메뉴 건너뛰기




Volumn 8, Issue 15, 2015, Pages 2561-2579

Mathematical modeling of the propagation of malware: A review

Author keywords

Cellular automata; Computational simulation; Differential equations; Malware; Mathematical modeling

Indexed keywords

CELLULAR AUTOMATA; COMPUTER CRIME; DIFFERENTIAL EQUATIONS; MATHEMATICAL MODELS;

EID: 84940898905     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1186     Document Type: Review
Times cited : (79)

References (80)
  • 4
    • 84928347803 scopus 로고    scopus 로고
    • McAfee labs threats report
    • Available from:) [Accessed on July 2014].
    • McAfee labs threats report, 2014. (Available from: http://www.mcafee.com/sg/resources/reports/rp-quarterly-threat-q1-2014.pdf) [Accessed on July 2014].
    • (2014)
  • 5
    • 84940895329 scopus 로고    scopus 로고
    • Quarterly report pandalabs
    • Available from:) [Accessed on July 2014].
    • PandaLabs . Quarterly report pandalabs, 2014. (Available from: http://press.pandasecurity.com/wp-content/uploads/2014/05/Quaterly-PandaLabs-Report_Q1) [Accessed on July 2014].
    • (2014)
  • 7
    • 0023294949 scopus 로고
    • Computer virus: theory and experiments
    • Cohen F. Computer virus: theory and experiments. Computer Security 1987; 6:22-35.
    • (1987) Computer Security , vol.6 , pp. 22-35
    • Cohen, F.1
  • 8
    • 77949656755 scopus 로고    scopus 로고
    • A taxonomy of biologically inspired research in computer networking
    • Meisel M, Pappas V, Zhang L. A taxonomy of biologically inspired research in computer networking. Computer Networks 2010; 54:901-916.
    • (2010) Computer Networks , vol.54 , pp. 901-916
    • Meisel, M.1    Pappas, V.2    Zhang, L.3
  • 9
    • 0023997770 scopus 로고
    • The application of epidemiology to computer viruses
    • Murray WH. The application of epidemiology to computer viruses. Computer Security 1988; 7:139-145.
    • (1988) Computer Security , vol.7 , pp. 139-145
    • Murray, W.H.1
  • 14
    • 84873717599 scopus 로고    scopus 로고
    • Modeling computer virus with the BSDE approach
    • Amador J, Artalejo JR. Modeling computer virus with the BSDE approach. Computer Networks 2012; 57:302-316.
    • (2012) Computer Networks , vol.57 , pp. 302-316
    • Amador, J.1    Artalejo, J.R.2
  • 15
    • 79952273745 scopus 로고    scopus 로고
    • A deterministic approach for the propagation of computer virus in the framework of linear and sinusoidal time variation of birth rate of virus
    • Rao NS, Deepshikha J. A deterministic approach for the propagation of computer virus in the framework of linear and sinusoidal time variation of birth rate of virus. Proceedings of ICISTM 2011, Communications in Computer and Information Science 2011; 141:206-213.
    • (2011) Proceedings of ICISTM 2011, Communications in Computer and Information Science , vol.141 , pp. 206-213
    • Rao, N.S.1    Deepshikha, J.2
  • 16
    • 84865862007 scopus 로고    scopus 로고
    • Mobility matrix evolution for an SIS epidemic patch model
    • Sanders J, Noble B, Van Gorder RA, Riggs C. Mobility matrix evolution for an SIS epidemic patch model. Physica A 2012; 391:6256-6267.
    • (2012) Physica A , vol.391 , pp. 6256-6267
    • Sanders, J.1    Noble, B.2    Van Gorder, R.A.3    Riggs, C.4
  • 17
    • 84884661759 scopus 로고    scopus 로고
    • Impact of media coverage on epidemic spreading in complex networks
    • Wang Y, Cao J, Jin Z, Zhang H, Sun GQ. Impact of media coverage on epidemic spreading in complex networks. Physica A 2013; 23:5824-5835.
    • (2013) Physica A , vol.23 , pp. 5824-5835
    • Wang, Y.1    Cao, J.2    Jin, Z.3    Zhang, H.4    Sun, G.Q.5
  • 21
    • 0442280819 scopus 로고    scopus 로고
    • Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction
    • Wierman JC, Marchette DJ. Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Computational Statistics & Data Analysis 2004; 45:3-23.
    • (2004) Computational Statistics & Data Analysis , vol.45 , pp. 3-23
    • Wierman, J.C.1    Marchette, D.J.2
  • 22
    • 84864413758 scopus 로고    scopus 로고
    • Modeling and analysis of the spread of computer virus
    • Zhu Q, Yang X, Ren J. Modeling and analysis of the spread of computer virus. Communications in Nonlinear Science 2012; 17:5117-5124.
    • (2012) Communications in Nonlinear Science , vol.17 , pp. 5117-5124
    • Zhu, Q.1    Yang, X.2    Ren, J.3
  • 23
    • 84888626174 scopus 로고    scopus 로고
    • Modeling and analysis of the effects of antivirus software on an infected computer network
    • Shukla JB, Singh G, Shukla P, Tripathi A. Modeling and analysis of the effects of antivirus software on an infected computer network. Applied Mathemaics and Computation 2014; 227:11-18.
    • (2014) Applied Mathemaics and Computation , vol.227 , pp. 11-18
    • Shukla, J.B.1    Singh, G.2    Shukla, P.3    Tripathi, A.4
  • 25
    • 34248175732 scopus 로고    scopus 로고
    • SEIRS epidemic model with delay for transmission of malicious objects in computer network
    • Mishra BK, Saini DK. SEIRS epidemic model with delay for transmission of malicious objects in computer network. Applied Mathematics and Computation 2007; 188: 1476-1482.
    • (2007) Applied Mathematics and Computation , vol.188 , pp. 1476-1482
    • Mishra, B.K.1    Saini, D.K.2
  • 26
    • 84908655708 scopus 로고    scopus 로고
    • Stability analysis of an e-SEIAR model with point-to-group worm propagatio
    • Wang F, Zhang Y, Wang C, Ma J. Stability analysis of an e-SEIAR model with point-to-group worm propagatio. Communications in Nonlinear Science 2015; 20(3): 897-904.
    • (2015) Communications in Nonlinear Science , vol.20 , Issue.3 , pp. 897-904
    • Wang, F.1    Zhang, Y.2    Wang, C.3    Ma, J.4
  • 27
    • 79956061729 scopus 로고    scopus 로고
    • Dynamic model of worms with vertical transmission in computer network
    • Mishra BK, Pandey SK. Dynamic model of worms with vertical transmission in computer network. Applied Mathematics and Computation 2011; 217:8438-8446.
    • (2011) Applied Mathematics and Computation , vol.217 , pp. 8438-8446
    • Mishra, B.K.1    Pandey, S.K.2
  • 28
    • 84857030292 scopus 로고    scopus 로고
    • Stability analysis of VEISV propagation modeling for network worm attack
    • Toutonji OA, Yoo SM, Park M. Stability analysis of VEISV propagation modeling for network worm attack. Applied Mathematical Modelling 2012; 36:2751-2761.
    • (2012) Applied Mathematical Modelling , vol.36 , pp. 2751-2761
    • Toutonji, O.A.1    Yoo, S.M.2    Park, M.3
  • 29
    • 84922625856 scopus 로고    scopus 로고
    • A note on global stability of VEISV propagation modeling for network worm attack
    • Yang Y. A note on global stability of VEISV propagation modeling for network worm attack. Applied Mathematical Modelling 2015; 39(2): 776-780.
    • (2015) Applied Mathematical Modelling , vol.39 , Issue.2 , pp. 776-780
    • Yang, Y.1
  • 31
    • 70350369682 scopus 로고    scopus 로고
    • SEIQS model for the transmission of malicious objects in computer network
    • Mishra BK, Jha N. SEIQS model for the transmission of malicious objects in computer network. Applied Mathematical Modelling 2010; 34:710-715.
    • (2010) Applied Mathematical Modelling , vol.34 , pp. 710-715
    • Mishra, B.K.1    Jha, N.2
  • 32
    • 84872605365 scopus 로고    scopus 로고
    • Mathematical model on the transmission of worms in wireless sensor network
