Dynamical Models for Computer Viruses Propagation
نویسندگان
چکیده
منابع مشابه
Computer Virus Propagation Models
The availability of reliable models of computer virus propagation would prove useful in a number of ways, in order both to predict future threats, and to develop new containment measures. In this paper, we review the most popular models of virus propagation, analyzing the underlying assumptions of each of them, their strengths and their weaknesses. We also introduce a new model, which extends t...
متن کاملMathematical models on computer viruses
An attempt has been made to develop mathematical models on computer viruses infecting the system under different conditions. Mathematical model 1 discusses the situation to find the probability that at any time t how many software components are infected by virus, assuming the recovery rate and proportion of un-infected population receiving infection per unit time does not change with time. Mat...
متن کاملUncertainty Propagation for Nonlinear Dynamical Systems using Gaussian Mixture Models
A Gaussian mixture model approach is proposed for accurate uncertainty propagation through a general nonlinear system. The transition probability density function, is approximated by a finite sum of Gaussian density functions whose parameters (mean and covariance) are propagated using linear propagation theory. Two different approaches are introduced to update the weights of different component...
متن کاملDirected-Graph Epidemiological Models of Computer Viruses
Despite serious concerns raised by the proven ability of computer viruses to spread between individua.1 systems and establish themselves as a persistent infection in the computer population, there have been very few efforts t o analyze their propagation theoretically. The strong analogy between biological viruses and their co~nputntional counterparts has motivated us t o adapt the techniques of...
متن کاملModels of practical defenses against computer viruses
In this paper, we model complexity-based virus detection mechanisms which detect modifications and thereby prevent computer viruses from causing secondary infections. We use these models to show how to protect information in both trusted and untrusted computing bases, show the optimality of these mechanisms, and discuss some of their features. The models indicate that we can cover changes at al...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2008
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2008/940526