SlideShare a Scribd company logo
1 of 5
Download to read offline
Attacking Behaviour of Computer Worms on
E-Commerce Network: A Dynamic Model
Biswarup Samanta#1
, Samir Kumar Pandey (S.K. Pandey)#2
#1
Department of Computer Science, Usha Martin Academy, Ranchi, India
#2
Department of Mathematical Sciences, Polytecnico di Torino, Turin, Italy
#1
biswarup.k@gmail.com (B. Samanta),
#2
samir.phd2009@gmail.com (S.K. Pandey)
Abstract— The growth of Information System of any
organization is not revolutionary, but it is evolutionary. The
organization may start their computer network by connecting
the few nodes from the very selective number of departments. As
the time passes, the computer network of the organization also
grows with the growth of their business. When the e-commerce of
the organization is in maturity stage, it can capture/perform the
transactions between the organization and its suppliers, between
the organization and its customers and the transactions within
the organization. Now the biggest threat to this e-commerce
network is the presence of malware (worms, virus, etc.) within
the network. To counter the attack of malware to the network
several approaches are taken, out of which uses of antivirus is
very popular and effective approach. Here in this paper, using
epidemic model, we propose Susceptible(S) - Susceptible with
Protection (Sp) - Infected (I) - Quarantine (Q) (S-Sp-I-Q) model
to capture the dynamics of worm propagation in the e-commerce
network. We have also used MATLAB to simulate and analyze
the behaviour of different classes of nodes of the proposed model,
among each other and with respect to time.
Keywords— e-commerce, virus, worms, epidemic model,
dynamic model, mathematical model, security
I. INTRODUCTION
Online shopping is the buzzword in today’s world. Top
organizations from various industries like banking, finance,
automobiles, retail, telecomm, education are using their
ecommerce network to reach to their customer or vice-versa.
Customers are using the client software at their end, which
may be desktop, laptop or mobile and searching for their
required products or services and then they are placing their
order to that organization through the browser. And the
organization seating at the server side, using server software,
getting the order placed by their customer. Then this order
propagates through various departments of that organization,
which are connected through intranet and finally the product is
manufactured or outsourced and delivered to their customer
and the customer can also make the payment online through a
third party.
The category of ecommerce which is discussed above is
known as B2C type ecommerce. Examples of B2C type
ecommerce are amazone.com, flipkart.com, etc. Similarly we
have other categories of ecommerce like B2B, C2C, B2G,
C2B, etc. In B2B type ecommerce, the business organization
sells products or services to other business organizations or
brings multiple buyers and sellers together in a central
marketplace; e.g. metalsite.com. In C2C type ecommerce,
consumers sell directly to other consumers via online
classified ads and auctions or by selling personal services or
expertise online, e.g. ebay.com. In B2G model, business
organization sells to local, state and federal agencies; e.g.
iGov.com. The C2B model, also called a reverse auction or
demand collection model, enables buyers to name their own
price, often binding, for a specific good or service generating
demand. The website collects the “demand bids” and then
offers the bids to the participating sellers. The examples of
C2B e-commerce models are reverseaution.com and
priceline.com, etc.
So it is the requirement of all the above mentioned e-
commerce model to connect all the departmental workstations
through the intranet. Here the growth of the e-commerce
network may be vertical and / or horizontal; i.e. its growth
may be hybrid. Each department of the organization has its
own data and the data of their customers and all of these data
are stored in the server(s) and all the workstations are
connected to that server to store and retrieve those data as
when required by the respective applications.
According to the 15th annual 2010/2011 CSI Computer
Crime and Security Survey report, it was found that the
“malware infection” type of attack among the other types of
security attack got the highest percentage (67%), that is 67%
of the respondent out of 149 respondents has experienced the
attack of malicious software (virus / worms) into their e-
commerce network. Worms propagate via network
communications in a similar way as a virus spreads among
people. The activity of malware (virus/worms) throughout an
e-commerce network can be captured by using
epidemiological models for disease propagation [1]-[8], [17]-
[21]. Based on the Kermack and McKendrick S-I-R classical
epidemic model [9]-[11], a dynamical mathematical model (S-
Sp-I-Q) for malicious objects propagation is proposed.
II. FORMULATION OF EPIDEMIC MODEL OF WORM SPREAD IN E-
COMMERCE NETWORK
Dynamic models for infectious diseases or computer
malware are mostly based on compartment structures that
were initially proposed by Kermack and McKendrick [9]-[11]
and later developed by other mathematicians. To formulate a
dynamic model or the transmission of an epidemic disease, the
population in a given region is often divided into several
different groups or compartments. Such a model describing
the dynamic relations among these compartments is called a
compartment model. Quarantine being the important remedial
processes for malware attack in e-commerce network, several
researchers developed model taking quarantine as one of the
compartment in the epidemic models [13]-[16].
The total number of nodes (N) in our e-commerce network
is divided into four classes (compartments) : Susceptible (S),
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
44
Susceptible with Protection (Sp), Infected (I), Quarantine (Q).
That is,
S + Sp + I + Q = N (1)
Susceptible(S) Class: This class includes those nodes of the
network which are free from infection i.e. they are healthy but
they have an active potential threat of infection by the
malicious software at any point of time. These nodes do not
include antivirus software.
Susceptible with Protection (Sp) Class: This class includes
those nodes of the network which are protected by the firewall
and/or antivirus software.
Infected (I): The nodes of this class includes the units that have
