On Intelligent Agent-Based Simulation of Network Worms Propagation

被引:0
作者
Chumachenko, Dmytro [1 ]
Yakovlev, Sergiy [1 ]
机构
[1] Natl Aerosp Univ, Kharkiv Aviat Inst, Dept Math Modeling & Artificial Intelligence, Kharkiv, Ukraine
来源
2019 IEEE 15TH INTERNATIONAL CONFERENCE ON THE EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS (CADSM'2019) | 2019年
关键词
simulation of epidemic process; malicious software; network worm; agent-based simulation; multi-agent simulation; Code Red;
D O I
10.1109/cadsm.2019.8779342
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To assess the propagation behavior of network worms, it is advisable to use modeling techniques. Existing models are based on deterministic approaches, which does not allow to take into account the dynamic nature of the development of the malware epidemic process. A multi-agent network worm propagation model has been developed, for example, the Code Red worm, which eliminates the disadvantages of deterministic analytic models. The simulation results allow you to accurately repeat the dynamics of the real behavior of the Code Red worm, and can be used to study the behavior of other network worms.
引用
收藏
页数:4
相关论文
共 16 条
  • [1] Bazilevych K., 2018, International Journal of Computing, V17, P153, DOI [10.47839/ijc.17.3.1035, DOI 10.47839/IJC.17.3.1035]
  • [2] Chumachenko D., 2019, Telecommunications and Radio Engineering, V78, P443
  • [3] Chumachenko D, 2018, 2018 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), P415, DOI 10.1109/DSMP.2018.8478602
  • [4] Chumachenko D, 2018, 2018 14TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET), P192, DOI 10.1109/TCSET.2018.8336184
  • [5] DEVANEY R, 2004, DIFFERENTIAL EQUATIO
  • [6] SET COVERINGS AND TOLERANCE RELATIONS
    Gerasin, S. N.
    Shlyakhov, V. V.
    Yakovlev, S. V.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2008, 44 (03) : 333 - 340
  • [7] KEPHART JO, 1993, 1993 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P2
  • [8] Demystifying Cyber-Physical Malware
    Kothari, Suraj C.
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 544 - 545
  • [9] Worm propagation and generic attacks
    Levy, E
    [J]. IEEE SECURITY & PRIVACY, 2005, 3 (02) : 63 - 65
  • [10] GROUP STRUCTURES ON QUOTIENT SETS IN CLASSIFICATION PROBLEMS
    Mashtalir, V. P.
    Shlyakhov, V. V.
    Yakovlev, S. V.
    [J]. CYBERNETICS AND SYSTEMS ANALYSIS, 2014, 50 (04) : 507 - 518