IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date.
Secure and Reliable Data Transmission in Generalized E-MailIJERA Editor
Email is a basic service for computer users, while email malware poses critical security threats. The technique of email-borne malware will be highly effective. Email malware focuses on modeling the propagation dynamics which is a fundamental technique for developing countermeasures to reduce email malware’s spreading speed and prevalence. Modern email malware exhibits two new features, reinjection and self-start. Reinjection is an infected user sends out malware copies whenever this user visits the malicious hyperlinks or attachments. Self-start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. For address this problem, to derive a novel difference equation based analytical model by introducing a new concept of virtual dirty user. Propose a new analytical model to enhanced OLSR protocol which is a trust based technique to secure the OLSR nodes against the attack. The proposed solution called EOLSR is an enhancement of the basic OLSR routing protocol, which will be able to detect the presence of malicious nodes in the network.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date.
Secure and Reliable Data Transmission in Generalized E-MailIJERA Editor
Email is a basic service for computer users, while email malware poses critical security threats. The technique of email-borne malware will be highly effective. Email malware focuses on modeling the propagation dynamics which is a fundamental technique for developing countermeasures to reduce email malware’s spreading speed and prevalence. Modern email malware exhibits two new features, reinjection and self-start. Reinjection is an infected user sends out malware copies whenever this user visits the malicious hyperlinks or attachments. Self-start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. For address this problem, to derive a novel difference equation based analytical model by introducing a new concept of virtual dirty user. Propose a new analytical model to enhanced OLSR protocol which is a trust based technique to secure the OLSR nodes against the attack. The proposed solution called EOLSR is an enhancement of the basic OLSR routing protocol, which will be able to detect the presence of malicious nodes in the network.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Optimised malware detection in digital forensicsIJNSA Journal
On the Internet, malware is one of the most serious threats to system security. Most complex issues and
problems on any systems are caused by malware and spam. Networks and systems can be accessed and
compromised by malware known as botnets, which compromise other systems through a coordinated
attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent systems
from the malicious activity of this malware, a new framework is required that aims to develop an optimised
technique for malware detection. Hence, this paper demonstrates new approaches to perform malware
analysis in forensic investigations and discusses how such a framework may be developed.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
Self-propagating malware (e.g., an Internet worm) exploits security loopholes in software to infect servers and then use them to scan the Internet for more vulnerable servers. While the mechanisms of worm infection and their propagation models are well understood, defense against worms remains an open problem. One branch of defense research investigates the behavioral difference between worm-infected hosts and normal hosts to set them apart. One particular observation is that a worm-infected host, which scans the Internet with randomly selected addresses, has a much higher connection-failure rate than a normal host. Rate-limit algorithms have been proposed to control the spread of worms by traffic shaping based on connection failure rate. However, these rate-limit algorithms can work properly only if it is possible to measure failure rates of individual hosts efficiently and accurately. This paper points out a serious problem in the prior method. To address this problem, we first propose a solution based on a highly efficient double-bitmap data structure, which places only a small memory footprint on the routers, while providing good measurement of connection failure rates whose accuracy can be tuned by system parameters. Furthermore, we propose another solution based on shared register array data structure, achieving better memory efficiency and much larger estimation range than our double-bitmap solution.
Internet service providers responsibilities in botnet mitigation: a Nigerian ...IJECEIAES
Botnet-based attack is dangerous and extremely difficult to overcome as all the primary mitigation methods are passive and limited in focus. A combine efforts of internet service providers (ISPs) are better guides since they can monitor the traffic that traverse through their networks. However, ISPs are not legally banded to this role and may not view security as a primary concern. Towards understudying the involvement of ISPs in Botnet mitigation in Nigeria, this study elicited and summarized mitigation measures from scientific literatures to create a reference model which was validated by structured interview. Although, ISPs role is seen to be voluntary and poorly incentivized, the providers still take customers security very serious but concentrate more on the preventive and notification measures.
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
The huge amounts of data and information that need to be analyzed for possible malicious intent are one of the big and significant challenges that the Web faces today. Malicious software, also referred to as malware developed by attackers, is polymorphic and metamorphic in nature which can modify the code as it spreads. In addition, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses that typically use signature-based techniques and are unable to detect malicious executables previously unknown. Malware family variants share typical patterns of behavior that indicate their origin and purpose. The behavioral trends observed either statically or dynamically can be manipulated by using machine learning techniques to identify and classify unknown malware into their established families. This survey paper gives an overview of the malware detection and analysis techniques and tools.
On Summarization and Timeline Generation for Evolutionary Tweet Streams1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Optimised malware detection in digital forensicsIJNSA Journal
On the Internet, malware is one of the most serious threats to system security. Most complex issues and
problems on any systems are caused by malware and spam. Networks and systems can be accessed and
compromised by malware known as botnets, which compromise other systems through a coordinated
attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent systems
from the malicious activity of this malware, a new framework is required that aims to develop an optimised
technique for malware detection. Hence, this paper demonstrates new approaches to perform malware
analysis in forensic investigations and discusses how such a framework may be developed.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
These slides were part of the kickoff for the Social Computing Collaborative group at the University of Minnesota - Jan. 2011. Each participant presented a single slide as part of their introduction of themselves and their social computing research interest areas.
Self-propagating malware (e.g., an Internet worm) exploits security loopholes in software to infect servers and then use them to scan the Internet for more vulnerable servers. While the mechanisms of worm infection and their propagation models are well understood, defense against worms remains an open problem. One branch of defense research investigates the behavioral difference between worm-infected hosts and normal hosts to set them apart. One particular observation is that a worm-infected host, which scans the Internet with randomly selected addresses, has a much higher connection-failure rate than a normal host. Rate-limit algorithms have been proposed to control the spread of worms by traffic shaping based on connection failure rate. However, these rate-limit algorithms can work properly only if it is possible to measure failure rates of individual hosts efficiently and accurately. This paper points out a serious problem in the prior method. To address this problem, we first propose a solution based on a highly efficient double-bitmap data structure, which places only a small memory footprint on the routers, while providing good measurement of connection failure rates whose accuracy can be tuned by system parameters. Furthermore, we propose another solution based on shared register array data structure, achieving better memory efficiency and much larger estimation range than our double-bitmap solution.
Internet service providers responsibilities in botnet mitigation: a Nigerian ...IJECEIAES
Botnet-based attack is dangerous and extremely difficult to overcome as all the primary mitigation methods are passive and limited in focus. A combine efforts of internet service providers (ISPs) are better guides since they can monitor the traffic that traverse through their networks. However, ISPs are not legally banded to this role and may not view security as a primary concern. Towards understudying the involvement of ISPs in Botnet mitigation in Nigeria, this study elicited and summarized mitigation measures from scientific literatures to create a reference model which was validated by structured interview. Although, ISPs role is seen to be voluntary and poorly incentivized, the providers still take customers security very serious but concentrate more on the preventive and notification measures.
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
The huge amounts of data and information that need to be analyzed for possible malicious intent are one of the big and significant challenges that the Web faces today. Malicious software, also referred to as malware developed by attackers, is polymorphic and metamorphic in nature which can modify the code as it spreads. In addition, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses that typically use signature-based techniques and are unable to detect malicious executables previously unknown. Malware family variants share typical patterns of behavior that indicate their origin and purpose. The behavioral trends observed either statically or dynamically can be manipulated by using machine learning techniques to identify and classify unknown malware into their established families. This survey paper gives an overview of the malware detection and analysis techniques and tools.
On Summarization and Timeline Generation for Evolutionary Tweet Streams1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Context-Based Diversification for Keyword Queries over XML Data1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
The well-known saying is that a picture is worth a thousand words; but what if you’re the picture, and you’re being shown off to a gorgeous woman, or even perhaps a prospective employer? Would you like the way you look? Are you happy with the vibes that you think you give out? What are your eyes, hands and shoulders saying? A little worried aren’t we?
