Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,201 Hits in 5.9 sec

Evaluating the Performance of a Static Patching Strategy against Computer Viruses

Da-Wen Huang, Lu-Xing Yang, Xiaofan Yang, Xiang Zhong, Yuan Yan Tang
2020 Complexity  
On this basis, we evaluate the performances of a few static patching strategies. Finally, we examine the influences of a few parameters on the performance of a static patching strategy.  ...  A static patching strategy consists of a fixed patch injection rate and a fixed patch forwarding rate. This paper focuses on evaluating the performance of a static patching strategy.  ...  Next, we evaluate the performances of a few static patching strategies. Finally, we examine the e ects of a few parameters on the performance of a static patching strategy.  ... 
doi:10.1155/2020/9408942 fatcat:bzavvv4jhfc5rik2esvsholgia

Exploiting temporal complex network metrics in mobile malware containment

John Tang, Cecilia Mascolo, Mirco Musolesi, Vito Latora
2011 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks  
Then we introduce a time-aware containment strategy that spreads a patch message starting from nodes with high temporal closeness centrality and show its effectiveness using three real-world datasets.  ...  the same time, a complete containment of the malware in a limited amount of time.  ...  ACKNOWLEDGEMENTS The authors thank our shepherd Stratis Ioannidis and the anonymous reviewers for their insightful comments which have helped in significantly improving our paper.  ... 
doi:10.1109/wowmom.2011.5986463 dblp:conf/wowmom/TangMML11 fatcat:nokhf7zhhfes7hcyin4zzpwuka

Applications of Temporal Graph Metrics to Real-World Networks [chapter]

John Tang, Ilias Leontiadis, Salvatore Scellato, Vincenzo Nicosia, Cecilia Mascolo, Mirco Musolesi, Vito Latora
2013 Understanding Complex Systems  
of a virus depends on the network of human contacts throughout the day.  ...  Firstly, we analyse the roles of key individuals of a corporate network ranked according to temporal centrality within the context of a bankruptcy scandal; secondly, we present how such temporal metrics  ...  Acknowledgements This work was funded in part through EPSRC Project MOLTEN (EP/I017321/1) and the EU LASAGNE Project, Contract No.318132 (STREP).  ... 
doi:10.1007/978-3-642-36461-7_7 fatcat:hp7ljutoenab3gimev4btwxrfm

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention [chapter]

Theodoros Spyridopoulos, George Oikonomou, Theo Tryfonas, Mengmeng Ge
2013 IFIP Advances in Information and Communication Technology  
Lastly, as a way of illustration, we apply our models on the well studied Code-Red worm. L.J. Janczewski, H.  ...  We also propose a cost-benefit model that describes optimal strategies the defender could follow when cost is taken into account.  ...  Malware includes a variety of malicious software such as computer viruses, worms, trojan horses, key-loggers and many others.  ... 
doi:10.1007/978-3-642-39218-4_3 fatcat:pxz3vaqr3rh7latw3rq73ef354

Execution transactions for defending against software failures: use and evaluation

Stelios Sidiroglou, Angelos D. Keromytis
2006 International Journal of Information Security  
We examine the problem of containing buffer overflow attacks in a safe and efficient manner.  ...  Our performance benchmarks indicate a slow-down of 20% for Apache in full-protection mode, and 1.2% with selective protection.  ...  Cohen was the first to define and describe computer viruses in their present form. In [19] , he gave a theoretical basis for the spread of computer viruses.  ... 
doi:10.1007/s10207-006-0083-6 fatcat:6wtsvxahznbill35gog3pjm4lm

Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach [article]

Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran
2016 arXiv   pre-print
We prove that the patching rate required to remove all viruses is bounded above by the passivity index of the coupled system, and formulate the problem of selecting the minimum-cost mitigation strategy  ...  When the propagation dynamics are unknown or uncertain, however, the static rate that is chosen may be either insufficient to remove all viruses or too high, incurring additional performance cost.  ...  of the viruses while minimizing performance overhead.  ... 
arXiv:1603.04374v2 fatcat:am2pto5ohjb67pjrrmn6zpqfu4

STOP: Socio-Temporal Opportunistic Patching of short range mobile malware

John Tang, Hyoungshick Kim, Cecilia Mascolo, Mirco Musolesi
2012 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)  
An alternative and more efficient strategy is to distribute the patch to the key nodes so that they can opportunistically disseminate it to the rest of the network via short range encounters; but how can  ...  manner and report to a central server which processes and targets delivery of hot fixes to a small subset of k devices at runtime; in turn mobile devices spread the patch opportunistically.  ...  be devised to predict the best devices to start spreading a patch (see Sections III-B & III-C). • We evaluate node selection based on temporal closeness centrality against those founded on static closeness  ... 
doi:10.1109/wowmom.2012.6263711 dblp:conf/wowmom/TangKMM12 fatcat:72itt74dt5fljhfpc3mv4lylue

