Your SlideShare is downloading. ×
0
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Recipient Activated Malware Diffusion

305

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
305
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Network Transport: Recipient Activated Malware Bruce W. Fowler University of Alabama in Huntsville Center for Management of Science and Technology P. O. Box 220 Arab, AL 35016 [email_address]
  • 2. Acknowledgement <ul><li>The author wishes to gratefully acknowledge the assistance of Ms. Norma Lee in developing the process models herein presented. </li></ul>
  • 3. Background  Induced Fragility in Information Age Warfare
  • 4. What's Malware? <ul><li>Malware Definition ( http://www. linfo .org/ malware .html )‏ </li></ul><ul><ul><li>Malware is any software that is developed for the purpose of doing harm to computers or via computers. </li></ul></ul><ul><ul><li>Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, trojans, backdoors, spyware, rootkits and spam. </li></ul></ul>
  • 5. What's Recipient Activated Malware (RAM)? <ul><li>Malware that is activated by the recipient: </li></ul><ul><li>Type 1: the malware is linked to a recipient via an email </li></ul><ul><ul><li>Malware embedded in email proper, </li></ul></ul><ul><ul><li>Malware embedded as attachment, or </li></ul></ul><ul><ul><li>Malware embedded in web page with link in the email. </li></ul></ul><ul><ul><li>Malware on removable media obtained from a colleague. </li></ul></ul><ul><li>Type 2: the malware is embedded in a web page that the user (recipient) visits either undirected or by direction other than email. </li></ul>
  • 6. Internet 'Reality' Space-Time <ul><li>Time </li></ul><ul><ul><li>Similar to ‘material’ reality (mechanical clocks, parametric) </li></ul></ul><ul><li>Space </li></ul><ul><ul><li>arcs (edges) and nodes </li></ul></ul><ul><ul><li>not Cartesian </li></ul></ul>
  • 7. RAM + space-time <ul><li>Neglecting server infection , RAM only afflicts terminating arcs (edges) on the boundaries of the network. </li></ul><ul><li>Only degree one nodes impacted, network statistics effectively irrelevant </li></ul><ul><ul><li>exception: non-American cellular phones? </li></ul></ul><ul><ul><li>exception: positive correlation network contribution structuring email addressing? </li></ul></ul><ul><li>No further spatiality (gridless) </li></ul>
  • 8. Rate Theory Interlude
  • 9. RAM Type 1 Process
  • 10. RAM Type 1 Transport Equation - 1
  • 11. RAM Type 1 Transport Equation - 2 This is simply a Logistics DE! Disease-like diffusion
  • 12. RAM Type 2 Process
  • 13. RAM Type 2 Transport Equation This is simple NED.
  • 14. Insights <ul><li>Type 2 potentially more serious – faster growth </li></ul><ul><li>Counter-measures </li></ul><ul><ul><li>Low hanging fruit – common pieces </li></ul></ul><ul><ul><ul><li>Anti-malware filters (good investment, keep up to date – conficker worm!) </li></ul></ul></ul><ul><ul><ul><li>Web site warning utilities/blocking </li></ul></ul></ul><ul><ul><ul><li>Education – never take anything out of filter cache, never run programs you don’t know, visit only good sites. </li></ul></ul></ul><ul><ul><li>Tree chopping and Baby tossing </li></ul></ul><ul><ul><ul><li>Corporate network </li></ul></ul></ul><ul><ul><li>Wine </li></ul></ul><ul><ul><ul><li>Two OS + Virtual Machines </li></ul></ul></ul>
  • 15. The Future <ul><li>How to recover from MalWare </li></ul><ul><li>Waiting for new methods </li></ul><ul><li>Drilling down </li></ul><ul><li>Commonalities </li></ul>

×