4,656 research outputs found

    Parasite spill-back from domestic hosts may induce an Allee effect in wildlife hosts

    Get PDF
    The exchange of native pathogens between wild and domesticated animals can lead to novel disease dynamics. A simple model reveals that the spill-back of native parasites\ud from domestic to wild hosts may cause a demographic Allee effect. Because parasite spill-over and spill-back decouples the abundance of parasite infectious stages from the abundance of the wild host population, parasitism and mortality of the wild host population increases non-linearly as host abundance decreases. Analogous to the effects of satiation of generalist predators, parasite spill-back can produce an unstable equilibrium in the abundance of the host population above which the host population persists and below which it is at risk of extirpation. These effects are likely to be most pronounced in systems where the parasite has a high efficiency of transmission from domestic to wild host populations due to prolonged sympatry, disease vectors, or proximity of domesticated populations to wildlife migratory corridors

    The dynamics of Ascaris lumbricoides infections

    Get PDF
    The Anderson–May model of human parasite infections and specifically that for the intestinal worm Ascaris lumbricoides is reconsidered, with a view to deriving the observed characteristic negative binomial distribution which is frequently found in human communities. The means to obtaining this result lies in reformulating the continuous Anderson–May model as a stochastic process involving two essential populations, the density of mature worms in the gut, and the density of mature eggs in the environment. The resulting partial differential equation for the generating function of the joint probability distribution of eggs and worms can be partially solved in the appropriate limit where the worm lifetime is much greater than that of the mature eggs in the environment. Allowing for a mean field nonlinearity, and for egg immigration from neighbouring communities, a negative binomial worm distribution can be predicted, whose parameters are determined by those in the continuous Anderson–May model; this result assumes no variability in predisposition to the infection

    Modeling, analysis and defense strategies against Internet attacks.

    Get PDF
    Third, we have analyzed the tradeoff between delay caused by filtering of worms at routers, and the delay due to worms' excessive amount of network traffic. We have used the optimal control problem, to determine the appropriate tradeoffs between these two delays for a given rate of a worm spreading. Using our technique we can minimize the overall network delay by finding the number of routers that should perform filtering and the time at which they should start the filtering process.Many early Internet protocols were designed without a fundamentally secure infrastructure and hence vulnerable to attacks such as denial of service (DoS) attacks and worms. DoS attacks attempt to consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Network forensics is an emerging area wherein the source or the cause of the attacker is determined using IDS tools. The problem of finding the source(s) of attack(s) is called the "trace back problem". Lately, Internet worms have become a major problem for the security of computer networks, causing considerable amount of resources and time to be spent recovering from the disruption of systems. In addition to breaking down victims, these worms create large amounts of unnecessary network data traffic that results in network congestion, thereby affecting the entire network.In this dissertation, first we solve the trace back problem more efficiently in terms of the number of routers needed to complete the track back. We provide an efficient algorithm to decompose a network into connected components and construct a terminal network. We show that for a terminal network with n routers, the trace back can be completed in O(log n) steps.Second, we apply two classical epidemic SIS and SIR models to study the spread of Internet Worm. The analytical models that we provide are useful in determining the rate of spread and time required to infect a majority of the nodes in the network. Our simulation results on large Internet like topologies show that in a fairly small amount of time, 80% of the network nodes is infected

    Deciphering infant mortality. Part 1: empirical evidence

    Full text link
    This paper is not (or at least not only) about human infant mortality. In line with reliability theory, "infant" will refer here to the time interval following birth during which the mortality (or failure) rate decreases. This definition provides a systems science perspective in which birth constitutes a sudden transition which falls within the field of application of the "Transient Shock" (TS) conjecture put forward in Richmond et al. (2016c). This conjecture provides predictions about the timing and shape of the death rate peak. (i) It says that there will be a death rate spike whenever external conditions change abruptly and drastically. (ii) It predicts that after a steep rising there will be a much longer hyperbolic relaxation process. These predictions can be tested by considering living organisms for which birth is a multi-step process. Thus, for fish there are three states: egg, yolk-sac phase, young adult. The TS conjecture predicts a mortality spike at the end of the yolk-sac phase, and this timing is indeed confirmed by observation. Secondly, the hyperbolic nature of the relaxation process can be tested using high accuracy Swiss statistics which give postnatal death rates from one hour after birth up to the age of 10 years. It turns out that since the 19th century despite a great overall reduction in infant mortality, the shape of the age-specific death rate has remained basically unchanged. This hyperbolic pattern is not specific to humans. It can also be found in small primates as recorded in the archives of zoological gardens. Our ultimate objective is to set up a chain of cases which starts from simple systems and then moves up step by step to more complex organisms. The cases discussed here can be seen as initial landmarks.Comment: 46 pages, 14 figures, 4 table