Analysis and detection of computer viruses and worms

Prabhat K. Singh, Arun Lakhotia
2002 SIGPLAN notices  
This annotated bibliography reviews research in analyzing and detecting computer viruses and worms.  ...  This paper proposes two heuristic tools the use static analysis and verification techniques for detecting computer viruses in a UNIX environment.  ...  The paper defines Worms and Viruses. It discusses the flaws in computer systems that were exploited by the Worm to spread across the Internet. Patches to these flaws are also discussed.  ... 
doi:10.1145/568600.568608 fatcat:twubnev3czhv3djwf6ua2ygrii

A Study of Malcode-Bearing Documents [chapter]

Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
2007 Lecture Notes in Computer Science  
We investigate the possibility of detecting embedded malcode in Word documents using two techniques: static content analysis using statistical models of typical document content, and run-time dynamic tests  ...  Such attacks can be very selective and difficult to detect compared to the typical network worm threat, owing to the complexity of these applications and data formats, as well as the multitude of document-exchange  ...  However, instead of computing a set of centroid models, they compute a single representative fingerprint for the entire class. This strategy may be unwise.  ... 
doi:10.1007/978-3-540-73614-1_14 fatcat:r4xyai2zyvcmpezufyi4chujye

Nanoparticle Classification Using Frequency Domain Analysis on Resource-Limited Platforms

Mikail Yayla, Anas Toma, Kuan-Hsun Chen, Jan Eric Lenssen, Victoria Shpacovitch, Roland Hergenröder, Frank Weichert, Jian-Jia Chen
2019 Sensors  
A biosensor called PAMONO (for Plasmon Assisted Microscopy of Nano-sized Objects) represents a viable technology for mobile real-time detection of viruses and virus-like particles.  ...  A mobile system that can detect viruses in real time is urgently needed, due to the combination of virus emergence and evolution with increasing global travel and transport.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/s19194138 fatcat:bqougau7d5am3cknpx7g5nh4qa

A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention

Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George Oikonomou
2015 Information Security Journal  
A game theoretical method for cost-benefit analysis of malware dissemination prevention.  ...  Acknowledgments The authors would like to express their appreciation to the anonymous reviewers for their valuable comments and suggestions.  ...  As a static game, each player has a pre-computed move list (each move denoted as a strategy) from which the best move is chosen to maximise their personal benefit.  ... 
doi:10.1080/19393555.2015.1092186 fatcat:qx5rdr6g5bak7pugchm6cvcqcy

Implementation of the QoS framework using fog computing to predict COVID-19 disease at early stage

Prabhdeep Singh, Rajbir Kaur
2021 World Journal of Engineering  
The machine learning algorithms are used to evaluate the past medical details of the patients and forecast COVID-19 positive cases, which can aid in lowering costs and distinctively enhance the standard  ...  Findings The performance of the framework is checked with various quality of service parameters such as delay, network usage, RAM usages and energy consumption, whereas classification accuracy, recall,  ...  Proposed framework evaluation iFogSim is chosen as a test-bed for performance evaluation of the proposed framework. It uses the libraries of CloudSim to perform the simulation.  ... 
doi:10.1108/wje-12-2020-0636 fatcat:d6dpmt3rgzarlpde5szaisilgq

An Efficient Approach towards Assessment of Zero-day Attacks

Muhammad Inzimam, Chen Yongle, Zhuangzhuang Zhang
2019 International Journal of Computer Applications  
It's very challenging to protect against zero-day attack yet sometime defense can't distinguish because of unknown signature and it performs action.  ...  The biggest threat to the security of any organization is a zero-day attack, a large portion of the most significant organizations don't have a clue or notice the attack and thus, the contamination spread  ...  The IDS/IPS module performs significant profound packets evaluation and names the stream whether it has a spot with some risk.  ... 
doi:10.5120/ijca2019919742 fatcat:2z52ldm2xbfflitsvchmp2oxfm

Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It

Meiring DeVilliers
2011 Pittsburgh Journal of Technology Law and Policy  
It demonstrates the translation of traditional legal principles to a novel technological environment in a way that preserves their meaning and policy rationale.  ...  This Article discusses the enabling technologies of cyber crime and analyzes their role in the resolution of related legal issues.  ...  & ZELTSER, supra note 38, at 84-87; JOSE NAZARIO, DEFENSES AND STRATEGIES AGAINST INTERNET WORMS 14 (2004).  ... 
doi:10.5195/tlp.2011.62 fatcat:c4onmpf7b5c4haish3kx75xpum

Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks

2015 KSII Transactions on Internet and Information Systems  
A graph is formed to analyze the structure of a social network, and subgroups are formed in the graph for the distributed patch strategy.  ...  In this paper, an effective patch strategy is proposed to deal with malicious worms based on social networks.  ...  performance evaluation, and experiments on the infected rate through a patch for the methods.  ... 
doi:10.3837/tiis.2015.01.026 fatcat:6nr4txa2w5elfiskdwo2gagdqa
« Previous Showing results 1 — 15 out of 2,201 results