X-ware: a proof of concept malware utilizing artificial intelligenceIJECEIAES
Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat’s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus’s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus’s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures.
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagate in networks from a global perspective.
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docxdrennanmicah
1
Running Head: COMPUTER WORMS MALWARE IN CYBER SECURITY
14
COMPUTER WORMS MALWARE IN CYBER SECURITY
COMPUTER WORMS MALWARE IN CYBER SECURITY
Praveen Ranghavajhala
201696
Abstract
Generally, there are numerous current research which deals with diverse types of computer worms in both the computing as well as the technological world. This respective report will therefore analyze the current research done on the computer works. In addition, it will reflect on the various malware attacks which may be a subsequent of any given cyber security breach (Sari, 2018). The research conducted will essentially have an integral objective of locating the characteristics of the various computer worms as well as diverse types of computer malware that generally affects the functioning of the computing field.
This prospective research conducted will additionally facilitate the impact of such malware attacks on the computers as well as the networking systems. To effectively analyze these phenomena, the research utilized secondary data collection mechanism in its various navigated data acquisition (Sari, 2018). The research significantly employed the use of exploratory approach as well as the deductive research design which was majorly utilized by the respective researchers who conducted this prospective research. It will conclusively prescribe various methods to hibernate and reduce such malware and worms attack on the computers. This will exclusively minimize the rampant effects of malware attacks on computers hence improving the computer functioning.
Introduction
Cyber security can be described as an inclusion of various tactics that are meant to protect computers, networks, program as well as data from any illicit access or breach hence resulting to malware attacks. Such attacks can be elaborated as an aim for the corruption. Cyber security in addition can be termed to be a protective measure towards the consumption ability, veracity as well as the respective security of the network. There are various parameters that can be put in place to protective massive threats from assessing their intended targets. Such parameters include using the anti-virus as well as anti-spyware. In addition, other measures can be taken such as mounting firewalls to repel or resist any unauthorized admission to the computer system. Other preventive actions that can be essentially utilized include intrusion prevention systems. These intrusion prevention systems generally identify quick affecting risks such as zero-hour attacks hence lessening occurrences of such attacks.
Generally, the protection of personal as well as professional data from cyber threats is basically an urgent necessity in the world today. This is where the cyber security interrupts in for the rescue of such protection of personal information as wel.
PhD Writing Assistance has recruited their experts after rigorous assessments and as such they possess high credentials from the to UAE, Saudi, the UK, and the Indian Universities. Quite obviously it is recommended to the PhD students that they should follow all these criteria and get the services from PhD Writing Assistance to attain their desired results.
For More: https://www.phdwritingassistance.com/
Cyberthreats broke new ground with mobile devices, while reaching deeper into social media. Online criminals also stepped up attacks via email, web and other traditional vectors.
Optimised Malware Detection in Digital Forensics IJNSA Journal
On the Internet, malware is one of the most serious threats to system security. Most complex issues and problems on any systems are caused by malware and spam. Networks and systems can be accessed and compromised by malware known as botnets, which compromise other systems through a coordinated attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent systems from the malicious activity of this malware, a new framework is required that aims to develop an optimised technique for malware detection. Hence, this paper demonstrates new approaches to perform malware analysis in forensic investigations and discusses how such a framework may be developed.
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
Malware detection in IoT environments necessitates robust methodologies. This study introduces a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against established methods. Leveraging K-fold cross-validation, the proposed approach achieved 95.5% accuracy, surpassing existing methods. The CNN algorithm enabled superior learning model construction, and the LSTM classifier exhibited heightened accuracy in classification. Comparative analysis against prevalent techniques demonstrated the efficacy of the proposed model, highlighting its potential for enhancing IoT security. The study advocates for future exploration of SVMs as alternatives, emphasizes the need for distributed detection strategies, and underscores the importance of predictive analyses for a more powerful IOT security. This research serves as a platform for developing more resilient security measures in IoT ecosystems.
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
Malware detection in IoT environments necessitates robust methodologies. This study introduces
a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against
established methods. Leveraging K-fold cross-validation, the proposed approach achieved 95.5%
accuracy, surpassing existing methods. The CNN algorithm enabled superior learning model
construction, and the LSTM classifier exhibited heightened accuracy in classification.
Comparative analysis against prevalent techniques demonstrated the efficacy of the proposed
model, highlighting its potential for enhancing IoT security. The study advocates for future
exploration of SVMs as alternatives, emphasizes the need for distributed detection strategies, and
underscores the importance of predictive analyses for a more powerful IOT security. This
research serves as a platform for developing more resilient security measures in IoT ecosystems.
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
Running Head: ANNOTATED BIBLIOGRAPHY
ANNOTATED BIBLIOGRAPHY 6
Annotated Bibliography on Emerging Cyber Threats
[Name of Institution]
[Name of Writer]
Annotated Bibliography on Emerging Cyber Threats
Source#1
Reference: Kettani, H., & Wainwright, P. (2019, March). On the Top Threats to Cyber Systems. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT) (pp. 175-179). IEEE.
Summary: This article reveals the threats to the cyber systems even some of them are not known to the common people. The article defines that the latest technology has advanced the cyber systems and these advancements are attractive and beneficial in comparison to the previous systems. However, due to this sophisticated and attractive advancement the individuals, societies, and nations had become dependent on the cyber systems. These systems result in the higher gain and ease of handling since people had relying on the cyber systems. Moreover, the author argues that for the adoption of the proper defense and mitigations to the threats it is necessary to understand cyber threats. The top threats with a brief discussion of threat agents and attack vectors along with the countermeasures are mentioned so that the readers can find knowledge in this regard.
Relevance: This article is of paramount importance because it defines the importance of the topic of research. As the aim of the research is to expose the emerging cyber-attacks and the author of the article “On the Top Threats to Cyber Systems” reveals the importance of the cyber systems which is important for understanding the dependence over the cyber systems. In addition to this, the article is found worth reading because it reveals the emerging cybercrimes and ways of protection too. The study is found relevant because it reveals that cyber systems are important nowadays because they are used in the business systems, control systems, and for accessing the control systems. In other words, the articles provide an overview of the emerging threats and latest trends in the cyber systems.
Source#2
Reference: Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.
Summary: This article determines the cyber systems attack in the sector of the digital built environment. The study gives the idea of emerging crimes that are made to threat the digital and physical assets that are used to form the digital economies. These threats are often made to affect the critical infrastructure of the smart cities. These smart cities are comprised of the cyber systems which also increase the national wealth, preserve health, and provide safety and welfare to the nation. In this regard, it is important to protect the cyber systems from the critical and emerging threats. Additionally, the article reveals the safe an ...
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
1. Malware Propagation in Large-Scale Networks
Shui Yu, Senior Member, IEEE, Guofei Gu, Member, IEEE, Ahmed Barnawi, Member, IEEE,
Song Guo, Senior Member, IEEE, and Ivan Stojmenovic, Fellow, IEEE
Abstract—Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited
understanding of malware behavior in networks to date. In this paper, we investigate how malware propagates in networks from a
global perspective. We formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from
network to network. Based on the proposed model, our analysis indicates that the distribution of a given malware follows exponential
distribution, power law distribution with a short exponential tail, and power law distribution at its early, late and final stages, respectively.
Extensive experiments have been performed through two real-world global scale malware data sets, and the results confirm our
theoretical findings.
