Predators
- 23 September 2002
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
We present a mathematical analysis of a new approach to fight against computer viruses through the use of their predators. Predators are good will mobile codes which, like viruses, travel over computer networks, and replicate and multipy themselves. The only difference is that predators are specifically designed to eliminate the viruses. We model the interaction between predators and viruses by the Lotka-Volterra equations, which are widely used in mathematical biology. Using this model, we derive a method to constrain the number of predators to be as few as possible, while maintaining their power to eliminate viruses.Keywords
This publication has 5 references indexed in Scilit:
- Code Red for the WebScientific American, 2001
- Code Red alertComputer Fraud & Security, 2001
- A Framework for Modelling Trojans and Computer Virus InfectionThe Computer Journal, 1998
- Computers and epidemiologyIEEE Spectrum, 1993
- The IPM model of computer virus managementComputers & Security, 1990