Genetic Algorithm Based Internet Worm Propagation Strategy Modeling

نویسندگان

  • Nikolaj Goranin
  • Antanas Čenys
چکیده

Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. forecasting the number of infected computers, and are based only on current malware propagation strategies. In this article we propose a genetic algorithm based model, which aims at evaluating existing as well as modeling other potentially dangerous Internet worms’ propagation strategies. The efficiency of strategies is evaluated by applying the proposed fitness function. Genetic algorithm is selected as a modeling tool taking into consideration the efficiency of this method while solving optimization and modeling problems with large solution space. The main application of the proposed model is a countermeasures planning in advance and computer network design optimization.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures

Internet worms remain one of the major threats to the Internet infrastructure. Modeling allows forecasting the malware propagation consequences and evolution trends, planning countermeasures and many other tasks that cannot be investigated without harm to production systems in the wild. Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. foreca...

متن کامل

Peer-to-peer system-based active worm attacks: Modeling, analysis and defense

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.08.008 * Corresponding author. Tel.: +1 214 208 5951. E-mail addresses: [email protected] (W. Yu), ch pan), [email protected] (X. Wang), xuan@cs Active worms continue to pose major threats to the security of today’s Internet. This is due to the ability of active worms to automatically propagate themselves and co...

متن کامل

A Worm Propagation Model based on Scale Free Network Structures and People's Email Acquaintance Profiles

In light of the rise of malicious attacks on the internet and the various networks and applications attached to it, new approaches towards modeling worm activity in networks is called for. One frequently utilized method for W32/Novarg [7], Sober X, Netsky P and Mytob ED [18] propagation exploited by worms is through the victim's contact book. The contact book, which reflects the acquaintance pr...

متن کامل

Pulse quarantine strategy of internet worm propagation: Modeling and analysis

Article history: Available online 6 September 2011 0045-7906/$ see front matter 2011 Elsevier Ltd doi:10.1016/j.compeleceng.2011.07.009 q Reviews processed and approved for publication ⇑ Corresponding author at: College of Information E-mail addresses: [email protected], haveb Worms can spread throughout the Internet very quickly and are a great security threat. Constant quarantine strategy...

متن کامل

Wavelet Analysis Based Worm Attack Early Detection

After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm’s framework and its propagation model. Then, we descr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008