Open Access Open Access  Restricted Access Subscription or Fee Access

Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique

M. Sudha, Neelima Jhavar

Abstract


Malware is wide in frameworks, and locations a vital risk to network security. Notwithstanding, we have amazingly confined consciousness of malware behavior in structures to date. In this paper, we investigate at how malware spreads in structures from a general perspective. We outline the issue, and set up a concentrated two layer scourge model for malware spread starting with one structure then onto the accompanying framework. In connection of the proposed model, our examination demonstrates that the spread of a given malware takes after exponential disseminating, power law dissipating with a short exponential tail, and power law course at its basic, early, late and last stages, autonomously Broad examinations have been performed through two genuine general scale malware data sets, and the results request our hypothetical exposures.”


Keywords


Malware, Malware Propagation, Exponential Distribution, Power Law, Two Layer Epidemic Model.

Full Text:

PDF

References


. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2(4): 10-29 the Society of Digital Information and Wireless Communications, 2013 (ISSN: 2305-0012).

. (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 12, 2011.

. 2015 IJSRSET | Volume 1 | Issue 2 | Print ISSN: 2395-1990 | Online ISSN: 2394-4099

. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015, Shui Yu, Senior Member, IEEE, Guofei Gu, Member, IEEE, Ahmed Barnawi, Member, IEEE, Song Guo, Senior Member, IEEE, and Ivan Stojmenovic, Fellow, IEEE

. Detecting Internet Worms at Early Stage Shigang Chen Sanjay Ranka

. L. Wu, R. Ping, L. Ke, and D. Hai-xin, "Conduct Based Malware Analysis and Detection," in Complexity and Data Mining (IWCDM), 2011 First International Workshop on, 2011, pp. 39–42.

. R. Passage and W. H. Allen, "Malware Shall Greatly Increase...," Secur. Priv. IEEE, vol. 7, no. 6, pp. 69–71, 2009.

. J. R. Crandall, R. Ensafi, S. Forrest, J. Ladau, and B. Shebaro, "The nature of Malware," in Proceedings of the 2008 workshop on New security ideal models, 2009, pp. 99–106.

. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2(4): 10-29 The Society of Digital Information and Wireless Communications, 2013 (ISSN: 2305-0012) Internet Security (IITKHACK'09), 2009, pp. 74–79.

. J.- H. Park, M. Kim, B.- N. Noh, and J. B. Joshi, "A Similarity based Technique for Detecting Malicious Executable records for Computer Forensics," in Information Reuse and Integration, 2006 IEEE International Conference on, 2006, pp. 188–193.

. S. Shin, J. Jung, and H. Balakrishnan, "Malware pervasiveness in the KaZaA document sharing system," in Proceedings of the sixth ACM SIGCOMM meeting on Internet estimation, 2006, pp. 333–338.

. C. Greamo and A. Ghosh, "Sandboxing and virtualization: Modern instruments for battling malware," Secur. Priv. IEEE, vol. 9, no. 2, pp. 79–82, 2011.

. H. Kim, J. Smith, G. Shin, "Recognizing vitality covetous abnormalities and versatile malware variations", The International Conference on Mobile Systems, Applications, and Communications (MobiSys), ACM/USENIX, pp. 239–25, 2008.

. J. Cheng, S. Wong, H. Yang, Lu. Songwu, "Smartsiren: infection identification and alarm for cell phones", The International Conference on Mobile Systems, Applications, and Communications MobiSys, pp. 258-271, ACM, Jun. 2007.

. A. Bose, G. Shin., "On portable infections misusing informing and bluetooth administrations", International Conference on Security and Privacy in Communication Networks ,SecureComm, IEEE, PP. 1-10, Aug. 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.