been infected and which now have the potential to transmit the
malicious software to the rest of the nodes of the population on
having adequate contacts with the Susceptible and ‘Susceptible
with Protection’ class of the population.
Quarantine (Q): This class is used to separate the infectious
nodes which may have been exposed to any infected node to
see if that become affected.
Once the nodes are added to the network it becomes the
member of the S class. Initially all the nodes belong to the S
class. Once the antivirus software is installed into the nodes of
the S class, it moves to the Sp class. If a node from S class is
attacked by any virus or worms, then it moves to the I class.
This model also assumes that the antivirus software may not be
too much effective as it may be an expired version which has
not been updated. In that case the nodes with expired version
of antivirus software, may be moved back to the S class again
or due to attack of antivirus that node may move directly to I
class. This model also assumes that a node from I class may
rescued by cleaning the malware from that node through the
use of updated antivirus software. In that case, it moves back to
the Sp class, otherwise that node is moved to the Q class. The
nodes from the Q class are moved to the S class once it is
confirmed that the node is free from any affect of malware.
The above fact can be shown graphically by using the
following model in Fig. 1.
Fig. 1 (S – Sp – I – Q) Model – An epidemic model for the flow of worms in
the e-commerce network.
The transmission between model classes can be expressed
by the following system of differential equations:
dS / dt = (1- σ) b + µQ + θSp - βSI – γS – dS (2)
dSp / dt = σb + γS + ηI – θSp – dSp – λSp (3)
dI / dt = βSI + λSp – ηI – ξI – dI – αI (4)
dQ / dt = αI – dQ - µQ (5)
where, b is the birth rate (new nodes attached to the network),
d is the natural death rate , i.e; destroying of the computers
because of the reason other than the attack of virus or worms, γ
is the rate of execution of antivirus software initially (i.e; from
class S to class Sp), θ is the rate of transfers of computer nodes
from class Sp to class S, β is the rate of contact from class S to
class I, α is the rate of quarantine from class I to class Q, µ is
the rate of susceptible after recovery from class Q to class S, σ
is the fraction of computer nodes (not belonging to the above
mentioned classes, viz; S, Sp, I, and Q) on which we execute
antivirus software and directly introduced at the class Sp, λ is
the rate by which the nodes from the class Sp are infected by
the malware are transformed to class I, ξ is the death rate
(destroying of computer nodes) due to the attack of malware
and η is the rate by which infected computers are recovered by
updated antivirus and transferred back to the Sp class, i.e;
from class I to class Sp.
Using equation (2), (3) and (4), we get the value of Q, S and
Sp as follows:
Q = [α / (d + µ)] * I (6)
S = [(θ+d+λ)*1/λ*(η+ξ+d+α)] / [(γ*1/I) + {β (θ+d+λ)*1/λ}]
(7)
Sp = 1/λ [η+ξ+d+α-β*[[(θ+d+λ)*1/λ*(η+ξ+d+α)] / [(γ*1/I)
+{β(θ+d+λ)*1/λ}]]]*I (8)
III. ANALYSING THE STABILITY OF THE MODEL BY
USING SIMULATION THROUGH MATLAB
A. Changes of Quarantine nodes over Time:
Fig. 2 Changes of quarantine over time when Q = 10, 20 & 30 respectively
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
45
The above figure (Fig. 2) shows the dynamic behavior of the
system when quarantine nodes are changed over time. The
above figure supports the fact that quarantine is one of the
remedies to make your system stable. It is shown from the
above figure (Fig. 2) that as the time passes, the system
become stable by reducing the population of quarantine class.
B. Changes of Infected nodes over Time:
Fig. 3 Changes of Infected nodes over time when I = 100, 70, 40 and 10
respectively
The above figure (Fig. 3) shows the changes of the population
of infected class over time. It shows that the influence of
antivirus software supersedes the effect of the rate of contact
by the infected nodes.
C. Changes of Infected nodes over the changes of Quarantine
nodes:
Fig. 4 Dynamic behaviour of Infected class versus Quarantine class when
function1: σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04;
ξ=0.03; α=0.08; b=0.07; d=0.01
function2: σ =0.08; µ =0.06; θ =0.08; β =0.05; γ =0.03; η =0.05; λ =0.05;
ξ=0.04; α=0.09; b=0.09; d=0.02
The above figure (Figure 4) shows the stability of the system
by simulating the changes in infected classes over the changes
in quarantine classes. It shows that, as the numbers of infected
nodes are detached from the network, the population of nodes
in infected class decreases.
D. Susceptible with Protection versus Quarantine:
Fig. 5 Dynamic behavior of Quarantine class versus Susceptible with
Protection class when
function1: σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04;
ξ=0.03; α=0.08; b=0.07; d=0.01
function2: σ =0.08; µ=0.06; θ =0.08; β =0.05; γ =0.03; η =0.05; λ =0.05;
ξ=0.04; α=0.09; b=0.09; d=0.02
The population of nodes where the anti-virus software is
installed and which are not yet affected by the malware are
placed into the class called Susceptible with Protection class.
The above figure (Fig. 5) shows that as we add more nodes
with anti-virus software installed in it into the network, initially
it may increase the quarantine nodes of that network, but
finally, it may decrease the quarantine nodes from the network.
And it may increase the throughput of the overall network.
E. Susceptible with Protection versus Infected:
Fig. 6 Dynamic behavior of Infected class versus Susceptible with Protection
class when
function1: σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04;
ξ=0.03; α=0.08; b=0.07; d=0.01
function2: σ =0.08; µ =0.06; θ =0.08; β =0.05; γ =0.03; η =0.05; λ =0.05;
ξ =0.04; α=0.09; b=0.09; d=0.02
function3: σ =0.09; µ =0.04; θ =0.07; β =0.07; γ =0.05; η =0.06; λ =0.03;
ξ =0.06; α =0.07; b=0.08; d=0.03
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
46
The more we add the nodes which contain antivirus software
installed in it into the network, the more it is likely that more
nodes will be affected by the malware. This fact is also
reflected in the above mentioned figure (Figure 6). It may
happen due to non-updating of the antivirus software of the
organization or the introduction of a new malware which are
not been treated by the current antivirus software of that
