Malware Propagation in Large-Scale Networks

被引:90
作者
Yu, Shui [1 ]
Gu, Guofei [2 ]
Barnawi, Ahmed [3 ]
Guo, Song [4 ]
Stojmenovic, Ivan [1 ,5 ,6 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] Texas A&M Univ, Dept Comp Sci & Engn, College Stn, TX 77843 USA
[3] King Abdulaziz Univ, Fac Comp & IT, Jeddah 21413, Saudi Arabia
[4] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima, Japan
[5] King Abdulaziz Univ, Jeddah 21413, Saudi Arabia
[6] Univ Ottawa, Sch EECS, Ottawa, ON K1N 6N5, Canada
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
Malware; propagation; modelling; power law; CONTAINMENT;
D O I
10.1109/TKDE.2014.2320725
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagates in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from network to network. Based on the proposed model, our analysis indicates that the distribution of a given malware follows exponential distribution, power law distribution with a short exponential tail, and power law distribution at its early, late and final stages, respectively. Extensive experiments have been performed through two real-world global scale malware data sets, and the results confirm our theoretical findings.
引用
收藏
页码:170 / 179
页数:10
相关论文
共 26 条
[11]  
Kleinrock L., 1975, Queueing systems Vol I: theory, VI
[12]  
Mitzenmacher M., 2004, INTERNET MATH, V1, P129
[13]  
Newman M., 2010, Networks: An introduction oxford univ
[14]   Power laws, Pareto distributions and Zipf's law [J].
Newman, MEJ .
CONTEMPORARY PHYSICS, 2005, 46 (05) :323-351
[15]   Protecting Against Network Infections: A Game Theoretic Perspective [J].
Omic, Jasmina ;
Orda, Ariel ;
Van Mieghem, Piet .
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, :1485-+
[16]   Smartphone Malware and Its Propagation Modeling: A Survey [J].
Peng, Sancheng ;
Yu, Shui ;
Yang, Aimin .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02) :925-941
[17]  
Rajab MoheebAbu., 2007, P 1 C 1 WORKSHOP HOT, P5
[18]   Modeling and automated containment of worms [J].
Sellke, Sarah H. ;
Shroff, Ness B. ;
Bagchi, Saurabh .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) :71-86
[19]   A Large-Scale Empirical Study of Conficker [J].
Shin, Seungwon ;
Gu, Guofei ;
Reddy, Narasimha ;
Lee, Christopher P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :676-690
[20]  
Silagadze Z., 1997, Complex Systems, V11, P487, DOI DOI 13/2018/02/11-6-4.PDF