Optimal Patching in Clustered Epidemics of Malware

نویسندگان

  • S. Eshghi
  • S. Sarkar
  • S. S. Venkatesh
چکیده

Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous across different regions. Heterogeneous rates of contact can also be due to diverse platforms, utilization of contact lists by the malware, the clustered nature of the network, etc. In this paper, a general formal framework is proposed for leveraging such information about heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin’s Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies that are amenable to implementation in a distributed manner. Through numerical calculations, the behavior of optimal patching policies is investigated in sample topologies and their advantages are demonstrated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing Network Patching Policy Decisions

Patch management of networks is essential to mitigate the risks from the exploitation of vulnerabilities through malware and other attacks, but by setting too rigorous a patching policy for network devices the IT security team can also create burdens for IT operations or disruptions to the business. Different patch deployment timelines could be adopted with the aim of reducing this operational ...

متن کامل

Optimal Control of Mobile Malware Epidemics

Malware attacks constitute a serious security risk that threatens our ever-expanding wireless networks. Developing reliable security measures against outbreaks of malware facilitate the proliferation of wireless technologies. The first step towardthis goal is to investigate potential attack strategies and the extent of damage they can incur. Given the flexibility that software-based operation p...

متن کامل

An adaptive security framework for evaluating and assessing security implementations in PaaS cloud models

ion +Operating System Host Level Threats Virtualisation Security OS Patching Malware prevention/detection Auditing/Logging Software Updates

متن کامل

BISTRO: Binary Component Extraction and Embedding for Software Security Applications

In software security and malware analysis, researchers often need to directly manipulate binary program – benign or malicious – without source code. A useful pair of binary manipulation primitives are binary functional component extraction and embedding, for extracting a functional component from a binary program and for embedding a functional component in a binary program, respec­ tively. Such...

متن کامل

Reverse Engineering

This paper provides the basic information about Reverse Software Engineering and its advantages and disadvantages of Reverse Engineering. Today Reverse Engineering is used in many fields of Information Technology in form of Legacy compatibility, Malware Analysis, Network Analysis, Binary code patching, debugging, and improvising existing algorithms, rapid prototyping and even software reusabili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012