Network Transport:  Recipient Activated Malware Bruce W. Fowler University of Alabama in Huntsville Center for Management ...
Acknowledgement <ul><li>The author wishes to gratefully acknowledge the assistance of Ms. Norma Lee in developing the proc...
Background  Induced Fragility in Information Age Warfare
What's Malware? <ul><li>Malware Definition  ( http://www. linfo .org/ malware .html )‏ </li></ul><ul><ul><li>Malware is an...
What's Recipient Activated Malware (RAM)? <ul><li>Malware that is activated by the recipient: </li></ul><ul><li>Type 1: th...
Internet 'Reality' Space-Time <ul><li>Time </li></ul><ul><ul><li>Similar to ‘material’ reality (mechanical clocks, paramet...
RAM + space-time <ul><li>Neglecting server infection , RAM only afflicts terminating arcs (edges) on the boundaries of the...
Rate Theory Interlude
RAM Type 1 Process
RAM Type 1 Transport Equation - 1
RAM Type 1 Transport Equation - 2 This is simply a Logistics DE! Disease-like diffusion
RAM Type 2 Process
RAM Type 2 Transport Equation This is simple NED.
Insights <ul><li>Type 2 potentially more serious – faster growth </li></ul><ul><li>Counter-measures </li></ul><ul><ul><li>...
The Future <ul><li>How to recover from MalWare </li></ul><ul><li>Waiting for new methods </li></ul><ul><li>Drilling down <...
Upcoming SlideShare
Loading in...5
×

Recipient Activated Malware Diffusion

313

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
313
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Recipient Activated Malware Diffusion

  1. 1. Network Transport: Recipient Activated Malware Bruce W. Fowler University of Alabama in Huntsville Center for Management of Science and Technology P. O. Box 220 Arab, AL 35016 [email_address]
  2. 2. Acknowledgement <ul><li>The author wishes to gratefully acknowledge the assistance of Ms. Norma Lee in developing the process models herein presented. </li></ul>
  3. 3. Background  Induced Fragility in Information Age Warfare
  4. 4. What's Malware? <ul><li>Malware Definition ( http://www. linfo .org/ malware .html )‏ </li></ul><ul><ul><li>Malware is any software that is developed for the purpose of doing harm to computers or via computers. </li></ul></ul><ul><ul><li>Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, trojans, backdoors, spyware, rootkits and spam. </li></ul></ul>
  5. 5. What's Recipient Activated Malware (RAM)? <ul><li>Malware that is activated by the recipient: </li></ul><ul><li>Type 1: the malware is linked to a recipient via an email </li></ul><ul><ul><li>Malware embedded in email proper, </li></ul></ul><ul><ul><li>Malware embedded as attachment, or </li></ul></ul><ul><ul><li>Malware embedded in web page with link in the email. </li></ul></ul><ul><ul><li>Malware on removable media obtained from a colleague. </li></ul></ul><ul><li>Type 2: the malware is embedded in a web page that the user (recipient) visits either undirected or by direction other than email. </li></ul>
  6. 6. Internet 'Reality' Space-Time <ul><li>Time </li></ul><ul><ul><li>Similar to ‘material’ reality (mechanical clocks, parametric) </li></ul></ul><ul><li>Space </li></ul><ul><ul><li>arcs (edges) and nodes </li></ul></ul><ul><ul><li>not Cartesian </li></ul></ul>
  7. 7. RAM + space-time <ul><li>Neglecting server infection , RAM only afflicts terminating arcs (edges) on the boundaries of the network. </li></ul><ul><li>Only degree one nodes impacted, network statistics effectively irrelevant </li></ul><ul><ul><li>exception: non-American cellular phones? </li></ul></ul><ul><ul><li>exception: positive correlation network contribution structuring email addressing? </li></ul></ul><ul><li>No further spatiality (gridless) </li></ul>
  8. 8. Rate Theory Interlude
  9. 9. RAM Type 1 Process
  10. 10. RAM Type 1 Transport Equation - 1
  11. 11. RAM Type 1 Transport Equation - 2 This is simply a Logistics DE! Disease-like diffusion
  12. 12. RAM Type 2 Process
  13. 13. RAM Type 2 Transport Equation This is simple NED.
  14. 14. Insights <ul><li>Type 2 potentially more serious – faster growth </li></ul><ul><li>Counter-measures </li></ul><ul><ul><li>Low hanging fruit – common pieces </li></ul></ul><ul><ul><ul><li>Anti-malware filters (good investment, keep up to date – conficker worm!) </li></ul></ul></ul><ul><ul><ul><li>Web site warning utilities/blocking </li></ul></ul></ul><ul><ul><ul><li>Education – never take anything out of filter cache, never run programs you don’t know, visit only good sites. </li></ul></ul></ul><ul><ul><li>Tree chopping and Baby tossing </li></ul></ul><ul><ul><ul><li>Corporate network </li></ul></ul></ul><ul><ul><li>Wine </li></ul></ul><ul><ul><ul><li>Two OS + Virtual Machines </li></ul></ul></ul>
  15. 15. The Future <ul><li>How to recover from MalWare </li></ul><ul><li>Waiting for new methods </li></ul><ul><li>Drilling down </li></ul><ul><li>Commonalities </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×