organization. So it is the responsibility of organization to
reduce the number of infected nodes by recovering the infected
nodes using the updated antivirus software.
F. Behavior of Different Classes of Nodes With Respect To
Time:
Fig. 7 Dynamic Behavior of Different Classes of Nodes with Respect to Time
when σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04; ξ=0.03;
α=0.08; b=0.07; d=0.01
Our proposed model contains four classes of nodes, viz;
Susceptible(S) - Susceptible with Protection (Sp) – Infected (I)
- Quarantine (Q) to represent the propagation of worms in e-
commerce network.
The above figure (Figure 7) shows the dynamic behavior
of different classes of nodes with respect to time. Initially the
number of nodes in the S class decreases drastically due to its
transfer into the Sp class by installing the antivirus software
into it and then it maintain a stable number of nodes in it. The
nodes in Sp and Q classes increase initially and then decreases
with time.
Installation of updated antivirus may contribute to the
increase of nodes in Sp classes. The above figure shows the
sudden increase of nodes in I class due to the non identification
of the presence of the malware in the network. Once the
malware is identified and removed by the updated antivirus
software, it contributes to the sharp decrease in the number of
nodes in I class.
IV. CONCLUSION
Understanding the cyber threat is the first step in defending
against it [12]. There are many issues involved in securing the
e-commerce network which is connected to the internet, e.g.;
Malware infection, Being fraudulently represented as sender of
phishing messages, Password sniffing, Denial of Service, etc.;
out of which the malware infection continued to be the most
commonly seen attack (2010 CSI Computer Crime and
Security Survey). The spread of worms in the e-commerce
network is epidemic in nature. We have developed an epidemic
model for the spread of worms in e-commerce network where
infected nodes are quarantined from the network. We have also
used MATALB to simulate and analyze the behavior of
different classes’ of nodes among themselves and with respect
to time to study the stability of the system. We observed that
quarantining the highly infectious e-commerce nodes have
positive contribution to the stability of the system. Continuous
study of the system at different states of the e-commerce
network may contribute to the stability of the system.
REFERENCES
[1] B.K. Mishra, S.K. Pandey, Dynamic Model of worms with vertical
transmission in computer network, Appl. Math. Comput. 217 (21) (2011)
8438–8446, Elsevier.
[2] B.K. Mishra, S.K. Pandey, Fuzzy epidemic model for the transmission of
worms in computer network, Nonlinear Anal.: Real world Appl. 11 (2010)
4335–4341.
[3] B.K. Mishra, S.K. Pandey, Effect of antivirus software on infectious nodes
in computer network: a mathematical model, Phys. Lett. A 376 (2012) 2389–
2393. Elsevier.
[4] Erol Gelenbe, Varol Kaptan, YuWang, Biological metaphors for agent
behaviour, in: Computer and Information SciencesISCIS 2004, 19th
International Symposium, in: Lecturer Notes in Computer Science, vol. 3280,
Springer-Verlag, 2004, pp. 667-675.
[5] Bimal Kumar Mishra, Navnit Jha, Fixed period of temporary immunity
after run of anti-malicious software on computer nodes, Appl. Math. Comput.
190 (2), 2007, 1207-1212.
[6] J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models
applied to virus in computer network, J. Comput. Sci. 1 (1), 2005, 31-34.
[7] S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself
discrimination in a computer, in: Proceeding of IEEE Symposium on
Computer Security and Privacy, 1994, pp. 202-212.
[8] Y.Wang, C.X.Wang, Modelling the effect of timing parameters on virus
propagation, in: 2003 ACM Workshop on Rapid Malcode, ACM, 2003, pp.
61-66.
[9] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory
to epidemics, Proc. R. Soc. Lond. Ser. A 115, 1927, 700-721.
[10] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory
to epidemics, Proc. R. Soc. Lond. Ser. A 138, 1932, 55-83.
[11] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory
to epidemics, Proc. R. Soc. Lond. Ser. A 141, 1933, 94-122.
[12]http://www.ncxgroup.com/wpontent/uploads/2012/02/CSIsurvey2010.pdf
[13] Bimal Kumar Mishra and Navnit Jha(ELSEVIER),SEIQRS model for
the trans-mission of malicious objects in computer nework,34(2010)710-715.
[14] D.Moore, C.Shannon, G.M.Voelker, S. Savage, Internet quarantine:
requirements for containing self C propagating code, in: Proceedings of IEEE
INFOCOM
2003, IEEE, 2003.
[15] P. De, Y. Liu, S.K. Das, An epidemic theoretic framework for evaluating
broad-cast p protocols in wireless sensor networks, in: Proc. IEEE (Intl Conf.
on Mobile Adhoc and sensor systems (MASS), (Pisa, Italy), Oct. 2007.
[16] C.C. Zou, W. Gong, D. Towsley, Worm propagation modelling and
analysis under dynamic quarantine defence, in: Proceedings of the ACM
CCSWorkshop on Rapid Malcode, ACM, 2003, pp. 51C60.
[17] Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of
malicious objects in computer network, Appl. Math. Model. 34 (2010) 710-
715.
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
47
[18] J.R.C. Piqueira, F.B. Cesar, Dynamic models for computer virus
propagation, Math. Probl. Eng. doi:10.1155/2008/940526.
[19] E. Gelenbe, Dealing with software viruses: a biological paradigm, Inform.
Secur. Tech. Rep. 12 (4), 2007, 242-250.
[20] Erol Gelenbe, Keeping viruses under control, in: Computer and
Information Sciences-ISCIS 2005, 20th International Symposium, in: Lecturer
Notes in Computer Science, vol. 3733, Springer, 2005..
[21] Ma.M Williamson, J. Leill, An epidemiological model of virus spread
and cleanup, 2003; http://www.hpl.hp.com/techreports/.
BIBLIOGRAPHY
[1] Dave Chaffy; E-Business and E-Commerce Management, 3e; Pearson
[LPE]
[2] Vladimir Zwass; Electronic Commerce and Organizational Innovation:
Aspects and Opportunities, Spring, 2003.
[3] P.T. Joseph, S.J; E-Commerce – An Indian Perspective, 3e; PHI [EEE]
[4] R. M. Anderson, R.M. May, Infectious Diseases of Humans, Oxford Univ.
Press, London/New York, 1991.
[5] V. Lakshmikantham, S. Leela, Differential and Integral Inequalities:
Theory and Applications, Academic Press, New York, 1969.
Proceedings of International Conference on Advances in Engineering and Technology
www.iaetsd.in
ISBN : 978 - 1505606395
International Association of Engineering and Technology for Skill Development
48

