Optimal Patching in Clustered Epidemics of Malware
نویسندگان
چکیده
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous across different regions. Heterogeneous rates of contact can also be due to diverse platforms, utilization of contact lists by the malware, the clustered nature of the network, etc. In this paper, a general formal framework is proposed for leveraging such information about heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin’s Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies that are amenable to implementation in a distributed manner. Through numerical calculations, the behavior of optimal patching policies is investigated in sample topologies and their advantages are demonstrated.
منابع مشابه
Optimizing Network Patching Policy Decisions
Patch management of networks is essential to mitigate the risks from the exploitation of vulnerabilities through malware and other attacks, but by setting too rigorous a patching policy for network devices the IT security team can also create burdens for IT operations or disruptions to the business. Different patch deployment timelines could be adopted with the aim of reducing this operational ...
متن کاملOptimal Control of Mobile Malware Epidemics
Malware attacks constitute a serious security risk that threatens our ever-expanding wireless networks. Developing reliable security measures against outbreaks of malware facilitate the proliferation of wireless technologies. The first step towardthis goal is to investigate potential attack strategies and the extent of damage they can incur. Given the flexibility that software-based operation p...
متن کاملAn adaptive security framework for evaluating and assessing security implementations in PaaS cloud models
ion +Operating System Host Level Threats Virtualisation Security OS Patching Malware prevention/detection Auditing/Logging Software Updates
متن کاملBISTRO: Binary Component Extraction and Embedding for Software Security Applications
In software security and malware analysis, researchers often need to directly manipulate binary program – benign or malicious – without source code. A useful pair of binary manipulation primitives are binary functional component extraction and embedding, for extracting a functional component from a binary program and for embedding a functional component in a binary program, respec tively. Such...
متن کاملReverse Engineering
This paper provides the basic information about Reverse Software Engineering and its advantages and disadvantages of Reverse Engineering. Today Reverse Engineering is used in many fields of Information Technology in form of Legacy compatibility, Malware Analysis, Network Analysis, Binary code patching, debugging, and improvising existing algorithms, rapid prototyping and even software reusabili...
متن کامل