Index Terms—Malware, propagation, modelling, power law
Ç
1 INTRODUCTION
MALWARE are malicious software programs deployed
by cyber attackers to compromise computer systems
by exploiting their security vulnerabilities. Motivated by
extraordinary financial or political rewards, malware own-
ers are exhausting their energy to compromise as many net-
worked computers as they can in order to achieve their
malicious goals. A compromised computer is called a bot,
and all bots compromised by a malware form a botnet. Bot-
nets have become the attack engine of cyber attackers, and
they pose critical challenges to cyber defenders. In order to
fight against cyber criminals, it is important for defenders to
understand malware behavior, such as propagation or
membership recruitment patterns, the size of botnets, and
distribution of bots.
To date, we do not have a solid understanding about the
size and distribution of malware or botnets. Researchers
have employed various methods to measure the size of bot-
nets, such as botnet infiltration [1], DNS redirection [3],
external information [2]. These efforts indicate that the size
of botnets varies from millions to a few thousand. There are
no dominant principles to explain these variations. As a
result, researchers desperately desire effective models and
explanations for the chaos. Dagon et al. [3] revealed that
time zone has an obvious impact on the number of available
bots. Mieghem et al. [4] indicated that network topology has
an important impact on malware spreading through their
rigorous mathematical analysis. Recently, the emergence of
mobile malware, such as Cabir [5], Ikee [6], and Brador [7],
further increases the difficulty level of our understanding
on how they propagate. More details about mobile malware
can be found at a recent survey paper [8]. To the best of our
knowledge, the best finding about malware distribution in
large-scale networks comes from Chen and Ji [9]: the distri-
bution is non-uniform. All this indicates that the research in
this field is in its early stage.
The epidemic theory plays a leading role in malware
propagation modelling. The current models for malware
spread fall in two categories: the epidemiology model and
the control theoretic model. The control system theory
based models try to detect and contain the spread of mal-
ware [10], [11]. The epidemiology models are more focused
on the number of compromised hosts and their distribu-
tions, and they have been explored extensively in the com-
puter science community [12], [13], [14]. Zou et al. [15] used
a susceptible-infected (SI) model to predict the growth of
Internet worms at the early stage. Gao and Liu [16] recently
employed a susceptible-infected-recovered (SIR) model to
describe mobile virus propagation. One critical condition
for the epidemic models is a large vulnerable population
because their principle is based on differential equations.
More details of epidemic modelling can be find in [17]. As
pointed by Willinger et al. [18], the findings, which we
extract from a set of observed data, usually reflect parts of
the studied objects. It is more reliable to extract theoretical
results from appropriate models with confirmation from
sufficient real world data set experiments. We practice this
principle in this study.
In this paper, we study the distribution of malware in
terms of networks (e.g., autonomous systems (AS), ISP
domains, abstract networks of smartphones who share the
same vulnerabilities) at large scales. In this kind of setting,
we have a sufficient volume of data at a large enough scale
to meet the requirements of the SI model. Different from the
S. Yu is with the School of Information Technology, Deakin University,
Burwood, Victoria 3125, Australia. E-mail: syu@deakin.edu.au.
G. Gu is with the Department of Computer Science and Engineering,
Texas AM University, College Station, TX 77843-3112.
E-mail: guofei@cse.tamu.edu.
A. Barnawi is with the Faculty of Computing and IT, King Abdulaziz
University, Jeddah, Saudi Arabia. E-mail: ambarnawi@kau.edu.sa.
S. Guo is with the School of Computer Science and Engineering, The Uni-
versity of Aizu, Aizuwakamatsu, Japan. E-mail: sguo@u-aizu.ac.jp.
I. Stojmenovic is with the School of Information Technology, Deakin
University, Australia; King Abdulaziz University, Jeddah, Saudi Arabia;
and the School of EECS, University of Ottawa, Ottawa, ON K1N 6N5,
Canada. E-mail: ivan@site.uottawa.ca.
Manuscript received 1 Jan. 2014; revised 14 Apr. 2014; accepted 15 Apr. 2014.
Date of publication 28 Apr. 2014; date of current version 1 Dec. 2014.
Recommended for acceptance by F. Bonchi.
For information on obtaining reprints of this article, please send e-mail to:
reprints@ieee.org, and reference the Digital Object Identifier below.
Digital Object Identifier no. 10.1109/TKDE.2014.2320725
170 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015
1041-4347 ß 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2. traditional epidemic models, we break our model into two
layers. First of all, for a given time since the breakout of a
malware, we calculate how many networks have been com-
promised based on the SI model. Second, for a compro-
mised network, we calculate how many hosts have been
compromised since the time that the network was compro-
mised. With this two layer model in place, we can deter-
mine the total number of compromised hosts and their
distribution in terms of networks. Through our rigorous
analysis, we find that the distribution of a given malware
follows an exponential distribution at its early stage, and
obeys a power law distribution with a short exponential tail
at its late stage, and finally converges to a power law distri-
bution. We examine our theoretical findings through two
large-scale real-world data sets: the Android based malware
[19] and the Conficker [20]. The experimental results
strongly support our theoretical claims. To the best of our
knowledge, the proposed two layer epidemic model and
the findings are the first work in the field.
Our contributions are summarized as follows.
We propose a two layer malware propagation model
to describe the development of a given malware at
the Internet level. Compared with the existing single
layer epidemic models, the proposed model repre-
sents malware propagation better in large-scale
networks.
We find the malware distribution in terms of net-
works varies from exponential to power law with
a short exponential tail, and to power law distri-
bution at its early, late, and final stage, respec-
tively. These findings are first theoretically proved
based on the proposed model, and then confirmed
by the experiments through the two large-scale
real-world data sets.
The rest of the paper is structured as follows. Related
work is briefly listed in Section 2. We present the prelimi-
naries for the proposed model in Section 3. The studied
problem is discussed in Section 4. A two layer malware
propagation model is established in Section 5, and followed
by a rigorous mathematical analysis in Section 6. Experi-
ments are conducted to confirm our findings in Section 7. In
Section 8, we provide a further discussion about the study.
Finally, we summarize the paper and present future work
in Section 9.
2 RELATED WORK
The basic story of malware is as follows. A malware pro-
gramer writes a program, called bot or agent, and then
installs the bots at compromised computers on the Inter-
net using various network virus-like techniques. All of
his bots form a botnet, which is controlled by its owners
to commit illegal tasks, such as launching DDoS attacks,
sending spam emails, performing phishing activities, and
collecting sensitive information. There is a command and
control (CC) server(s) to communicate with the bots and
collect data from bots. In order to disguise himself from
legal forces, the botmaster changes the url of his CC fre-
quently, e.g., weekly. An excellent explanation about this
can be found in [1].
With the significant growing of smartphones, we have
witnessed an increasing number of mobile malware. Mal-
ware writers have develop many mobile malware in recent
years. Cabir [5] was developed in 2004, and was the first
malware targeting on the Symbian operating system for
mobile devices. Moreover, it was also the first malware
propagating via Bluetooth. Ikee [6] was the first mobile mal-
ware against Apple iPhones, while Brador [7] was devel-
oped against Windows CE operating systems. The attack
victors for mobile malware are diverse, such as SMS, MMS,
Bluetooth, WiFi, and Web browsing. Peng et al. [8] pre-
sented the short history of mobile malware since 2004, and
surveyed their propagation models.
A direct method to count the number of bots is to use bot-
net infiltration to count the bot IDs or IP addresses. Stone-
Gross et al. [1] registered the URL of the Torpig botnet
before the botmaster, and therefore were able to hijack the
CC server for ten days, and collect about 70G data from
the bots of the Torpig botnet. They reported that the foot-
print of the Torpig botnet was 182,800, and the median and
average size of the Torpig’s live population was 49,272 and
48,532, respectively. They found 49,294 new infections dur-
ing the ten days takeover. Their research also indicated that
the live population fluctuates periodically as users switch
between being online and offline. This issue was also tacked
by Dagon et al. in [3].