    Graph-theoretic Approach To Modeling Propagation And Control Of Network Worms

    Get PDF
    In today\u27s network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, and (5) Simulation of the developed models and strategies on large, scale-free graphs representing real-world communication networks. The proposed pair-approximation model uses the information about the network structure--order, size, degree distribution, and transitivity. The empirical study of propagation on large scale-free graphs is in agreement with the theoretical analysis of the proposed pair-approximation model. We, then, describe a natural generalization of the classical cops-and-robbers game--a combinatorial model of worm propagation and control. With the help of this game on graphs, we show that the problem of containing the worm is NP-hard. Six novel near-optimal control strategies are devised: combination of static and dynamic immunization, reactive dynamic and invariant dynamic immunization, soft quarantining, predictive traffic-blocking, and contact-tracing. The analysis of the predictive dynamic traffic-blocking, employing only local information, shows that the worm can be contained so that 40\% of the network nodes are not affected. Finally, we develop the Detection via Distributed Blackholes architecture and algorithm which reflect the propagation strategy used by the worm and the salient properties of the network. Our distributed detection algorithm can detect the worm scanning activity when only 1.5% of the network has been affected by the propagation. The proposed models and algorithms are analyzed with an individual-based simulation of worm propagation on realistic scale-free topologies

    Parasitic nematodes in humans : exploring the host-parasite dynamic through historical, biological, and public health evaluations of infection.

    Get PDF
    This thesis investigated infection dynamics of parasitic nematodes at both the population and individual levels by exploring evolutionary and historical aspects of infection as well as how host-parasite interactions influence virulence. In particular, this thesis sought to answer questions of how host populations have influenced the spread of infection and how transmission determines infection virulence, with a final goal of understanding how eradication programs for parasites can be developed or improved with this knowledge. The host-parasite dynamic was explored throughout history, with particular focus on the ways host populations have shaped infection distribution in present, historic, and prehistoric times. Then, data for each nematode was systemically collected and presented for a comprehensive analysis of virulence and transmission mode. It was discovered that microparasitic principles of virulence can be applied limitedly to predict virulence of macroparasitic nematodes, and the relative virulence of each nematode can be explained partially by transmission mode

    Complex Ecological Dynamics and Eradicability of the Vector Borne Macroparasitic Disease, Lymphatic Filariasis

    Get PDF
    The current global efforts to control the morbidity and mortality caused by infectious diseases affecting developing countries--such as HIV/AIDS, polio, tuberculosis, malaria and the Neglected Tropical Diseases (NTDs)-have led to an increasing focus on the biological controllability or eradicability of disease transmission by management action. Here, we use an age-structured dynamical model of lymphatic filariasis transmission to show how a quantitative understanding of the dynamic processes underlying infection persistence and extinction is key to evaluating the eradicability of this macroparasitic disease.We investigated the persistence and extinction dynamics of lymphatic filariasis by undertaking a numerical equilibrium analysis of a deterministic model of parasite transmission, based on varying values of the initial L3 larval density in the system. The results highlighted the likely occurrence of complex dynamics in parasite transmission with three major outcomes for the eradicability of filariasis. First, both vector biting and worm breakpoint thresholds are shown to be complex dynamic entities with values dependent on the nature and magnitude of vector-and host specific density-dependent processes and the degree of host infection aggregation prevailing in endemic communities. Second, these thresholds as well as the potential size of the attractor domains and hence system resilience are strongly dependent on peculiarities of infection dynamics in different vector species. Finally, the existence of multiple stable states indicates the presence of hysteresis nonlinearity in the filariasis system dynamics in which infection thresholds for infection invasion are lower but occur at higher biting rates than do the corresponding thresholds for parasite elimination.The variable dynamic nature of thresholds and parasite system resilience reflecting both initial conditions and vector species-infection specificities, and the existence of hysteresis loop phenomenon, suggests that eradication of filariasis may require taking a more flexible and locally relevant approach to designing elimination programmes compared to the current command and control approach advocated by the global programme

    Stochastic propagation modeling and early detection of malicious mobile code

    Get PDF
    Epidemic models are commonly used to model the propagation of malicious mobile code like a computer virus or a worm. In this dissertation, we introduce stochastic techniques to describe the propagation behavior of malicious mobile code. We propose a stochastic infection-immunization (INIM) model based on the standard Susceptible-Infected-Removed (SIR) epidemic model, and we get an explicit solution of this model using probability generating function (pgf.). Our experiments simulate the propagation of malicious mobile code with immunization. The simulation results match the theoretical results of the model, which indicates that it is reliable to use INIM model to predict the propagation of malicious mobile code at the early infection stage when immunization factor is considered. In this dissertation, we also propose a control system that could automatically detect and mitigate the propagation of malicious mobile programs at the early infection stage. The detection method is based on the observation that a worm always opens as many connections as possible in order to propagate as fast as possible. To develop the detection algorithm, we extend the traditional statistical process control technique by adding a sliding window. We do the experiment to demonstrate the training process and testing process of a control system using both real and simulation data set. The experiment results show that the control system detects the propagation of malicious mobile code with zero false negative rate and less than 6% false positive rate. Moreover, we introduce risk analysis using Sequential Probability Ratio Test (SPRT) to limit the false positive rate. Examples of risk control using SPTR are presented. Furthermore, we analyze the network behavior using the propagation models we developed to evaluate the effect of the control system in a network environment. The theoretical analysis of the model shows that the propagation of malicious program is reduced when hosts in a network applied the control system. To verify the theoretical result, we also develop the experiment to simulate the propagation process in a network. The experiment results match the mathematical results
    • …
    corecore