [23].The average degree of the network is 2, minimum degree is , maximum degree   equals  1/2 , and node degree probability distribution () equals 2 2  −3 /(1 −  −1 ).Substituting the above parameters and ( 7) into (6), we obtain When the spread of virus reaches steady state, we obtain by ( 3) The symbol  1 =  1 / 1 is the effective transmission rate of virus spread.Parameter  1 is the abbreviation of the symbol ( (1) ()) of ( 3), which is a function about  1 and  2 .
Substituting the above parameters of finite size BA network and ( 9) into (5), we obtain We define an auxiliary function as follows: Because the function ( 1 ) is convex,  ( 1 ) < 0, (0) = 0, and (1) < 0, the sufficient and necessary condition that the equation ( 1 ) = 0 has nonzero solutions in the interval 0 <  1 < 1 is   (0) > 0. Consider the following: Under the influence of immune transmission, the virus spread threshold is where the symbol   SIS is the spread threshold of pure SIS transmission method in the finite size of BA networks.It satisfies As shown in Figure 2, the virus spread threshold increases rapidly with the increase of immune success rate  and effective transmission rate  2 on the finite size of BA network.The greater the immune success rate  is, the greater the increasing rate of virus spread threshold   is.The propagation of virus can be completely ended by choosing the appropriate immune effective transmission rate  2 and guaranteeing certain immune success rate  on the finite size of BA networks.   (infected by virus as a function of virus effective transmission rate  1 , for the different effective transmission rate  2 of immune agent, where  = 1.TV prefix figure legend item is theory analytical values calculated according to (19), and SV prefix figure legend item is corresponding simulation values.Network node number  = 2000, new edge number from each node m = 5, the recovery rate of the virus spread  (1) = 0.001, and the recovery rate of the immune agent spread  (2) = 0.01.
When the immune success rate satisfies  = 1 in particular, we obtain   1 =  2 by ( 8) and (13).Under this condition, threshold value of the virus spread   equal to max{  SIS ,  2 } and ( 9) is written as Substituting parameters of the finite size of BA network and ( 16) into (5) we obtain The infectious density of the virus spread at steady state is  Substituting parameters of the finite size of BA network and ( 16) into (18) we obtain where  =  1  1 +  2  2 .The parameters  1 and  2 can be obtained by ( 17) and (8), respectively.For a finite size BA of network with 2000 nodes and 5 new edges of each node, its propagation threshold for pure SIS method is   SIS ≈ 0.0526.Figure 3 displays that the virus propagation threshold equals the immune effective transmission rate  2 , where  2 >   SIS and the infectious density of virus drops off with the augment of the immune effective transmission rate  2 .The above two points demonstrate that the immune effect is remarkable under the condition of immune success rate  = 1 on finite size of BA networks.

Empirical Tests on Real Networks
The first real-world network in our research is a snapshot of the Gnutella peer-to-peer file sharing network in August 6, 2002 [24,25].Nodes represent hosts in the Gnutella network topology and edges represent connections between the Gnutella hosts.
Enron email communication network covers all the email communication within a dataset of around half million emails [26,27].This data was originally made public and posted to the web by the Federal Energy Regulatory Commission during its investigation.Nodes of the network are email addresses and if an address  sent at least one email to address , the graph contains an undirected edge from  to .The non-Enron email addresses act as sinks and sources in the network as their communication with the Enron email addresses is observed.
The graph of routers comprising the Internet can be organized into subgraphs called autonomous systems (AS).Each AS exchanges traffic flows with some neighbors (peers).We can construct a communication network of who-talksto-whom from the BGP (Border Gateway Protocol) logs.The data was collected from the University of Oregon Route Views Project-Online data and reports [28].The dataset contains 733 daily instances which span an interval of 785 days from November 8, 1997, to January 2, 2000.
Before doing these empirical tests, we had processed the three networks in advance.The largest connected subgraphs of these networks replace their networks, respectively.The p2p-Gnutella06 network and AS network are changed to undirected network in this way that all of one-way edges of network are stored again according to their reverse direction, respectively.
In the first empirical test, we randomly select one percent of network nodes as original infected nodes of virus and a node as the original infected node of immune agent.Figure 4 displays that the node density infected by the virus interacting with immune agents is smaller than one infected by the virus in pure SIS propagation method and decreases significantly with the increase of effective transmission rate of immunization agents  2 for different effective transmission rates of virus  1 in all three networks.
In the second empirical test, we randomly select a node as the virus input source.When the node density infected by virus is more than one percent, immunization agent begins to spread from a randomly selected node and this moment is marked as zero moment, namely,  = 0.As shown in Figure 5, the node density infected by the virus interacting with immunization agents first runs high but falls back quickly because of the influence of the immunization agent transmission.

Conclusion
Threshold analysis of the model is done on BA networks.Immune transmission has a significant impact on the virus spread threshold and the virus infections density in the steady state.The virus propagation threshold can be changed by adjusting the immune effective transmission rate.When the virus effective transmission rate is less than its propagation threshold, the virus is eventually eradicated from the network.
In many real situations, the network topology is difficult to obtain globally or the network size is too big to be handled.Dispensing with the analyses of network topological properties, we propose the immune strategy based on the transmission mode.The immune strategy is fast, feasible, and effective.We only need to measure the effective transmission rate of virus and the immune success rate of immune agent for actual implementation of the model, which can be done in the local area of networks.According to the measured parameters, immune effective transmission rate can be set to inhibit the spread of the virus.
In realistic setting, many networks are not static.Both its edges and nodes are not continuously active, which has a strong effect on spreading processes.It may be very interesting and significant to analyze the competing dynamics on a complex system with temporal structure.This will also be our future research interest.

Figure 1 :
Figure 1: State transition diagram of the immune model.

Figure 3 :
Figure3: The node density (1) infected by virus as a function of virus effective transmission rate  1 , for the different effective transmission rate  2 of immune agent, where  = 1.TV prefix figure legend item is theory analytical values calculated according to(19), and SV prefix figure legend item is corresponding simulation values.Network node number  = 2000, new edge number from each node m = 5, the recovery rate of the virus spread (1) = 0.001, and the recovery rate of the immune agent spread (2) = 0.01.

Figure 4 :
Figure4: The node density (1) infected by virus as a function of virus effective transmission rate  1 , for the different effective transmission rate  2 of immune agent on different real-world networks, respectively.(a) p2p-Gnutella06 network, (b) Email-Enron network, and (c) AS network.The recovery rate of the virus spread (1) = 0.25 and the recovery rate of the immune agent spread (2) = 0.5.

Figure 5 :
Figure 5: The fraction of infected nodes of the virus spread, immunization agent spread, and pure SIS spread as functions of time , respectively, on different real-world networks.(a) p2p-Gnutella06 network and (b) AS network.Their effective transmission rates are all 0.4.The recovery rate of the virus spread  (1) = 0.25, the recovery rate of the immunization agent spread  (2) = 0.5.
Figure 2: The virus spread threshold   as a function of the immune success rate  on the finite size BA networks, for the different effective transmission rate  2 of immunization agent.Network node number  = 2000 and edge number from each new node  = 5.