Another method is to use DNS redirection. Dagon et al.
[3] analyzed captured bots by honypot, and then identi-
fied the CC server using source code reverse engineer-
ing tools. They then manipulated the DNS entry which is
related to a botnet’s IRC server, and redirected the DNS
requests to a local sinkhole. They therefore could count
the number of bots in the botnet. As discussed previously,
their method counts the footprint of the botnet, which
was 350,000 in their report.
In this paper, we use two large scale malware data sets
for our experiments. Conficker is a well-known and one of
the most recently widespread malware. Shin et al. [20] col-
lected a data set about 25 million Conficker victims from all
over the world at different levels. At the same time, mal-
ware targeting on Android based mobile systems are devel-
oping quickly in recent years. Zhou and Jiang [19] collected
a large data set of Android based malware.
In [2], Rajab et al. pointed out that it is inaccurate to
count the unique IP addresses of bots because DHCP and
NAT techniques are employed extensively on the Internet
([1] confirms this by their observation that 78.9 percent of
the infected machines were behind a NAT, VPN, proxy,
or firewall). They therefore proposed to examine the hits
of DNS caches to find the lower bound of the size of a
given botnet.
Rajab et al. [21] reported that botnets can be categorized
into two major genres in terms of membership recruitment:
worm-like botnets and variable scanning botnets. The latter
weights about 82 percent in the 192 IRC bots that they inves-
tigated, and is the more prevalent class seen currently. Such
botnets usually perform localized and non-uniform scan-
ning, and are difficult to track due to their intermittent and
continuously changing behavior. The statistics on the life-
time of bots are also reported as 25 minutes on average with
90 percent of them staying for less than 50 minutes.
YU ET AL.: MALWARE PROPAGATION IN LARGE-SCALE NETWORKS 171
3. Malware propagation modelling has been extensively
explored. Based on epidemiology research, Zou et al. [15]
proposed a number of models for malware monitoring at
the early stage. They pointed out that these kinds of model
are appropriate for a system that consists of a large number
of vulnerable hosts; in other words, the model is effective at
the early stage of the outbreak of malware, and the accuracy
of the model drops when the malware develops further. As
a variant of the epidemic category, Sellke et al. [12] pro-
posed a stochastic branching process model for characteriz-
ing the propagation of Internet worms, which especially
focuses on the number of compromised computers against
the number of worm scans, and presented a closed form
expression for the relationship. Dagon et al. [3] extended
the model of [15] by introducing time zone information aðtÞ,
and built a model to describe the impact on the number of
live members of botnets with diurnal effect.
The impact of side information on the spreading behav-
ior of network viruses has also been explored. Ganesh et al.
[22] thoroughly investigated the effect of network topology
on the spead of epidemics. By combining Graph theory and
a SIS (susceptible—infective—susceptible) model, they
found that if the ratio of cure to infection rates is smaller
than the spectral radius of the graph of the studied network,
then the average epidemic lifetime is of order log n, where n
is the number of nodes. On the other hand, if the ratio is
larger than a generalization of the isoperimetric constant of
the graph, then the average epidemic lifetime is of order ena
,
where a is a positive constant. Similarly, Mieghem et al. [4]
applied the N-intertwined Markov chain model, an applica-
tion of mean field theory, to analyze the spread of viruses in
networks. They found that tc ¼ 1
maxðAÞ, where tc is the sharp
epidemic threshold, and maxðAÞ is the largest eigenvalue of
the adjacency matrix A of the studied network. Moreover,
there have been many other methodologies to tackle the
problem, such as game theory [23].
3 PRELIMINARIES
Preliminaries of epidemic modelling and complex networks
are presented in this section as this work is mainly based on
the two fields.
For the sake of convenience, we summarize the symbols
that we use in this paper in Table 1.
3.1 Deterministic Epidemic Models
After nearly 100 years development, the epidemic models
[17] have proved effective and appropriate for a system that
possesses a large number of vulnerable hosts. In other
words, they are suitable at a macro level. Zou et al. [15]
demonstrated that they were suitable for the studies of
Internet based virus propagation at the early stage.
We note that there are many factors that impact the mal-
ware propagation or botnet membership recruitment, such
as network topology, recruitment frequency, and connection
status of vulnerable hosts. All these factors contribute to the
speed of malware propagation. Fortunately, we can include
all these factors into one parameter as infection rate b in
epidemic theory. Therefore, in our study, let N be the total
number of vulnerable hosts of a large-scale network (e.g., the
Internet) for a given malware. There are two statuses for any
one of the N hosts, either infected or susceptible. Let IðtÞ be
the number of infected hosts at time t, then we have
dIðtÞ
dt
¼ bðtÞ N À RðtÞ À IðtÞ À QðtÞ½ ŠIðtÞ À
dRðtÞ
dt
; (1)
where RðtÞ, and QðtÞ represent the number of removed
hosts from the infected population, and the number of
removed hosts from the susceptible population at time t.
The variable bðtÞ is the infection rate at time t.
For our study, model (1) is too detailed and not necessary
as we expect to know the propagation and distribution of a
given malware. As a result, we employ the following sus-
ceptible-infected model:
dIðtÞ
dt
¼ bIðtÞ N À IðtÞ½ Š; (2)
where the infection rate b is a constant for a given malware
for any network.
We note that the variable t is continuous in model (2) and
(1). In practice, we measure IðtÞ at discrete time points.
Therefore, t ¼ 0; 1; 2; . . . . We can interpret each time point
as a new round of malware membership recruitment, such
as vulnerable host scanning. As a result, we can transform
model (2) into the discrete form as follows:
IðtÞ ¼ ð1 þ aDÞIðt À 1Þ À bDIðt À 1Þ2
; (3)
where t ¼ 0; 1; 2; . . . ; D is the unit of time, Ið0Þ is the initial
number of infected hosts (we also call them seeds in this
paper), and a ¼ bN, which represents the average number
of vulnerable hosts that can be infected by one infected host
per time unit.
In order to simplify our analysis, let D ¼ 1, it could be
one second, one minute, one day, or one month, even one
year, depending on the time scale in a given context. Hence,
we have a simpler discrete form given by
IðtÞ ¼ ð1 þ aÞIðt À 1Þ À b Iðt À 1Þð Þ2
: (4)
Based on Equation (4), we define the increase of infected
hosts for each time unit as follows.
DIðtÞ , IðtÞ À Iðt À 1Þ; t ¼ 1; 2; . . . : (5)
To date, many researches are confined to the “early
stage” of an epidemic, such as [15]. Under the early stage
condition, IðtÞ N, therefore, N À IðtÞ % N. As a result,
a closed form solution is obtained as follows:
IðtÞ ¼ Ið0ÞebNt
: (6)
TABLE 1
Notations of Symbols in This Paper
172 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015
4. When we take the ln operation on both sides of Equation (6),
we have
ln IðtÞ ¼ bNt þ ln Ið0Þ: (7)
For a given vulnerable network, b, N and Ið0Þ are con-
stants, therefore, the graphical representation of Equation (7)
is a straight line.
Based on the definition of Equation (5), we obtain the
increase of new members of a malware at the early stage as
DIðtÞ ¼ ðebN
À 1ÞIðt À 1Þ
¼ ðebN
À 1ÞIð0ÞebNðtÀ1Þ
: (8)
Taking the ln operation on both side of (8), we have
ln DIðtÞ ¼ bNðt À 1Þ þ ln ððebN
À 1ÞIð0ÞÞ: (9)
Similar to Equation (7), the graphical representation of
equation (9) is also a straight line. In other words, the num-
ber of recruited members for each round follows an expo-
nential distribution at the early stage.
