Anatomy on Malware Distribution Networks
نویسندگان
چکیده
منابع مشابه
fault location in power distribution networks using matching algorithm
چکیده رساله/پایان نامه : تاکنون روشهای متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روشها در شبکه توزیع به دلایلی همچون وجود انشعابهای متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تکفاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...
Nazca: Detecting Malware Distribution in Large-Scale Networks
Malware remains one of the most significant security threats on the Internet. Antivirus solutions and blacklists, the main weapons of defense against these attacks, have only been (partially) successful. One reason is that cyber-criminals take active steps to bypass defenses, for example, by distributing constantly changing (obfuscated) variants of their malware programs, and by quickly churnin...
متن کاملModeling Malware Propagation in Networks
The paper proposes to study spreading characteristics of malware using a stochastic model, based on the Interactive Markov Chains, that belongs to the special case called “influence model.” We generalize influence model so that the status of a node and the influences a node exerts from neighbors depend on the current status of the node and the statuses of its neighbors. Such generalized model i...
متن کاملWiFi networks and malware epidemiology.
In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attacks. In this article, we consider several scenarios for the deployment of malware that spreads over the wireless channel of major urban areas in the US. We develop an epidemiological model that takes...
متن کاملChain Exploitation—Social Networks Malware
social life in the online world. It has become the most acceptable pattern of forging social connections on the web. Every new development has pros and cons in its own sphere, though, and social networking web sites are no different. Online social networks, being a part of the Web 2.0 world, are prone to attacks and malware infections. Social networks, such as Facebook, Twitter, MySpace, Orkut ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2985990