Reinfection and Self-Start Analysis on the Propagation Dynamics of Modern Email Malware
نویسندگان
چکیده
In recent years, email is the basic service for person to person communication, and email facilitates by its high speed, and process ability. The email malware exhibits two new propagation features; reinfection and self-start. Reinfection is the process by which an infected user sends out malware copies, whenever the infected user opens the malicious hyperlink or attachment. Self-Start is the process by which the infected user spreads the malware copies, whenever certain events are triggered. To solve this problem, derive a new analytical model by introducing a concept of virtual nodes. The malware detector serves as an empirical means of evaluating malware detection techniques detection capabilities. The new analytical model can efficiently predict the reinfection detection and effectively overcome the associated computational challenges.
منابع مشابه
A Survey on Malware Propagation Analysis and Prevention Model
In recent years, the security threats imposed by email-based malware, modeling the propagation analysis and prevention of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of mail malware, modern email malware exhibits two new features. One is reinfection and another one is self-start. In rei...
متن کاملA Survey on Malware Propagation Analysis and Prevention Model
In recent years, the security threats imposed by email-based malware, modeling the propagation analysis and prevention of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of mail malware, modern email malware exhibits two new features. One is reinfection and another one is self-start. In rei...
متن کاملFibonacci Modeling of Malware Propagation
Self-propagating malware spreads over the network quickly and automatically. Malware propagation should be modeled accurately for fast detection and defense. Existing malware propagation models fail to consider a number of issues. First, the malware can scan a host for multiple vulnerabilities on multiple ports. Second, the vulnerability scanning can be done by multiple threads concurrently. Th...
متن کاملModeling Botnet Propagation Using Time Zones
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large coordinated collections of victim machines (zombies) controlled by attackers. Over a six month period we observed dozens of botnets representing millions of victims. We noted diurnal properties in botnet activity, which we suspec...
متن کاملDynamic Harmonic Modeling and Analysis of VSC-HVDC Systems
Harmonics have become an important issue in modern power systems. The widespread penetration of non-linear loads to emerging power systems has turned power quality analysis into an important operation issue under both steady state and transient conditions. This paper employs a Dynamic Harmonic Domain (DHD) based framework for dynamic harmonic analysis of VSC-HVDC systems. These systems are wide...
متن کامل