We have to note that it is hard for us to know whether
an epidemic is at its early stage or not in practice. More-
over, there is no mathematical definition about the term
early stage.
In epidemic models, the infection rate b has a critical
impact on the membership recruitment progress, and b is
usually a small positive number, such as 0.00084 for worm
Code Red [12]. For example, for a network with N ¼ 10;000
vulnerable hosts, we show the recruited members under
different infection rates in Fig. 1. From this diagram, we can
see that the recruitment goes slowly when b ¼ 0:0001, how-
ever, all vulnerable hosts have been compromised in less
than 7 time units when b ¼ 0:0003, and the recruitment pro-
gresses in an exponential fashion.
This reflects the malware propagation styles in practice.
For malware based on “contact”, such as blue tooth con-
tacts, or viruses depending on emails to propagate, the
infection rate is usually small, and it takes a long time to
compromise a large number of vulnerable hosts in a given
network. On the other hand, for some malware, which take
active actions for recruitment, such as vulnerable host scan-
ning, it may take one or a few rounds of scanning to recruit
all or a majority of the vulnerable hosts in a given network.
We will apply this in the following analysis and perfor-
mance evaluation.
3.2 Complex Networks
Research on complex networks have demonstrated that the
number of hosts of networks follows the power law. People
found that the size distribution usually follows the power
law, such as population in cities in a country or personal
income in a nation [24]. In terms of the Internet, researchers
have also discovered many power law phenomenon, such
as the size distribution of web files [25]. Recent progresses
reported in [26] further demonstrated that the size of net-
works follows the power law.
The power law has two expression forms: the Pareto dis-
tribution and the Zipf distribution. For the same objects of
the power law, we can use any one of them to represent it.
However, the Zipf distributions are tidier than the expres-
sion of the Pareto distributions. In this paper, we will use
Zipf distributions to represent the power law. The Zipf
expression is as follows:
Prfx ¼ ig ¼
C
ia
; (10)
where C is a constant, a is a positive parameter, called
the Zipf index, Prfx ¼ ig represents the probability of the
ith ði ¼ 1; 2; . . .Þ largest object in terms of size, andP
i Prfx ¼ ig ¼ 1.
A more general form of the distribution is called the
Zipf-Mandelbrot distribution [27], which is defined as
follows:
Prfx ¼ ig ¼
C
ði þ qÞa ; (11)
where the additional constant q ðq ! 0Þ is called the plateau
factor, which makes the probability of the highest ranked
objects flat. The Zipf-Mandelbrot distribution becomes the
Zipf distribution when q ¼ 0.
Currently, the metric to say a distribution is a power
law is to take the loglog plot of the data, and we usually
say it is a power law if the result shows a straight line.
We have to note that this is not a rigorous method, how-
ever, it is widely applied in practice. Power law distribu-
tions enjoy one important property, scale free. We refer
interested readers to [28] about the power law and its
properties.
4 PROBLEM DESCRIPTION
In this section, we describe the malware propagation prob-
lem in general.
As shown in Fig. 2, we study the malware propagation
issue at two levels, the Internet level and the network level.
We note that at the network level, a network could be
defined in many different ways, it could be an ISP domain,
a country network, the group of a specific mobile devices,
and so on. At the Internet level, we treat every network of
the network level as one element.
Fig. 1. The impact from infection rate b on the recruitment progress for a
given vulnerable network with N ¼ 10,000.
YU ET AL.: MALWARE PROPAGATION IN LARGE-SCALE NETWORKS 173
5. At the Internet level, we suppose, there are M net-
works, each network is denoted as Lið1 i MÞ. For any
network Li, we suppose it physically possesses Ni hosts.
Moreover, we suppose the possibility of vulnerable hosts
of Li is denoted as pið0 pi 1Þ. In general, it is highly
possible that Ni 6¼ Nj, and pi 6¼ pj for i 6¼ j; 1 i; j M.
Moreover, due to differences in network topology, operat-
ing system, security investment and so on, the infection
rates are different from network to network. We denote it
as bi for Li. Similarly, it is highly possible that bi 6¼ bj for
i 6¼ j; 1 i; j M.
For any given network Li with pi Á Ni vulnerable hosts
and infection rate bi. We suppose the malware propagation
starts at time 0. Based on Equation (4), we obtain the num-
ber of infected hosts, IiðtÞ, of Li at time t as follows:
IiðtÞ ¼ ð1 þ aiÞIiðt À 1Þ À biðIiðt À 1ÞÞ2
¼ ð1 þ bipiNiÞIiðt À 1Þ À biðIiðt À 1ÞÞ2
:
(12)
In this paper, we are interested in a global sense of mal-
ware propagation. We study the following question.
For a given time t since the outbreak of a malware, what
are the characteristics of the number of compromised hosts
for each network in the view of the whole Internet. In other
words, to find a function F about IiðtÞð1 i MÞ. Namely,
the pattern of
F I1ðtÞ; I2ðtÞ; . . . ; IMðtÞð Þ: (13)
For simplicity of presentation, we use SðLi; tÞ to replace
IiðtÞ at the network level, and IðtÞ is dedicated for the Inter-
net level. Following Equation (13), for any network
Lið1 i MÞ, we have
SðLi; tÞ ¼ ð1 þ bipiNiÞSðLi; t À 1Þ À bi SðLi; t À 1Þð Þ2
: (14)
At the Internet level, we suppose there are k1; k2; . . . ; kt
networks that have been compromised at each round for
each time unit from 1 to t. Any kið1 i tÞ is decided by
Equation (4) as follows:
ki ¼ ð1 þ bnMÞIði À 1Þ À bn Iði À 1Þð Þ2
; (15)
where M is the total number of networks over the Inter-
net, and bn is the infection rate among networks. More-
over, suppose the number of seeds, k0, is known.
At this time point t, the landscape of the compromised
hosts in terms of networks is as follows.
S
À
L1
k1
; t
Á
; S
À
L2
k1
; t
Á
; . . . ; S
À
L
k1
k1
; t
Á
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
k1
S
À
L1
k2
; t À 1
Á
; S
À
L2
k2
; t À 1
Á
; . . . ; S
À
L
k2
k2
; t À 1
Á
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
k2
. . .
S
À
L1
kt
; 1
Á
; S
À
L2
kt
; 1
Á
; . . . ; S
À
Lkt
kt
; 1
Á
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
kt
;
(16)
where Lj
ki
represents the jth network that was compromised
at round i. In other words, there are k1 compromised net-
works, and each of them have progressed t time units; k2
compromised networks, and each of them has progressed
t À 1 time units; and kt compromised networks, and each of
them have progressed 1 time unit.
It is natural to have the total number of compromised
hosts at the Internet level as
IðtÞ ¼ S
À
L1
k1
; t
Á
þ S
À
L2
k1
; t
Á
þ Á Á Á þ S
À
L
k1
k1
; t
Á
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
k1
þ S
À
L1
k2
; t À 1
Á
þ Á Á Á þ S
À
L
k2
k2
; t À 1
Á
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
k2
þ Á Á Á
þ S
À
L1
kt
; 1
Á
þ S
À
L2
kt
; 1
Á
þ Á Á Á þ S
À
Lkt
kt
; 1
Á
|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}
kt
(17)
Suppose kiði ¼ 1; 2; . . .Þ follows one distribution with a
probability distribution of pn (n stands for number), and
the size of a compromised network, SðLi; tÞ, follows
another probability distribution of ps (s stands for size).
Let pI be the probability distribution of IðtÞðt ¼ 0; 1; . . .Þ.
Based on Equation (18), we find pI is exactly the convolu-
tion of pn and ps.
pI ¼ pn à ps; (18)
where à is the convolution operation.