More Related Content

What's hot

Data-driven Studies on Social Networks: Privacy and Simulation
Data-driven Studies on Social Networks: Privacy and SimulationData-driven Studies on Social Networks: Privacy and Simulation
Data-driven Studies on Social Networks: Privacy and SimulationSameera Horawalavithana
 
Mentions of Security Vulnerabilities on Reddit, Twitter and GitHub
Mentions of Security Vulnerabilities on Reddit, Twitter and GitHubMentions of Security Vulnerabilities on Reddit, Twitter and GitHub
Mentions of Security Vulnerabilities on Reddit, Twitter and GitHubSameera Horawalavithana
 
Automated malware invariant generation
Automated malware invariant generationAutomated malware invariant generation
Automated malware invariant generationUltraUploader
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficAlexander Decker
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionIOSR Journals
 
友人関係と感染症伝搬をネットワークで理解する
友人関係と感染症伝搬をネットワークで理解する友人関係と感染症伝搬をネットワークで理解する
友人関係と感染症伝搬をネットワークで理解するtm1966
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilaslicservernoida
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decgusbarrett
 

What's hot (9)

Data-driven Studies on Social Networks: Privacy and Simulation
Data-driven Studies on Social Networks: Privacy and SimulationData-driven Studies on Social Networks: Privacy and Simulation
Data-driven Studies on Social Networks: Privacy and Simulation
 
