Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique


Affiliations
1 Vellore Institute of Technology, Vellore, India
2 Master of Computer Applications. Vellore Institute of Technology, Vellore, India
     

   Subscribe/Renew Journal


Malware is wide in frameworks, and locations a vital risk to network security. Notwithstanding, we have amazingly confined consciousness of malware behavior in structures to date. In this paper, we investigate at how malware spreads in structures from a general perspective. We outline the issue, and set up a concentrated two layer scourge model for malware spread starting with one structure then onto the accompanying framework. In connection of the proposed model, our examination demonstrates that the spread of a given malware takes after exponential disseminating, power law dissipating with a short exponential tail, and power law course at its basic, early, late and last stages, autonomously Broad examinations have been performed through two genuine general scale malware data sets, and the results request our hypothetical exposures.”


Keywords

Malware, Malware Propagation, Exponential Distribution, Power Law, Two Layer Epidemic Model.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 128

PDF Views: 0




  • Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique

Abstract Views: 128  |  PDF Views: 0

Authors

M. Sudha
Vellore Institute of Technology, Vellore, India
Neelima Jhavar
Master of Computer Applications. Vellore Institute of Technology, Vellore, India

Abstract


Malware is wide in frameworks, and locations a vital risk to network security. Notwithstanding, we have amazingly confined consciousness of malware behavior in structures to date. In this paper, we investigate at how malware spreads in structures from a general perspective. We outline the issue, and set up a concentrated two layer scourge model for malware spread starting with one structure then onto the accompanying framework. In connection of the proposed model, our examination demonstrates that the spread of a given malware takes after exponential disseminating, power law dissipating with a short exponential tail, and power law course at its basic, early, late and last stages, autonomously Broad examinations have been performed through two genuine general scale malware data sets, and the results request our hypothetical exposures.”


Keywords


Malware, Malware Propagation, Exponential Distribution, Power Law, Two Layer Epidemic Model.