Beyond Herd Immunity Against Strategic Attackers
| dc.contributor.author | Vilc Rufino | |
| dc.contributor.author | Daniel Sadoc Menasché | |
| dc.contributor.author | Cabral Lima | |
| dc.contributor.author | Ítalo Cunha | |
| dc.contributor.author | Leandro Pfleger de Aguiar | |
| dc.contributor.author | Eitan Altman | |
| dc.contributor.author | Rachid El-Azouzi | |
| dc.contributor.author | Francesco De Pellegrini | |
| dc.contributor.author | Alberto Avritzer | |
| dc.contributor.author | Michael Grottke | |
| dc.date.accessioned | 2025-08-22T10:12:02Z | |
| dc.date.available | 2025-08-22T10:12:02Z | |
| dc.date.issued | 2020-01-01 | |
| dc.description.abstract | Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction of the population of devices is immune against a virus or malware. The few individuals who have not taken countermeasures against the threat are assumed to have very low chances of infection, as they are indirectly protected by the rest of the devices in the network. Although very fundamental, herd immunity does not account for strategic attackers scanning the network for vulnerable nodes. In face of such attackers, nodes who linger vulnerable in the network become easy targets, compromising cybersecurity. In this paper, we propose an analytical model which allows us to capture the impact of countermeasures against attackers when both endogenous as well as exogenous infections coexist. Using the proposed model, we show that a diverse set of potential attacks produces non-trivial equilibria, some of which go counter to herd immunity; e.g., our model suggests that nodes should adopt countermeasures even when the remainder of the nodes has already decided to do so. | |
| dc.identifier.doi | 10.1109/access.2017.doi | |
| dc.identifier.uri | https://ieeexplore.ieee.org/document/9049398 | |
| dc.identifier.uri | https://nur.nu.edu.kz/handle/123456789/9830 | |
| dc.language.iso | en | |
| dc.source | (2020) | en |
| dc.subject | Herd immunity | en |
| dc.subject | Immunity | en |
| dc.subject | Business | en |
| dc.subject | Herd | en |
| dc.subject | Computer security | en |
| dc.subject | Computer science | en |
| dc.subject | Biology | en |
| dc.subject | Virology | en |
| dc.subject | Immunology | en |
| dc.subject | Immune system | en |
| dc.subject | Ecology | en |
| dc.subject | Vaccination | en |
| dc.subject | type of access: open access | en |
| dc.title | Beyond Herd Immunity Against Strategic Attackers | en |
| dc.type | article | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Beyond_Herd_Immunity_Against_Strategic_Attackers.pdf
- Size:
- 3.77 MB
- Format:
- Adobe Portable Document Format