SlideShare a Scribd company logo
1 of 1
Impulse Technologies
                                      Beacons U to World of technology
        044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
                   A Stochastic Model of Multivirus Dynamics
   Abstract—
         Understanding the spreading dynamics of computer viruses (worms, attacks)
   is an important research problem, and has received much attention from the
   communities of both computer security and statistical physics. However, previous
   studies have mainly focused on single-virus spreading dynamics. In this paper, we
   study multivirus spreading dynamics, where multiple viruses attempt to infect
   computers while possibly combating against each other because, for example, they
   are controlled by multiple botmasters. Specifically, we propose and analyze a
   general model (and its two special cases) of multivirus spreading dynamics in
   arbitrary networks (i.e., we do not make any restriction on network topologies),
   where the viruses may or may not coreside on computers. Our model offers
   analytical results for addressing questions such as: What are the sufficient
   conditions (also known as epidemic thresholds) under which the multiple viruses
   will die out? What if some viruses can "rob” others? What characteristics does the
   multivirus epidemic dynamics exhibit when the viruses are (approximately)
   equally powerful? The analytical results make a fundamental connection between
   two types of factors: defense capability and network connectivity. This allows us to
   draw various insights that can be used to guide security defense.




  Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
                                                                                          1

More Related Content

What's hot

What's hot (8)

Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
25
2525
25
 
Scalable Access Control For Privacy-Aware Media Sharing
Scalable Access Control For Privacy-Aware Media SharingScalable Access Control For Privacy-Aware Media Sharing
Scalable Access Control For Privacy-Aware Media Sharing
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Personalized Sensing System
Personalized Sensing SystemPersonalized Sensing System
Personalized Sensing System
 
I’m going to go... stalk... Lenny and Carl...
I’m going to go... stalk... Lenny and Carl...I’m going to go... stalk... Lenny and Carl...
I’m going to go... stalk... Lenny and Carl...
 

Similar to 35

X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
IJECEIAES
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
UltraUploader
 
An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanup
UltraUploader
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
UltraUploader
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
Government
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagation
UltraUploader
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
UltraUploader
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
deepikareddy123
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
deepikareddy123
 
An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...
Shakas Technologie
 
A framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infectionA framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infection
UltraUploader
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
UltraUploader
 
A potency relation for worms and next generation attack tools
A potency relation for worms and next generation attack toolsA potency relation for worms and next generation attack tools
A potency relation for worms and next generation attack tools
UltraUploader
 

Similar to 35 (20)

X-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligenceX-ware: a proof of concept malware utilizing artificial intelligence
X-ware: a proof of concept malware utilizing artificial intelligence
 
Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...Application of hardware accelerated extensible network nodes for internet wor...
Application of hardware accelerated extensible network nodes for internet wor...
 
Search Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software DiversificationSearch Diverse Models for Proactive Software Diversification
Search Diverse Models for Proactive Software Diversification
 
An epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanupAn epidemiological model of virus spread and cleanup
An epidemiological model of virus spread and cleanup
 
H1803025360
H1803025360H1803025360
H1803025360
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
A computational model of computer virus propagation
A computational model of computer virus propagationA computational model of computer virus propagation
A computational model of computer virus propagation
 
Modeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning WormsModeling and Containment of Uniform Scanning Worms
Modeling and Containment of Uniform Scanning Worms
 
A generic virus detection agent on the internet
A generic virus detection agent on the internetA generic virus detection agent on the internet
A generic virus detection agent on the internet
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
2011 modeling and detection of camouflaging worm
2011   modeling and detection of camouflaging worm2011   modeling and detection of camouflaging worm
2011 modeling and detection of camouflaging worm
 
An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...An optimal distributed malware defense system for mobile networks with hetero...
An optimal distributed malware defense system for mobile networks with hetero...
 
19
1919
19
 
A framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infectionA framework for modelling trojans and computer virus infection
A framework for modelling trojans and computer virus infection
 
A network worm vaccine architecture
A network worm vaccine architectureA network worm vaccine architecture
A network worm vaccine architecture
 
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
JPJ1451  Optimal Distributed Malware Defense in Mobile Networks with Heteroge...JPJ1451  Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
 
A potency relation for worms and next generation attack tools
A potency relation for worms and next generation attack toolsA potency relation for worms and next generation attack tools
A potency relation for worms and next generation attack tools
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 

More from ieeeprojectsvadapalani

More from ieeeprojectsvadapalani (20)

59
5959
59
 
58
5858
58
 
57
5757
57
 
56
5656
56
 
55
5555
55
 
54
5454
54
 
53
5353
53
 
52
5252
52
 
51
5151
51
 
50
5050
50
 
49
4949
49
 
48
4848
48
 
47
4747
47
 
46
4646
46
 
45
4545
45
 
44
4444
44
 
43
4343
43
 
42
4242
42
 
40
4040
40
 
39
3939
39
 

35

  • 1. Impulse Technologies Beacons U to World of technology 044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in A Stochastic Model of Multivirus Dynamics Abstract— Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies have mainly focused on single-virus spreading dynamics. In this paper, we study multivirus spreading dynamics, where multiple viruses attempt to infect computers while possibly combating against each other because, for example, they are controlled by multiple botmasters. Specifically, we propose and analyze a general model (and its two special cases) of multivirus spreading dynamics in arbitrary networks (i.e., we do not make any restriction on network topologies), where the viruses may or may not coreside on computers. Our model offers analytical results for addressing questions such as: What are the sufficient conditions (also known as epidemic thresholds) under which the multiple viruses will die out? What if some viruses can "rob” others? What characteristics does the multivirus epidemic dynamics exhibit when the viruses are (approximately) equally powerful? The analytical results make a fundamental connection between two types of factors: defense capability and network connectivity. This allows us to draw various insights that can be used to guide security defense. Your Own Ideas or Any project from any company can be Implemented at Better price (All Projects can be done in Java or DotNet whichever the student wants) 1