SlideShare a Scribd company logo
Virus Spread on a Network
Stacey Whitfield, Jean-Marie Nshimiyimana, Viktor Kuvila, Felesia Stukes
swhitfi2@email.cpcc.edu, jnshimi0@email.cpcc.edu, vnk794c6@email.cpcc.edu, felesia.stukes@cpcc.edu
NetLogo modeling software Excel worksheet of collected data
Impact
• Boosting virus-check-frequency from
1 to 5 time per week (graph below)
• Lowered susceptibility to virus by
approximately 25 %
• Increased resistance to virus by
approximately 30 %
• Increasing gain-resistance-chance
to simulate updated virus definition
software from 20% to 95%
• Lowered susceptibility to 0 %
• Increased resistance to 100 %
•Increasing or decreasing network
size has shown no effect on results.
Future Work
NetLogo has many opportunities for
code modification. Altering code to
model a mutating virus is one of many
future research concepts in this area
of study.
Modified NetLogo model to expand research
Conclusions
• Through regular virus scans on each
machine, the network’s security may
greatly improve.
• Updated virus protection software is
crucial for early detection on any
network.
• Network size is irrelevant in this
matter.
Initiative
• Researching known virus behavior
we have gained insight to data
already discovered by scientists.
• Using collected information our team
looked for ways to improve security
measures.
• Running NetLogo model, data
was gathered into Excel.
• Test data was then used to graph
a scatter plot of results.
Introduction
We believe through our model
research that we can gain insight to
improvement of security on networks.
Using NetLogo modeling software, a
virus is modeled and traced through a
virtual network.
This network experiment altered three
variables: virus-check-frequency,
gain-resistance-chance and network-
size. With respect to the scientific
method, our hypothesis was
confirmed through multiple trial runs
of this model.
Graph of resultant changes

More Related Content

Similar to Research Poster Virus Spread On a Network_STARS_

Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Oscar Romano
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Mandar Kharkar
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection securityIBM Security
 
An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagationUltraUploader
 
仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性
仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性
仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性Itaru Kaneko
 
An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupUltraUploader
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 worldOutpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 worldOutpost24
 
Protecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareProtecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareGFI Software
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malwareDigital Pymes
 
Effective Prioritization Through Exploit Prediction
Effective Prioritization Through Exploit Prediction Effective Prioritization Through Exploit Prediction
Effective Prioritization Through Exploit Prediction Jonathan Cran
 
Failure Of Antivirus
Failure Of AntivirusFailure Of Antivirus
Failure Of Antivirusamarnath
 
Pinning control of disease networks
Pinning control of disease networksPinning control of disease networks
Pinning control of disease networksEben du Toit
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Antivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsAntivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsUltraUploader
 
Symantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - InsightsSymantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - InsightsSymantec Website Security
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetUltraUploader
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 

Similar to Research Poster Virus Spread On a Network_STARS_ (20)

Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016
 
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Infographic network protection security
Infographic network protection securityInfographic network protection security
Infographic network protection security
 
An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagation
 
仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性
仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性
仮想ウイルスの感染率が不均衡な多次元超立方体ネットワーク内での接触検出の有効性
 
An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanup
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 worldOutpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
 
Protecting Against the New Wave of Malware
Protecting Against the New Wave of MalwareProtecting Against the New Wave of Malware
Protecting Against the New Wave of Malware
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
 
35
3535
35
 
Effective Prioritization Through Exploit Prediction
Effective Prioritization Through Exploit Prediction Effective Prioritization Through Exploit Prediction
Effective Prioritization Through Exploit Prediction
 
Failure Of Antivirus
Failure Of AntivirusFailure Of Antivirus
Failure Of Antivirus
 
Pinning control of disease networks
Pinning control of disease networksPinning control of disease networks
Pinning control of disease networks
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Antivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendorsAntivirus update reaction times of major antivirus vendors
Antivirus update reaction times of major antivirus vendors
 
Symantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - InsightsSymantec Website Security Threat Report - Insights
Symantec Website Security Threat Report - Insights
 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internet
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 

Research Poster Virus Spread On a Network_STARS_

  • 1. Virus Spread on a Network Stacey Whitfield, Jean-Marie Nshimiyimana, Viktor Kuvila, Felesia Stukes swhitfi2@email.cpcc.edu, jnshimi0@email.cpcc.edu, vnk794c6@email.cpcc.edu, felesia.stukes@cpcc.edu NetLogo modeling software Excel worksheet of collected data Impact • Boosting virus-check-frequency from 1 to 5 time per week (graph below) • Lowered susceptibility to virus by approximately 25 % • Increased resistance to virus by approximately 30 % • Increasing gain-resistance-chance to simulate updated virus definition software from 20% to 95% • Lowered susceptibility to 0 % • Increased resistance to 100 % •Increasing or decreasing network size has shown no effect on results. Future Work NetLogo has many opportunities for code modification. Altering code to model a mutating virus is one of many future research concepts in this area of study. Modified NetLogo model to expand research Conclusions • Through regular virus scans on each machine, the network’s security may greatly improve. • Updated virus protection software is crucial for early detection on any network. • Network size is irrelevant in this matter. Initiative • Researching known virus behavior we have gained insight to data already discovered by scientists. • Using collected information our team looked for ways to improve security measures. • Running NetLogo model, data was gathered into Excel. • Test data was then used to graph a scatter plot of results. Introduction We believe through our model research that we can gain insight to improvement of security on networks. Using NetLogo modeling software, a virus is modeled and traced through a virtual network. This network experiment altered three variables: virus-check-frequency, gain-resistance-chance and network- size. With respect to the scientific method, our hypothesis was confirmed through multiple trial runs of this model. Graph of resultant changes