Mentions of Security Vulnerabilities on Reddit, Twitter and GitHub
Mentions of Security Vulnerabilities on Reddit, Twitter and GitHubMentions of Security Vulnerabilities on Reddit, Twitter and GitHub
Mentions of Security Vulnerabilities on Reddit, Twitter and GitHub
 
Automated malware invariant generation
Automated malware invariant generationAutomated malware invariant generation
Automated malware invariant generation
 
Lab 1 4-5
Lab 1 4-5Lab 1 4-5
Lab 1 4-5
 
Probabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network trafficProbabilistic models for anomaly detection based on usage of network traffic
Probabilistic models for anomaly detection based on usage of network traffic
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant Extraction
 
友人関係と感染症伝搬をネットワークで理解する
友人関係と感染症伝搬をネットワークで理解する友人関係と感染症伝搬をネットワークで理解する
友人関係と感染症伝搬をネットワークで理解する
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 

Similar to Iaetsd attacking behaviour of computer worms on

An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupUltraUploader
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicModeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicIOSR Journals
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networksPvrtechnologies Nellore
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks1crore projects
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelIRJET Journal
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyGovernment
 
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...IJCNCJournal
 
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxStuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxpicklesvalery
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityOnline Business
 

Similar to Iaetsd attacking behaviour of computer worms on (20)

An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanup
 
H1803025360
H1803025360H1803025360
H1803025360
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
I017134347
I017134347I017134347
I017134347
 
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus EpidemicModeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
Modeling and Threshold Sensitivity Analysis of Computer Virus Epidemic
 
X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Malware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale NetworksMalware Propagation in Large-Scale Networks
Malware Propagation in Large-Scale Networks
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
A COMPUTER VIRUS PROPAGATION MODEL USING DELAY DIFFERENTIAL EQUATIONS WITH PR...
 
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxStuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
 
C018131821
C018131821C018131821
C018131821
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Iaetsd attacking behaviour of computer worms on

