Capturing the interplay between malware and anti-malware in a computer network

نویسندگان

  • A. K. Misra
  • Maitri Verma
  • Anupama Sharma
چکیده

Keywords: Mathematical model Computer networks Malware Anti-malware Stability a b s t r a c t In an era with affluence of local area networks, the recurrent attacks of viruses and other malicious objects are undoubtedly an intruding threat. These malicious objects spread quickly through an unprotected network, corrupt the data and harm the nodes. To comprehend this problem and its plausible solutions more thoroughly, we have proposed and analyzed a mathematical model by considering a network in which nodes are either infected or prone to it. It is considered that nodes vulnerable to infection become infected, when attacked by malicious objects present in the network. To minimize the abundance of malicious objects and infected nodes, some anti-malware softwares are installed in the network , which are continuously being updated. On analyzing the proposed model, we obtained two equilibria and a threshold governing the dynamics of malicious objects in a computer network. The characterization of stability behavior of obtained equilibria is also discussed in detail. The numerical simulation illustrates the validity of analytically obtained results. With the evolution of computer networks, the need of protecting files and other information stored on the computers have become imperative. Peer-to-peer file sharing amongst operating systems and other widely distributed network soft-wares provide favorable conditions for malicious attacks. Due to this, the spread of viruses, worms, Trojans and other malicious softwares have increased dramatically in the last decade. Malicious softwares or malwares are the programs written with an intention to cause some kind of damage to computer systems and networks. Computer viruses are most widely recognized class of malware. Once a virus enters any computer or network, it performs two functions: it infects other programs by copying itself and it executes malicious codes those have been included by author in it. These viruses are especially designed to damage the system and their effect can be so extensive that the complete rebuilding of all softwares and data may be required. Due to the swift spreading nature of computer viruses, the damage can multiply in the network topology within a fraction of time. The computer viruses have acquired this name due to their resemblance with the biological viruses. Biological viruses transmit from person-to-person, while computer viruses pass from computer-to-computer. A biological virus is a fragment of DNA inside a protective jacket, which injects its DNA into a cell to reproduce itself. A computer virus does the …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In t...

متن کامل

Amun: A Python Honeypot

In this report we describe a low-interaction honeypot, which is capable of capturing autonomous spreading malware from the internet, named Amun. For this purpose, the software emulates a wide range of different vulnerabilities. As soon as an attacker exploits one of the emulated vulnerabilities the payload transmitted by the attacker is analyzed and any download URL found is extracted. Next, th...

متن کامل

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

A Robust Control Framework for Malware Filtering

We study and develop a robust control framework for malware filtering and network security. We investigate the malware filtering problem by capturing the tradeoff between increased security on one hand and continued usability of the network on the other. We analyze the problem using a linear control system model with a quadratic cost structure and develop algorithms based on H∞-optimal control ...

متن کامل

Insights into Malware Distribution with Graph Analytics

Malicious software (malware) destroys and steals access to users’ private computer systems, which can lead to breaches of sensitive personal information. It has been rapidly growing, spreading and infecting computer systems; it continues to be an active threat. Currently, more than 200 million unique variants of malware exist. Anti-virus is a software tool that is used to protect against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Applied Mathematics and Computation

دوره 229  شماره 

صفحات  -

تاریخ انتشار 2014