Your SlideShare is downloading. ×
Recipient Activated Malware Diffusion
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Recipient Activated Malware Diffusion


Published on

Published in: Technology, Education

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Network Transport: Recipient Activated Malware Bruce W. Fowler University of Alabama in Huntsville Center for Management of Science and Technology P. O. Box 220 Arab, AL 35016 [email_address]
  • 2. Acknowledgement
    • The author wishes to gratefully acknowledge the assistance of Ms. Norma Lee in developing the process models herein presented.
  • 3. Background  Induced Fragility in Information Age Warfare
  • 4. What's Malware?
    • Malware Definition ( http://www. linfo .org/ malware .html )‏
      • Malware is any software that is developed for the purpose of doing harm to computers or via computers.
      • Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, trojans, backdoors, spyware, rootkits and spam.
  • 5. What's Recipient Activated Malware (RAM)?
    • Malware that is activated by the recipient:
    • Type 1: the malware is linked to a recipient via an email
      • Malware embedded in email proper,
      • Malware embedded as attachment, or
      • Malware embedded in web page with link in the email.
      • Malware on removable media obtained from a colleague.
    • Type 2: the malware is embedded in a web page that the user (recipient) visits either undirected or by direction other than email.
  • 6. Internet 'Reality' Space-Time
    • Time
      • Similar to ‘material’ reality (mechanical clocks, parametric)
    • Space
      • arcs (edges) and nodes
      • not Cartesian
  • 7. RAM + space-time
    • Neglecting server infection , RAM only afflicts terminating arcs (edges) on the boundaries of the network.
    • Only degree one nodes impacted, network statistics effectively irrelevant
      • exception: non-American cellular phones?
      • exception: positive correlation network contribution structuring email addressing?
    • No further spatiality (gridless)
  • 8. Rate Theory Interlude
  • 9. RAM Type 1 Process
  • 10. RAM Type 1 Transport Equation - 1
  • 11. RAM Type 1 Transport Equation - 2 This is simply a Logistics DE! Disease-like diffusion
  • 12. RAM Type 2 Process
  • 13. RAM Type 2 Transport Equation This is simple NED.
  • 14. Insights
    • Type 2 potentially more serious – faster growth
    • Counter-measures
      • Low hanging fruit – common pieces
        • Anti-malware filters (good investment, keep up to date – conficker worm!)
        • Web site warning utilities/blocking
        • Education – never take anything out of filter cache, never run programs you don’t know, visit only good sites.
      • Tree chopping and Baby tossing
        • Corporate network
      • Wine
        • Two OS + Virtual Machines
  • 15. The Future
    • How to recover from MalWare
    • Waiting for new methods
    • Drilling down
    • Commonalities