  • 1. Attacking Behaviour of Computer Worms on E-Commerce Network: A Dynamic Model Biswarup Samanta#1 , Samir Kumar Pandey (S.K. Pandey)#2 #1 Department of Computer Science, Usha Martin Academy, Ranchi, India #2 Department of Mathematical Sciences, Polytecnico di Torino, Turin, Italy #1 biswarup.k@gmail.com (B. Samanta), #2 samir.phd2009@gmail.com (S.K. Pandey) Abstract— The growth of Information System of any organization is not revolutionary, but it is evolutionary. The organization may start their computer network by connecting the few nodes from the very selective number of departments. As the time passes, the computer network of the organization also grows with the growth of their business. When the e-commerce of the organization is in maturity stage, it can capture/perform the transactions between the organization and its suppliers, between the organization and its customers and the transactions within the organization. Now the biggest threat to this e-commerce network is the presence of malware (worms, virus, etc.) within the network. To counter the attack of malware to the network several approaches are taken, out of which uses of antivirus is very popular and effective approach. Here in this paper, using epidemic model, we propose Susceptible(S) - Susceptible with Protection (Sp) - Infected (I) - Quarantine (Q) (S-Sp-I-Q) model to capture the dynamics of worm propagation in the e-commerce network. We have also used MATLAB to simulate and analyze the behaviour of different classes of nodes of the proposed model, among each other and with respect to time. Keywords— e-commerce, virus, worms, epidemic model, dynamic model, mathematical model, security I. INTRODUCTION Online shopping is the buzzword in today’s world. Top organizations from various industries like banking, finance, automobiles, retail, telecomm, education are using their ecommerce network to reach to their customer or vice-versa. Customers are using the client software at their end, which may be desktop, laptop or mobile and searching for their required products or services and then they are placing their order to that organization through the browser. And the organization seating at the server side, using server software, getting the order placed by their customer. Then this order propagates through various departments of that organization, which are connected through intranet and finally the product is manufactured or outsourced and delivered to their customer and the customer can also make the payment online through a third party. The category of ecommerce which is discussed above is known as B2C type ecommerce. Examples of B2C type ecommerce are amazone.com, flipkart.com, etc. Similarly we have other categories of ecommerce like B2B, C2C, B2G, C2B, etc. In B2B type ecommerce, the business organization sells products or services to other business organizations or brings multiple buyers and sellers together in a central marketplace; e.g. metalsite.com. In C2C type ecommerce, consumers sell directly to other consumers via online classified ads and auctions or by selling personal services or expertise online, e.g. ebay.com. In B2G model, business organization sells to local, state and federal agencies; e.g. iGov.com. The C2B model, also called a reverse auction or demand collection model, enables buyers to name their own price, often binding, for a specific good or service generating demand. The website collects the “demand bids” and then offers the bids to the participating sellers. The examples of C2B e-commerce models are reverseaution.com and priceline.com, etc. So it is the requirement of all the above mentioned e- commerce model to connect all the departmental workstations through the intranet. Here the growth of the e-commerce network may be vertical and / or horizontal; i.e. its growth may be hybrid. Each department of the organization has its own data and the data of their customers and all of these data are stored in the server(s) and all the workstations are connected to that server to store and retrieve those data as when required by the respective applications. According to the 15th annual 2010/2011 CSI Computer Crime and Security Survey report, it was found that the “malware infection” type of attack among the other types of security attack got the highest percentage (67%), that is 67% of the respondent out of 149 respondents has experienced the attack of malicious software (virus / worms) into their e- commerce network. Worms propagate via network communications in a similar way as a virus spreads among people. The activity of malware (virus/worms) throughout an e-commerce network can be captured by using epidemiological models for disease propagation [1]-[8], [17]- [21]. Based on the Kermack and McKendrick S-I-R classical epidemic model [9]-[11], a dynamical mathematical model (S- Sp-I-Q) for malicious objects propagation is proposed. II. FORMULATION OF EPIDEMIC MODEL OF WORM SPREAD IN E- COMMERCE NETWORK Dynamic models for infectious diseases or computer malware are mostly based on compartment structures that were initially proposed by Kermack and McKendrick [9]-[11] and later developed by other mathematicians. To formulate a dynamic model or the transmission of an epidemic disease, the population in a given region is often divided into several different groups or compartments. Such a model describing the dynamic relations among these compartments is called a compartment model. Quarantine being the important remedial processes for malware attack in e-commerce network, several researchers developed model taking quarantine as one of the compartment in the epidemic models [13]-[16]. The total number of nodes (N) in our e-commerce network is divided into four classes (compartments) : Susceptible (S), Proceedings of International Conference on Advances in Engineering and Technology www.iaetsd.in ISBN : 978 - 1505606395 International Association of Engineering and Technology for Skill Development 44