Our goal is to find a pattern of pI of Equation (18).
5 MALWARE PROPAGATION MODELLING
As shown in Fig. 2, we abstract the M networks of the Inter-
net into M basic elements in our model. As a result, any
two large networks, Li and Lj (i 6¼ j), are similar to each
other at this level. Therefore, we can model the studied
problem as a homogeneous system. Namely, all the M net-
works share the same vulnerability probability (denoted as
p), and the same infection rate (denoted as b). A simple
way to obtain these two parameters is to use the means:
p ¼
1
M
XM
i¼1
pi
b ¼
1
M
XM
i¼1
bi:
8
:
(19)
Fig. 2. The system architecture of the studied malware propagation.
174 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015
6. For any network Li, let Ni be the total number of vulnera-
ble hosts, then we have
Ni ¼ p Á Ni; i ¼ 1; 2; . . . ; M; (20)
where Ni is the total number of computers of network Li.
As discussed in Section 3, we know that Niði ¼ 1; 2; . . . ;
MÞ follows the power law. As p is a constant in Equation
(20), then Niði ¼ 1; 2; . . . ; MÞ follows the power law as well.
Without loss of generality, let Li represent the ith network
in terms of total vulnerable hosts (Ni). Based on the Zipf dis-
tribution, if we randomly choose a network X, the probabil-
ity that it is network Lj is
PrfX ¼ Ljg ¼ pzðjÞ ¼
Nj
PM
i¼1 Ni
¼
C
ja
: (21)
Equation (21) shows clearly that a network with a larger
number of vulnerable hosts has a higher probability to be
compromised.
Following Equation (18), at time t, we have k1 þ k2 þ Á Á Á
þkt networks that have been compromised. Combining
with Equation (21), in general, we know the first round of
recruitment takes the largest k1 networks, and the second
round takes the k2 largest networks among the remaining
networks, and so on. We therefore can simplify Equation
(18) as
IðtÞ ¼
Xk1
j¼1
SðNj; tÞpzðjÞ
þ
Xk2
j¼1
SðNk1þj; t À 1Þpzðk1 þ jÞ
þ . . .
þ
Xkt
j¼1
SðNk1þÁÁÁþktÀ1þj; 1Þ
Á pzðk1 þ Á Á Á þ ktÀ1 þ jÞ: (22)
From Equation (22), we know the total number of com-
promised hosts and their distribution in terms of networks
for a given time point t.
6 ANALYSIS ON THE PROPOSED MALWARE
PROPAGATION MODEL
In this section, we try to extract the pattern of IðtÞ in terms
of SðLi; t
0
Þ, or pI of Equation (18).
We make the following definitions before we progress for
the analysis.
1) Early stage. An early stage of the breakout of a mal-
ware means only a small percentage of vulnerable
hosts have been compromised, and the propagation
follows exponential distributions.
2) Final stage. The final stage of the propagation of a
malware means that all vulnerable hosts of a given
network have been compromised.
3) Late stage. A late stage means the time interval
between the early stage and the final stage.
We note that many researches are focused on the early
stage, and we define the early stage to meet the pervasively
accepted condition, we coin the other two terms for the
convenience of our following discussion. Moreover, we set
variable Te as the time point that a malware’s progress
transfers from its early stage to late stage. In terms of mathe-
matical expressions, we express the early, late and final
stage as 0 t Te, Te t 1, and t ¼ 1, respectively.
Due to the complexity of Equation (22), it is difficult to
obtain conclusions in a dynamic style. However, we are
able to extract some conclusions under some special
conditions.
Lemma 1. If distributions pðxÞ and qðxÞ follow exponential dis-
tributions, then pðxÞqðxÞ follows an exponential distribution
as well.
Due to the space limitation, we skip the proof and refer
interested readers to [29].
At the early stage of a malware breakout, we have advan-
tages to obtain a clear conclusion.
Theorem 1. For large scale networks, such as the Internet, at the
early stage of a malware propagation, the malware distribution
in terms of networks follows exponential distributions.
Proof. At a time point of the early stage (0 t Te) of a
malware breakout, following Equation (6), we obtain the
number of compromised networks as
IðtÞ ¼ Ið0ÞebnMt
: (23)
It is clear that IðtÞ follows an exponential distribution.
For any of the compromised networks, we suppose it
has progressed t
0
ð0 t
0
t TeÞ time units, and its
size is
SðLi; t
0
Þ ¼ Iið0ÞebNit
0
: (24)
Based on Equation (24), we find that the size of any
compromised network follows an exponential distribu-
tion. As a result, all the sizes of compromised networks
follow exponential distributions at the early stage.
Based on Lemma 1, we obtain that the malware distri-
bution in terms of network follows exponential distribu-
tions at its early stage. tu
Moreover, we can obtain concrete conclusion of the prop-
agation of malware at the final stage.
Theorem 2. For large scale networks, such as the Internet, at the
final stage (t ¼ 1) of a malware propagation, the malware
distribution in terms of networks follows the power law
distribution.
Proof. At the final stage, all vulnerable hosts have been
compromised, namely,
SðLi; 1Þ ¼ Ni; i ¼ 1; 2; . . . ; M:
Based on our previous discussion, we know Niði ¼
1; 2; . . . ; MÞ follows the power law. As a result, the theo-
rem holds. tu
Now, we move our study to the late stage of malware
propagation.
Theorem 3. For large scale networks, such as the Internet, at the
late stage (Te t 1) of a malware breakout, the malware
distribution include two parts: a dominant power law body
and a short exponential tail.
YU ET AL.: MALWARE PROPAGATION IN LARGE-SCALE NETWORKS 175
7. Proof. Suppose a malware propagation has progressed for
tðt TeÞ time units. Let t0
¼ t À Te. If we separate all
the compromised IðtÞ hosts by time point t0
, we have two
groups of compromised hosts.
Following Theorem 2, as t0
Te, the compromised
hosts before t0
follows the power law. At the same time,
all the compromised networks after t0
are still in their
early stage. Therefore, these recently compromised net-
works follow exponential distributions.
Now, we need to prove that the networks compro-
mised after time point t0
are at the tail of the distribu-
tion. First of all, for a given network Li, for t1 t2,
we have
SðLi; t1Þ ! SðLi; t2Þ: (25)
For two networks, Li and Lj, if Ni ! Nj, then Li
should be compromised earlier than Lj. Combining this
with (25), we know the later compromised networks usu-
ally lie at the tail of the distribution.
Due to the fact that t0
Te, the length of the expo-
nential tail is much shorter than the length of the main
body of the distribution. tu
7 PERFORMANCE EVALUATION
In this section, we examine our theoretical analysis through
two well-known large-scale malware: Android malware
and Conficker. Android malware is a recent fast developing
and dominant smartphone based malware [19]. Different
from Android malware, the Conficker worm is an Internet
based state-of-the-art botnet [20]. Both the data sets have
been widely used by the community.
From the Android malware data set, we have an overview
of the malware development from August 2010 to October
2011. There are 1,260 samples in total from 49 different
Android malware in the data set. For a given Android mal-
ware program, it only focuses on one or a number of specific
vulnerabilities. Therefore, all smartphones share these vul-
nerabilities form a specific network for that Android mal-
ware. In other words, there are 49 networks in the data set,
and it is reasonable that the population of each network is
huge. We sort the malware subclasses according to their size
(number of samples in the data set), and present them in a
loglog format in Fig. 3, the diagram is roughly a straight line.
In other words, we can say that the Android malware distri-
bution in terms of networks follows the power law.
