Impact of Network Structure on Malware Propagation: A Growth Curve Perspective
نویسندگان
چکیده
Malicious software, commonly termed “malware,” continuously presents one of the top security concerns, and causes tremendous worldwide financial losses for organizations. In this paper, we propose a structural risk model to analyze malware propagation dynamics measured by a four-parameter (asymptote, point of inflection, rate, and infection proportion at inflection) growth curve. Using both social network data and technological network infrastructure from a large organization, we estimate the proposed structural risk model based on incident-specific nonlinear growth curves. This paper provides empirical evidence for the explanatory power of the structural characteristics of the underlying networks on malware propagation dynamics. This research provides useful findings for security managers in designing their malware defense strategies. We also simulate three common malware defense strategies (preselected immunization strategies, countermeasure Journal of Management Information Systems / 2016, Vol. 33, No. 1, pp. 296–325. Copyright © Taylor & Francis Group, LLC ISSN 0742–1222 (print) / ISSN 1557–928X (online) DOI: 10.1080/07421222.2016.1172440 dissemination strategies, and security awareness programs) based on the proposed structural risk model and show that they outperform existing strategies in terms of reducing the size of malware infection.
منابع مشابه
Torinj : Automated Exploitation Malware Targeting Tor Users
We propose in this paper a new propagation vector for malicious software by abusing the Tor network. Tor is particularly relevant, since operating a Tor exit node is easy and involves low costs compared to attack institutional or ISP networks. After presenting the Tor network from an attacker perspective, we describe an automated exploitation malware which is operated on a Tor exit node targeti...
متن کاملAnalysis of Malware Propagation Modeling Methods
The article reveals the modeling necessity in malware analysis; the major malware propagation modeling methods are described and discussed, the perspective scientific research directions are proposed. The possibility of using genetic algorithm instrumental base for malware propagation modeling is shown.
متن کاملSpreading of Malware Dynamically in Peer To Peer Network
In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of c...
متن کاملAgent-based modeling of malware dynamics in heterogeneous environments
The increasing convergence of power-law networks such as social networking and peer-to-peer applications, web-delivered applications, andmobile platformsmakes today’s users highly vulnerable to entirely new generations ofmalware that exploit vulnerabilities in web applications and mobile platforms for new infections, while using the power-law connectivity for finding new victims. The traditiona...
متن کاملModeling the Propagation of Trojan Malware in Online Social Networks
The popularity and widespread usage of online social networks (OSN) have attracted cyber criminals who have used OSNs as a platform to spread malware. Among different types of malware in OSNs, Trojan is the most popular type with hundreds of attacks on OSN users in the past few years. Trojans infecting a user’s computer have the ability to steal confidential information, install ransomware and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. of Management Information Systems
دوره 33 شماره
صفحات -
تاریخ انتشار 2016