  • 2. Susceptible with Protection (Sp), Infected (I), Quarantine (Q). That is, S + Sp + I + Q = N (1) Susceptible(S) Class: This class includes those nodes of the network which are free from infection i.e. they are healthy but they have an active potential threat of infection by the malicious software at any point of time. These nodes do not include antivirus software. Susceptible with Protection (Sp) Class: This class includes those nodes of the network which are protected by the firewall and/or antivirus software. Infected (I): The nodes of this class includes the units that have been infected and which now have the potential to transmit the malicious software to the rest of the nodes of the population on having adequate contacts with the Susceptible and ‘Susceptible with Protection’ class of the population. Quarantine (Q): This class is used to separate the infectious nodes which may have been exposed to any infected node to see if that become affected. Once the nodes are added to the network it becomes the member of the S class. Initially all the nodes belong to the S class. Once the antivirus software is installed into the nodes of the S class, it moves to the Sp class. If a node from S class is attacked by any virus or worms, then it moves to the I class. This model also assumes that the antivirus software may not be too much effective as it may be an expired version which has not been updated. In that case the nodes with expired version of antivirus software, may be moved back to the S class again or due to attack of antivirus that node may move directly to I class. This model also assumes that a node from I class may rescued by cleaning the malware from that node through the use of updated antivirus software. In that case, it moves back to the Sp class, otherwise that node is moved to the Q class. The nodes from the Q class are moved to the S class once it is confirmed that the node is free from any affect of malware. The above fact can be shown graphically by using the following model in Fig. 1. Fig. 1 (S – Sp – I – Q) Model – An epidemic model for the flow of worms in the e-commerce network. The transmission between model classes can be expressed by the following system of differential equations: dS / dt = (1- σ) b + µQ + θSp - βSI – γS – dS (2) dSp / dt = σb + γS + ηI – θSp – dSp – λSp (3) dI / dt = βSI + λSp – ηI – ξI – dI – αI (4) dQ / dt = αI – dQ - µQ (5) where, b is the birth rate (new nodes attached to the network), d is the natural death rate , i.e; destroying of the computers because of the reason other than the attack of virus or worms, γ is the rate of execution of antivirus software initially (i.e; from class S to class Sp), θ is the rate of transfers of computer nodes from class Sp to class S, β is the rate of contact from class S to class I, α is the rate of quarantine from class I to class Q, µ is the rate of susceptible after recovery from class Q to class S, σ is the fraction of computer nodes (not belonging to the above mentioned classes, viz; S, Sp, I, and Q) on which we execute antivirus software and directly introduced at the class Sp, λ is the rate by which the nodes from the class Sp are infected by the malware are transformed to class I, ξ is the death rate (destroying of computer nodes) due to the attack of malware and η is the rate by which infected computers are recovered by updated antivirus and transferred back to the Sp class, i.e; from class I to class Sp. Using equation (2), (3) and (4), we get the value of Q, S and Sp as follows: Q = [α / (d + µ)] * I (6) S = [(θ+d+λ)*1/λ*(η+ξ+d+α)] / [(γ*1/I) + {β (θ+d+λ)*1/λ}] (7) Sp = 1/λ [η+ξ+d+α-β*[[(θ+d+λ)*1/λ*(η+ξ+d+α)] / [(γ*1/I) +{β(θ+d+λ)*1/λ}]]]*I (8) III. ANALYSING THE STABILITY OF THE MODEL BY USING SIMULATION THROUGH MATLAB A. Changes of Quarantine nodes over Time: Fig. 2 Changes of quarantine over time when Q = 10, 20 & 30 respectively Proceedings of International Conference on Advances in Engineering and Technology www.iaetsd.in ISBN : 978 - 1505606395 International Association of Engineering and Technology for Skill Development 45
  • 3. The above figure (Fig. 2) shows the dynamic behavior of the system when quarantine nodes are changed over time. The above figure supports the fact that quarantine is one of the remedies to make your system stable. It is shown from the above figure (Fig. 2) that as the time passes, the system become stable by reducing the population of quarantine class. B. Changes of Infected nodes over Time: Fig. 3 Changes of Infected nodes over time when I = 100, 70, 40 and 10 respectively The above figure (Fig. 3) shows the changes of the population of infected class over time. It shows that the influence of antivirus software supersedes the effect of the rate of contact by the infected nodes. C. Changes of Infected nodes over the changes of Quarantine nodes: Fig. 4 Dynamic behaviour of Infected class versus Quarantine class when function1: σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04; ξ=0.03; α=0.08; b=0.07; d=0.01 function2: σ =0.08; µ =0.06; θ =0.08; β =0.05; γ =0.03; η =0.05; λ =0.05; ξ=0.04; α=0.09; b=0.09; d=0.02 The above figure (Figure 4) shows the stability of the system by simulating the changes in infected classes over the changes in quarantine classes. It shows that, as the numbers of infected nodes are detached from the network, the population of nodes in infected class decreases. D. Susceptible with Protection versus Quarantine: Fig. 5 Dynamic behavior of Quarantine class versus Susceptible with Protection class when function1: σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04; ξ=0.03; α=0.08; b=0.07; d=0.01 function2: σ =0.08; µ=0.06; θ =0.08; β =0.05; γ =0.03; η =0.05; λ =0.05; ξ=0.04; α=0.09; b=0.09; d=0.02 The population of nodes where the anti-virus software is installed and which are not yet affected by the malware are placed into the class called Susceptible with Protection class. The above figure (Fig. 5) shows that as we add more nodes with anti-virus software installed in it into the network, initially it may increase the quarantine nodes of that network, but finally, it may decrease the quarantine nodes from the network. And it may increase the throughput of the overall network. E. Susceptible with Protection versus Infected: Fig. 6 Dynamic behavior of Infected class versus Susceptible with Protection class when function1: σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04; ξ=0.03; α=0.08; b=0.07; d=0.01 function2: σ =0.08; µ =0.06; θ =0.08; β =0.05; γ =0.03; η =0.05; λ =0.05; ξ =0.04; α=0.09; b=0.09; d=0.02 function3: σ =0.09; µ =0.04; θ =0.07; β =0.07; γ =0.05; η =0.06; λ =0.03; ξ =0.06; α =0.07; b=0.08; d=0.03 Proceedings of International Conference on Advances in Engineering and Technology www.iaetsd.in ISBN : 978 - 1505606395 International Association of Engineering and Technology for Skill Development 46