We now examine the growth pattern of total number of
compromised hosts of Android malware against time,
namely, the pattern of IðtÞ. We extract the data from the
data set and present it in Table 2. We further transform the
data into a graph as shown in Fig. 4. It shows that the mem-
ber recruitment of Android malware follows an exponential
distribution nicely during the 15 months time interval. We
have to note that our experiments also indicate that this
data does not fit the power law (we do not show them here
due to space limitation).
In Fig. 4, we match a straight line to the real data through
the least squares method. Based on the data, we can esti-
mate that the number of seeds (Ið0Þ) is 10, and a ¼ 0:2349.
Following our previous discussion, we infer that the propa-
gation of Android malware was in its early stage. It is rea-
sonable as the size of each Android vulnerable network is
huge and the infection rate is quite low (the infection is basi-
cally based on contacts).
We also collected a large data set of Conficker from vari-
ous aspects. Due to the space limitation, we can only present
a few of them here to examine our theoretical analysis.
First of all, we treat AS as networks in the Internet. In
general, ASs are large scale elements of the Internet. A few
key statistics from the data set are listed in Table 3. We
Fig. 3. The probability distribution of Android malware in terms of networks.
TABLE 2
The Number of Different Android Malware against Time (Months) in 2010-2011
Fig. 4. The growth of total compromised hosts by Android malware
against time from August 2010 to October 2011.
176 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015
8. present the data in a loglog format in Fig. 5, which indicates
that the distribution does follow the power law.
A unique feature of the power law is the scale free prop-
erty. In order to examine this feature, we measure the com-
promised hosts in terms of domain names at three different
domain levels: the top level, level 1, and level 2, respec-
tively. Some statistics of this experiment are listed in
Table 4.
Once again, we present the data in a loglog format in
Figs. 6a, 6b and 6c, respectively. The diagrams show that
the main body of the three scale measures are roughly
straight lines. In other words, they all fall into power law
distributions. We note that the flat head in Fig. 6 can be
explained through a Zipf-Mandelbrot distribution. There-
fore, Theorem 2 holds.
In order to examine whether the tails are exponential, we
take the smallest six data from each tail of the three levels. It
is reasonable to say that they are the networks compromised
at the last 6 time units, the details are listed in Table 5 (we
note that t ¼ 1 is the sixth last time point, and t ¼ 6 is the
last time point).
When we present the data of Table 5 into a graph as
shown in Fig. 7, we find that they fit an exponential dis-
tribution very well, especially for the level 2 and level 3
domain name cases. This experiment confirms our claim
in Theorem 3.
8 FURTHER DISCUSSION
In this paper, we have explored the problem of malware
distribution in large-scale networks. There are many direc-
tions that could be further explored. We list some important
ones as follows.
1) The dynamics of the late stage. We have found that
the main body of malware distribution follows the
power law with a short exponential tail at the late
stage. It is very attractive to explore the mathemati-
cal mechanism of how the propagation leads to such
kinds of mixed distributions.
2) The transition from exponential distribution to
power law distribution. It is necessary to investigate
when and how a malware distribution moves from
an exponential distribution to the power law. In
other words, how can we clearly define the transition
point between the early stage and the late stage.
3) Multiple layer modelling. We hire the fluid model in
both of the two layers in our study as both layers are
sufficiently large and meet the conditions for the
modelling methods. In order to improve the accu-
racy of malware propagation, we may extend our
work to nðn 2Þ layers. In another scenario, we
TABLE 3
Statistics for Conficker Distribution in Terms of ASs
Fig. 5. Power law distribution of Conficker in terms of autonomous
networks.
TABLE 4
Statistics for Conficker Distribution in Terms of Domain
Names at the Three Top Levels
Fig. 6. Power law distribution of Conficker botnet in the top three levels of domain names.
YU ET AL.: MALWARE PROPAGATION IN LARGE-SCALE NETWORKS 177
9. may expect to model a malware distribution for mid-
dle size networks, e.g., an ISP network with many
subnetworks. In these cases, the conditions for the
fluid model may not hold. Therefore, we need to
seek suitable models to address the problem.
4) Epidemic model for the proposed two layer model.
In this paper, we use the SI model, which is the
simplest for epidemic analysis. More practical mod-
els, e.g., SIS or SIR, could be chosen to serve the
same problem.
5) Distribution of coexist multiple malware in net-
works. In reality, multiple malware may coexist at
the same networks. Due to the fact that different mal-
ware focus on different vulnerabilities, the distribu-
tions of different malware should not be the same. It
is challenging and interesting to establish mathemat-
ical models for multiple malware distribution in
terms of networks.
9 SUMMARY AND FUTURE WORK
In this paper, we thoroughly explore the problem of mal-
ware distribution at large-scale networks. The solution to
this problem is desperately desired by cyber defenders as
the network security community does not yet have solid
answers. Different from previous modelling methods, we
propose a two layer epidemic model: the upper layer
focuses on networks of a large scale networks, for example,
domains of the Internet; the lower layer focuses on the hosts
of a given network. This two layer model improves the
accuracy compared with the available single layer epidemic
models in malware modelling. Moreover, the proposed two
layer model offers us the distribution of malware in terms
of the low layer networks.
We perform a restricted analysis based on the proposed
model, and obtain three conclusions: The distribution for a
given malware in terms of networks follows exponential
distribution, power law distribution with a short exponen-
tial tail, and power law distribution, at its early, late, and
final stage, respectively. In order to examine our theoretical
findings, we have conducted extensive experiments based
on two real-world large-scale malware, and the results con-
firm our theoretical claims.
In regards to future work, we will first further investigate
the dynamics of the late stage. More details of the findings
are expected to be further studied, such as the length of the
exponential tail of a power law distribution at the late stage.
Second, defenders may care more about their own network,
e.g., the distribution of a given malware at their ISP
domains, where the conditions for the two layer model may
not hold. We need to seek appropriate models to address
this problem. Finally, we are interested in studying the dis-
tribution of multiple malware on large-scale networks as
we only focus on one malware in this paper. We believe it is
not a simple linear relationship in the multiple malware
case compared to the single malware one.
ACKNOWLEDGMENTS
Dr Yu’s work is partially supported by the National Natural
Science Foundation of China (grant No. 61379041), Prof.
Stojmenovic’s work is partially supported by NSERC
Canada Discovery grant (grant No. 41801-2010), and KAU
Distinguished Scientists Program.
REFERENCES
[1] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski,
R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my bot-
net: Analysis of a botnet takeover,” in Proc. ACM Conf. Comput.
Commun. Security, 2009, pp. 635–647.
[2] M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “My botnet is
bigger than yours (maybe, better than yours): Why size estimates
remain challenging,” in Proc. 1st Conf. 1st Workshop Hot Topics
Understanding Botnets, 2007, p. 5.
[3] D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation
using time zones,” in Proc. 13th Netw. Distrib. Syst. Security Symp.,
2006.
[4] P. V. Mieghem, J. Omic, and R. Kooij, “Virus spread in networks,”
IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 1–14, Feb. 2009.
[5] Cabir. (2014). [Online]. Available: http://www.f-secure.com/en/
web/labs_global/2004-threat-summary
[6] Ikee. (2014). [Online]. Available: http://www.f-secure.com/v-
descs/worm_iphoneos_ikee_b.shtml
[7] Brador. (2014). [Online]. Available: http://www.f-secure.com/v-
descs/brador.shtml
[8] S. Peng, S. Yu, and A. Yang, “Smartphone malware and its propa-
gation modeling: A survey,” IEEE Commun. Surveys Tuts., vol. 16,
no. 2, pp. 925–941, 2014.
[9] Z. Chen and C. Ji, “An information-theoretic view of network-
aware malware attacks,” IEEE Trans. Inf. Forensics Security, vol. 4,
no. 3, pp. 530–541, Sep. 2009.
