A Comprehensive study of Malware Propagation using Geometric Progression

被引:0
|
作者
Tripathy, Satya Narayan [1 ]
Kapat, Sisira Kumar [1 ]
Patro, Raghunath [2 ]
Das, Susanta Kumar [1 ]
机构
[1] Berhampur Univ, Dept Comp Sci, Berhampur, Orissa, India
[2] Berhampur Univ, Dept Math, Berhampur, Orissa, India
关键词
malware propagation; closure properties; graph view of malware propagation; transitive property; geometric progression;
D O I
10.1109/CINE.2017.31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses to present malware propagation mathematically and it also shows how the population of malware grows in a well defined ultra-large sized network. The propagation refers to entry of a malware to a system as well as copying malware from one device to another in networked environment. We assumed the network to be SNS. We have also discussed the closure properties used by malware while propagation. The properties are quite useful to detect and avoid malware. We have calculated the number of infected system in a geometrically progressed system without defense and modified the equation to calculate the number of infected system for practical network.
引用
收藏
页码:73 / 77
页数:5
相关论文
共 50 条
  • [1] Modeling malware propagation using a carrier compartment
    Hernandez Guillen, J. D.
    Martin del Rey, A.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2018, 56 : 217 - 226
  • [2] A Comprehensive Measurement Study of Domain Generating Malware
    Plohmann, Daniel
    Yakdan, Khaled
    Klatt, Michael
    Bader, Johannes
    Gerhards-Padilla, Elmar
    [J]. PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 263 - 278
  • [3] A study of malware propagation dynamics in wireless sensor network using spatially correlated security model
    Biswal S.R.
    Swain S.K.
    [J]. Recent Advances in Computer Science and Communications, 2021, 14 (05) : 1440 - 1447
  • [4] IoT Malware Analysis Using Federated Learning: A Comprehensive Survey
    Venkatasubramanian, Madumitha
    Lashkari, Arash Habibi
    Hakak, Saqib
    [J]. IEEE ACCESS, 2023, 11 : 5004 - 5018
  • [5] Comprehensive Behaviour of Malware Detection Using the Machine Learning Classifier
    Asha, P.
    Lahari, T.
    Kavya, B.
    [J]. SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 462 - 469
  • [6] A General Study on the Malware Propagation Models in Wireless Sensor Networks
    Farsimadan, Eslam
    Moradi, Leila
    Palmieri, Francesco
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS-ICCSA 2024 WORKSHOPS, PT II, 2024, 14816 : 83 - 99
  • [7] Mathematical Models for Malware Propagation
    Martin del Rey, Angel
    Yang, Lu-Xing
    Karyotis, Vasileios A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [8] Prevention of Malware Propagation in AMI
    Park, Younghee
    Nicol, David M.
    Zhu, Huaiyu
    Lee, Cheol Won
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 474 - 479
  • [9] Analysis of Malware Propagation in Twitter
    Sanzgiri, Ameya
    Hughes, Andrew
    Upadhyaya, Shambhu
    [J]. 2013 IEEE 32ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2013), 2013, : 195 - 204
  • [10] Edit Propagation Using Geometric Relationship Functions
    Guerrero, Paul
    Jeschke, Stefan
    Wimmer, Michael
    Wonka, Peter
    [J]. ACM TRANSACTIONS ON GRAPHICS, 2014, 33 (02):