  • 4. The more we add the nodes which contain antivirus software installed in it into the network, the more it is likely that more nodes will be affected by the malware. This fact is also reflected in the above mentioned figure (Figure 6). It may happen due to non-updating of the antivirus software of the organization or the introduction of a new malware which are not been treated by the current antivirus software of that organization. So it is the responsibility of organization to reduce the number of infected nodes by recovering the infected nodes using the updated antivirus software. F. Behavior of Different Classes of Nodes With Respect To Time: Fig. 7 Dynamic Behavior of Different Classes of Nodes with Respect to Time when σ =0.09; µ =0.05; θ =0.07; β =0.03; γ =0.02; η=0.06; λ=0.04; ξ=0.03; α=0.08; b=0.07; d=0.01 Our proposed model contains four classes of nodes, viz; Susceptible(S) - Susceptible with Protection (Sp) – Infected (I) - Quarantine (Q) to represent the propagation of worms in e- commerce network. The above figure (Figure 7) shows the dynamic behavior of different classes of nodes with respect to time. Initially the number of nodes in the S class decreases drastically due to its transfer into the Sp class by installing the antivirus software into it and then it maintain a stable number of nodes in it. The nodes in Sp and Q classes increase initially and then decreases with time. Installation of updated antivirus may contribute to the increase of nodes in Sp classes. The above figure shows the sudden increase of nodes in I class due to the non identification of the presence of the malware in the network. Once the malware is identified and removed by the updated antivirus software, it contributes to the sharp decrease in the number of nodes in I class. IV. CONCLUSION Understanding the cyber threat is the first step in defending against it [12]. There are many issues involved in securing the e-commerce network which is connected to the internet, e.g.; Malware infection, Being fraudulently represented as sender of phishing messages, Password sniffing, Denial of Service, etc.; out of which the malware infection continued to be the most commonly seen attack (2010 CSI Computer Crime and Security Survey). The spread of worms in the e-commerce network is epidemic in nature. We have developed an epidemic model for the spread of worms in e-commerce network where infected nodes are quarantined from the network. We have also used MATALB to simulate and analyze the behavior of different classes’ of nodes among themselves and with respect to time to study the stability of the system. We observed that quarantining the highly infectious e-commerce nodes have positive contribution to the stability of the system. Continuous study of the system at different states of the e-commerce network may contribute to the stability of the system. REFERENCES [1] B.K. Mishra, S.K. Pandey, Dynamic Model of worms with vertical transmission in computer network, Appl. Math. Comput. 217 (21) (2011) 8438–8446, Elsevier. [2] B.K. Mishra, S.K. Pandey, Fuzzy epidemic model for the transmission of worms in computer network, Nonlinear Anal.: Real world Appl. 11 (2010) 4335–4341. [3] B.K. Mishra, S.K. Pandey, Effect of antivirus software on infectious nodes in computer network: a mathematical model, Phys. Lett. A 376 (2012) 2389– 2393. Elsevier. [4] Erol Gelenbe, Varol Kaptan, YuWang, Biological metaphors for agent behaviour, in: Computer and Information SciencesISCIS 2004, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 3280, Springer-Verlag, 2004, pp. 667-675. [5] Bimal Kumar Mishra, Navnit Jha, Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Appl. Math. Comput. 190 (2), 2007, 1207-1212. [6] J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models applied to virus in computer network, J. Comput. Sci. 1 (1), 2005, 31-34. [7] S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp. 202-212. [8] Y.Wang, C.X.Wang, Modelling the effect of timing parameters on virus propagation, in: 2003 ACM Workshop on Rapid Malcode, ACM, 2003, pp. 61-66. [9] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115, 1927, 700-721. [10] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138, 1932, 55-83. [11] W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141, 1933, 94-122. [12]http://www.ncxgroup.com/wpontent/uploads/2012/02/CSIsurvey2010.pdf [13] Bimal Kumar Mishra and Navnit Jha(ELSEVIER),SEIQRS model for the trans-mission of malicious objects in computer nework,34(2010)710-715. [14] D.Moore, C.Shannon, G.M.Voelker, S. Savage, Internet quarantine: requirements for containing self C propagating code, in: Proceedings of IEEE INFOCOM 2003, IEEE, 2003. [15] P. De, Y. Liu, S.K. Das, An epidemic theoretic framework for evaluating broad-cast p protocols in wireless sensor networks, in: Proc. IEEE (Intl Conf. on Mobile Adhoc and sensor systems (MASS), (Pisa, Italy), Oct. 2007. [16] C.C. Zou, W. Gong, D. Towsley, Worm propagation modelling and analysis under dynamic quarantine defence, in: Proceedings of the ACM CCSWorkshop on Rapid Malcode, ACM, 2003, pp. 51C60. [17] Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model. 34 (2010) 710- 715. Proceedings of International Conference on Advances in Engineering and Technology www.iaetsd.in ISBN : 978 - 1505606395 International Association of Engineering and Technology for Skill Development 47
  • 5. [18] J.R.C. Piqueira, F.B. Cesar, Dynamic models for computer virus propagation, Math. Probl. Eng. doi:10.1155/2008/940526. [19] E. Gelenbe, Dealing with software viruses: a biological paradigm, Inform. Secur. Tech. Rep. 12 (4), 2007, 242-250. [20] Erol Gelenbe, Keeping viruses under control, in: Computer and Information Sciences-ISCIS 2005, 20th International Symposium, in: Lecturer Notes in Computer Science, vol. 3733, Springer, 2005.. [21] Ma.M Williamson, J. Leill, An epidemiological model of virus spread and cleanup, 2003; http://www.hpl.hp.com/techreports/. BIBLIOGRAPHY [1] Dave Chaffy; E-Business and E-Commerce Management, 3e; Pearson [LPE] [2] Vladimir Zwass; Electronic Commerce and Organizational Innovation: Aspects and Opportunities, Spring, 2003. [3] P.T. Joseph, S.J; E-Commerce – An Indian Perspective, 3e; PHI [EEE] [4] R. M. Anderson, R.M. May, Infectious Diseases of Humans, Oxford Univ. Press, London/New York, 1991. [5] V. Lakshmikantham, S. Leela, Differential and Integral Inequalities: Theory and Applications, Academic Press, New York, 1969. Proceedings of International Conference on Advances in Engineering and Technology www.iaetsd.in ISBN : 978 - 1505606395 International Association of Engineering and Technology for Skill Development 48