[10] A. M. Jeffrey, X. Xia, and I. K. Craig, “When to initiate HIV ther-
apy: A control theoretic approach,” IEEE Trans. Biomed. Eng.,
vol. 50, no. 11, pp. 1213–1220, Nov. 2003.
[11] R. Dantu, J. W. Cangussu, and S. Patwardhan, “Fast worm con-
tainment using feedback control,” IEEE Trans. Dependable Secure
Comput., vol. 4, no. 2, pp. 119–136, Apr.–Jun. 2007.
[12] S. H. Sellke, N.B. Shroff, and S. Bagchi, “Modeling and automated
containment of worms,” IEEE Trans. Dependable Secure Comput.,
vol. 5, no. 2, pp. 71–86, Apr.–Jun. 2008.
Fig. 7. The three tails from the three domain name levels fit exponential
distributions.
TABLE 5
The Last Six Elements of Conficker Botnet from the Top Three
Domain Name Levels
178 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, JANUARY 2015
10. [13] P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for
vulnerability analysis of broadcast protocols in wireless sensor
networks,” IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413–425,
Mar. 2009.
[14] G. Yan and S. Eidenbenz, “Modeling propagation dynamics of
bluetooth worms (extended version),” IEEE Trans. Mobile Comput.,
vol. 8, no. 3, pp. 353–368, Mar. 2009.
[15] C. C. Zou, W. Gong, D. Towsley, and L. Gao, “The monitoring and
early detection of internet worms,” IEEE/ACM Trans. Netw.,
vol. 13, no. 5, pp. 961–974, Oct. 2005.
[16] C. Gao and J. Liu, “Modeling and restraining mobile virus prop-
agation,” IEEE Trans. Mobile Comput., vol. 12, no. 3, pp. 529–541,
Mar. 2013.
[17] D. J. Daley and J. Gani, Epidemic Modelling: An Introduction. Cam-
bridge, U.K. Cambridge Univ. Press, 1999.
[18] W. Willinger, D. Alderson, and J. C. Doyle, “Mathematics and the
internet: A source of enormous confusion and great potential,”
Notices Amer. Math. Soc., vol. 56, no. 5, pp. 586–599, 2009.
[19] Y. Zhou and X. Jiang, “Dissecting android malware: Characteriza-
tion and evolution,” in Proc. IEEE Symp. Security Privacy, 2012,
pp. 95–109.
[20] S. Shin, G. Gu, A. L. N. Reddy, and C. P. Lee, “A large-scale
empirical study of conficker,” IEEE Trans. Inf. Forensics Security,
vol. 7, no. 2, pp. 676–690, Apr. 2012.
[21] M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “A multifaceted
approach to understanding the botnet phenomenon,” in Proc.
Internet Meas. Conf., 2006, pp. 41–52.
[22] A. J. Ganesh, L. Massoulie, and D. F. Towsley, “The effect of net-
work topology on the spread of epidemics,” in Proc. IEEE Conf.
Comput. Commun., 2005, pp. 1455–1466.
[23] J. Omic, A. Orda, and P. V. Mieghem, “Protecting against network
infections: A game theoretic perspective,” in Proc. IEEE Conf. Com-
put. Commun., 2009, pp. 1485–1493.
[24] R. L. Axtell, “Zipf distribution of U.S. firm sizes,” Science, vol. 293,
pp. 1818–1820, 2001.
[25] M. Mitzenmacher, “A brief history of generative models for
power law and lognornal distributions,” Internet Math., vol. 1,
pp. 129–251, 2004.
[26] M. Newman, Networks: An Introduction. London, U.K. Oxford
Univ. Press, 2010.
[27] Z. K. Silagadze, “Citations and the Zipf-Mandelbrot’s law,” Com-
plex Syst., vol. 11, pp. 487–499, 1997.
[28] M. E. J. Newman, “Power laws, pareto distributions and Zipf’s
law,” Contemp. Phys., vol. 46, pp. 323–351, Dec. 2005.
[29] L. Kleinrock, Queueing Systems, vol. I Theory, Hoboken, NJ, USA:
Wiley-Interscience, 1975.
Shui Yu (M’05-SM’12) received the BEng and
MEng degrees from the University of Electronic
Science and Technology of China, Chengdu, P.
R. China, in 1993 and 1999, respectively, and
the PhD degree from Deakin University, Victoria,
Australia, in 2004. He is currently a senior lec-
turer with the School of Information Technology,
Deakin University, Victoria, Australia. He has
published nearly 100 peer review papers, includ-
ing top journals and top conferences, such as
IEEE TPDS, IEEE TIFS, IEEE TFS, IEEE TMC,
and IEEE INFOCOM. His research interests include networking theory,
network security, and mathematical modeling. His actively servers his
research communities in various roles, which include the editorial boards
of the IEEE Transactions on Parallel and Distributed Systems, IEEE
Communications Surveys and Tutorials, and IEEE Access, IEEE INFO-
COM TPC members 2012-2015, symposium co-chairs of IEEE ICC
2014, IEEE ICNC 2013-2015, and many different roles of international
conference organizing committees. He is a senior member of the IEEE,
and a member of the AAAS.
Guofei Gu (S’06-M’08) received the PhD degree
in computer science from the College of Comput-
ing, Georgia Institute of Technology. He is an
assistant professor in the Department of Com-
puter Science and Engineering, Texas AM Uni-
versity (TAMU), College Station, TX. His
research interests are in network and system
security, such as malware analysis, detection,
defense, intrusion and anomaly detection, and
web and social networking security. He is cur-
rently directing the Secure Communication and
Computer Systems (SUCCESS) Laboratory at TAMU. He received the
2010 National Science Foundation (NSF) Career Award and a corecipi-
ent of the 2010 IEEE Symposium on Security and Privacy (Oakland 10)
Best Student Paper Award. He is a member of the IEEE.
Ahmed Barnawi received the PhD degree from
the University of Bradford, United Kingdom in
2006. He is an associate professor at the Faculty
of Computing and IT, King Abdulaziz University,
Jeddah, Saudi Arabia, where he works since
2007. He was visiting professor at the University
of Calgary in 2009. His research areas are cellu-
lar and mobile communications, mobile ad hoc
and sensor networks, cognitive radio networks
and security. He received three strategic
research grants and registered two patents in the
US. He is a member of the IEEE.
Song Guo (M’02-SM’11) received the PhD
degree in computer science from the University
of Ottawa, Canada in 2005. He is currently a
senior associate professor at the School of Com-
puter Science and Engineering, the University of
Aizu, Japan. His research interests are mainly in
the areas of protocol design and performance
analysis for reliable, energy-efficient, and cost
effective communications in wireless networks.
He is an associate editor of the IEEE Transac-
tions on Parallel and Distributed Systems and an
editor of Wireless Communications and Mobile Computing. He is a
senior member of the IEEE and the ACM.
Ivan Stojmenovic was editor-in-chief of the
IEEE Transactions on Parallel and Distributed
Systems (2010-3), and is founder of three jour-
nals. He is editor of the IEEE Transactions on
Computers, IEEE Network, IEEE Transactions
on Cloud Computing, and ACM Wireless Net-
works and steering committee member of the
IEEE Transactions on Emergent Topics in Com-
puting. He is on Thomson Reuters list of Highly
Cited Researchers from 2013, has top h-index in
Canada for mathematics and statistics, and has
more than 15,000 citations. He received five Best Paper Awards. He is a
fellow of the IEEE, Canadian Academy of Engineering and Academia
Europaea. He has received the Humboldt Research Award.
For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/publications/dlib.
YU ET AL.: MALWARE PROPAGATION IN LARGE-SCALE NETWORKS 179