2015
DOI: 10.1002/sec.1186
|View full text |Cite
|
Sign up to set email alerts
|

Mathematical modeling of the propagation of malware: a review

Abstract: In the present work, we offer a critical review of the mathematical models that have been proposed to date to simulate malware propagation in a network of computers or mobile devices. We analyze the models proposed determining the deficits and possible alternatives for improving them. Mathematical modeling of the propagation of malware: a review Real problem Working model Mathematical model Computational model Results and conclusions Simplification Representation Implementation Simulation Analysis Figure 2. A … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 79 publications
(24 citation statements)
references
References 75 publications
0
24
0
Order By: Relevance
“…If l iq = 0, the process will remain forever in s 0 , however, if l iq .0, the probability will be l iq Dt + o(Dt), denoting the probability of a change in the state during Dt. It follows from equation (17) that Pfy.tg is some function of t. If, assume, u(s) = Pfy.sg, then the process will be in the same state at time t 0 + s as at time t 0 , and hence its subsequent behavior will be similar to that of s = 0. Especially,…”
Section: Infection To Quarantinementioning
confidence: 99%
“…If l iq = 0, the process will remain forever in s 0 , however, if l iq .0, the probability will be l iq Dt + o(Dt), denoting the probability of a change in the state during Dt. It follows from equation (17) that Pfy.tg is some function of t. If, assume, u(s) = Pfy.sg, then the process will be in the same state at time t 0 + s as at time t 0 , and hence its subsequent behavior will be similar to that of s = 0. Especially,…”
Section: Infection To Quarantinementioning
confidence: 99%
“…As stated in Martin del Rey [15], the first mathematical model studies aimed at predicting the behavior of an epidemic of were carried out in time Kephart and White [16,17,18]. Mishra and Saini [19] developed an SEIRS model of computer malware in which they assume that any computer in the network is susceptible to malware infection.…”
Section: Related Literaturesmentioning
confidence: 99%
“…Such works are very few in number, and they are usually devoted to solving certain narrow tasks in the field of information security. Thus, there are known works [22][23][24][25] devoted to the research of computer viruses and malware evolution-both in terms of the program structure itself and in terms of the speed of infecting system components. For example, in [23], the authors use an evolutionary approach to describe a change in the dynamic behavior of polymorphic worms, a family of computer viruses capable of changing their own structure, which makes them extremely difficult to detect.…”
Section: Related Workmentioning
confidence: 99%