Malware Propagation in Large-Scale Networks

被引:90
作者
Yu, Shui [1 ]
Gu, Guofei [2 ]
Barnawi, Ahmed [3 ]
Guo, Song [4 ]
Stojmenovic, Ivan [1 ,5 ,6 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] Texas A&M Univ, Dept Comp Sci & Engn, College Stn, TX 77843 USA
[3] King Abdulaziz Univ, Fac Comp & IT, Jeddah 21413, Saudi Arabia
[4] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima, Japan
[5] King Abdulaziz Univ, Jeddah 21413, Saudi Arabia
[6] Univ Ottawa, Sch EECS, Ottawa, ON K1N 6N5, Canada
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
Malware; propagation; modelling; power law; CONTAINMENT;
D O I
10.1109/TKDE.2014.2320725
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagates in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from network to network. Based on the proposed model, our analysis indicates that the distribution of a given malware follows exponential distribution, power law distribution with a short exponential tail, and power law distribution at its early, late and final stages, respectively. Extensive experiments have been performed through two real-world global scale malware data sets, and the results confirm our theoretical findings.
引用
收藏
页码:170 / 179
页数:10
相关论文
共 26 条
[1]  
Abu Rajab M., 2006, PROC ACM INTERNET ME, P41, DOI [10.1145/1177080.1177086, DOI 10.1145/1177080.1177086]
[2]  
[Anonymous], 1999, EPIDEMIC MODELLING I
[3]  
[Anonymous], 2006, NDSS
[4]   Zipf distribution of US firm sizes [J].
Axtell, RL .
SCIENCE, 2001, 293 (5536) :1818-1820
[5]   An Information-Theoretic View of Network-Aware Malware Attacks [J].
Chen, Zesheng ;
Ji, Chuanyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) :530-541
[6]  
Dantu R, 2007, IEEE T DEPEND SECURE, V4, P119, DOI [10.1109/Tait2007.1002, 10.1109/TDSC.2007.1002]
[7]   An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks [J].
De, Pradip ;
Liu, Yonghe ;
Das, Sajal K. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (03) :413-425
[8]  
Ganesh A, 2005, IEEE INFOCOM SER, P1455
[9]   Modeling and Restraining Mobile Virus Propagation [J].
Gao, Chao ;
Liu, Jiming .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (03) :529-541
[10]   When to initiate HIV therapy: A control theoretic approach [J].
Jeffrey, AM ;
Xia, XH ;
Craig, IK .
IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2003, 50 (11) :1213-1220