    • Mishra BK, Keshri N. Mathematical model on the transmission of worms in wireless sensor network. Applied Mathematical Modelling 2013; 37:4103-4111.
    • (2013) Applied Mathematical Modelling , vol.37 , pp. 4103-4111
    • Mishra, B.K.1    Keshri, N.2
  • 33
    • 84895923150 scopus 로고    scopus 로고
    • Dynamic model of worm propagation in computer network
    • Mishra BK, Pandey SK. Dynamic model of worm propagation in computer network. Applied Mathematical Modelling 2014; 38:2173-2179.
    • (2014) Applied Mathematical Modelling , vol.38 , pp. 2173-2179
    • Mishra, B.K.1    Pandey, S.K.2
  • 34
    • 77951206095 scopus 로고    scopus 로고
    • Stability analysis of a SEIQV epidemic model for rapid spreading worms
    • Wang F, Zhang Y, Wang C, Ma J, Moon SJ. Stability analysis of a SEIQV epidemic model for rapid spreading worms. Computer Security 2010; 29:410-418.
    • (2010) Computer Security , vol.29 , pp. 410-418
    • Wang, F.1    Zhang, Y.2    Wang, C.3    Ma, J.4    Moon, S.J.5
  • 35
    • 84876410834 scopus 로고    scopus 로고
    • Stochastic modeling of computer virus spreading with warning signals
    • Amador J, Artalejo JR. Stochastic modeling of computer virus spreading with warning signals. Journal Franklin I 2013; 350 :1112-1138.
    • (2013) Journal Franklin I , vol.350 , pp. 1112-1138
    • Amador, J.1    Artalejo, J.R.2
  • 36
    • 84881544095 scopus 로고    scopus 로고
    • Dynamical analysis and control strategies on malware propagation model
    • Feng L, Liao X, Han Q, Li H. Dynamical analysis and control strategies on malware propagation model. Applied Mathematical Modelling 2013; 16-17:8225-8236.
    • (2013) Applied Mathematical Modelling , vol.16-17 , pp. 8225-8236
    • Feng, L.1    Liao, X.2    Han, Q.3    Li, H.4
  • 37
    • 84897057483 scopus 로고    scopus 로고
    • A mathematical model for a distributed attack on targeted resources in a computer network
    • Haldar K, Mishra BK. A mathematical model for a distributed attack on targeted resources in a computer network. Communications in Nonlinear Science 2014; 19:3149-3160.
    • (2014) Communications in Nonlinear Science , vol.19 , pp. 3149-3160
    • Haldar, K.1    Mishra, B.K.2
  • 40
    • 84885071747 scopus 로고    scopus 로고
    • The effect of infected external computers on the spread of viruses: a compartment modeling study
    • Yang LX, Yang X. The effect of infected external computers on the spread of viruses: a compartment modeling study. Physica A 2013; 392:6523-6535.
    • (2013) Physica A , vol.392 , pp. 6523-6535
    • Yang, L.X.1    Yang, X.2
  • 42
    • 0037071123 scopus 로고    scopus 로고
    • A unified prediction of computer virus spread in connected networks
    • Billings L, Spears WM, Schwartz IB. A unified prediction of computer virus spread in connected networks. Physics Letters A 2002; 298:261-266.
    • (2002) Physics Letters A , vol.298 , pp. 261-266
    • Billings, L.1    Spears, W.M.2    Schwartz, I.B.3
  • 43
    • 84863226775 scopus 로고    scopus 로고
    • Effect of anti-virus software on infectious nodes in computer network: a mathematical model
    • Mishra BK, Pandey SK. Effect of anti-virus software on infectious nodes in computer network: a mathematical model. Physics Letters A 2012; 376:2389-2393.
    • (2012) Physics Letters A , vol.376 , pp. 2389-2393
    • Mishra, B.K.1    Pandey, S.K.2
  • 46
    • 42649108776 scopus 로고    scopus 로고
    • Epidemic state analysis of computers under malware attacks
    • Kondakci S. Epidemic state analysis of computers under malware attacks. Simulation Modelling Practice and Theory 2008; 16:571-584.
    • (2008) Simulation Modelling Practice and Theory , vol.16 , pp. 571-584
    • Kondakci, S.1
  • 47
    • 79251590254 scopus 로고    scopus 로고
    • Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered
    • Kondakci S, Dincer C. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered. Security in Communication Networks 2011; 4:216-238.
    • (2011) Security in Communication Networks , vol.4 , pp. 216-238
    • Kondakci, S.1    Dincer, C.2
  • 48
    • 84869469025 scopus 로고    scopus 로고
    • Probabilistic e-epidemic model on computer worms
    • 2012, Dhaka, Bangladesh
    • Mishra BK, Goswami RT. Probabilistic e-epidemic model on computer worms. Proceedings of ICIEV 2012, Dhaka, Bangladesh, 2012; :1091-1096.
    • (2012) Proceedings of ICIEV , pp. 1091-1096
    • Mishra, B.K.1    Goswami, R.T.2
  • 51
    • 77952567244 scopus 로고    scopus 로고
    • A computer virus spread model based on cellular automata of graphs
    • Lecture Notes Computer Science, Salamanca, Spain, 5518;
    • Martín del Rey A. A computer virus spread model based on cellular automata of graphs, Proceedings of 10th International Conference Artificial Neural Networks, Lecture Notes Computer Science, Salamanca, Spain, 2009, 5518; 503-506.
    • (2009) Proceedings of 10th International Conference Artificial Neural Networks , pp. 503-506
    • Martín del Rey, A.1
  • 54
    • 84873325887 scopus 로고    scopus 로고
    • An agent-based model to simulate coordinated response to malware outbreak within and organization
    • Pan J, Fung CC. An agent-based model to simulate coordinated response to malware outbreak within and organization. International Journal of Information Security 2012; 5:115-131.
    • (2012) International Journal of Information Security , vol.5 , pp. 115-131
    • Pan, J.1    Fung, C.C.2
  • 55
    • 79955090308 scopus 로고    scopus 로고
    • A mathematical model for the effect of malicious object on computer network immune system
    • Saini DK. A mathematical model for the effect of malicious object on computer network immune system. Applied Mathematical Modelling 2011; 35:3777-3787.
    • (2011) Applied Mathematical Modelling , vol.35 , pp. 3777-3787
    • Saini, D.K.1
  • 56
    • 84872680733 scopus 로고    scopus 로고
    • A computer virus spreading model based on resource limitations and interaction costs
    • Huang CY, Lee CL, Wen TH, Sun CT. A computer virus spreading model based on resource limitations and interaction costs. Journal of Systems and Software 2013; 86:801-808.
    • (2013) Journal of Systems and Software , vol.86 , pp. 801-808
    • Huang, C.Y.1    Lee, C.L.2    Wen, T.H.3    Sun, C.T.4
  • 58
    • 0017228276 scopus 로고
    • Qualitative analyses of communicable disease models
    • Hethcote HW. Qualitative analyses of communicable disease models. Mathematical Biosciences 1976; 28:335-356.
    • (1976) Mathematical Biosciences , vol.28 , pp. 335-356
    • Hethcote, H.W.1
  • 60
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • Hethcote HW. The mathematics of infectious diseases. SIAM Review 2000; 42:599-653.
    • (2000) SIAM Review , vol.42 , pp. 599-653
    • Hethcote, H.W.1
  • 61
    • 0003801963 scopus 로고    scopus 로고
    • Wolfram Media Inc.: Champaign, Illinois, USA
    • Wolfram S. A New Kind of Science. Wolfram Media Inc.: Champaign, Illinois, USA, 2002.
    • (2002) A New Kind of Science
    • Wolfram, S.1
  • 62
    • 0002353129 scopus 로고    scopus 로고
    • A brief history of cellular automata
    • Sarkar P. A brief history of cellular automata. ACM Computing Surveys 2000; 32:80-107.
    • (2000) ACM Computing Surveys , vol.32 , pp. 80-107
    • Sarkar, P.1
  • 63
    • 78649853511 scopus 로고    scopus 로고
    • AG Hoekstra, J Kroc, Sloot PMA (eds.) . Springer: Berlin, Heidelberg, Germany
    • AG Hoekstra, J Kroc, Sloot PMA (eds.) Simulating Complex Systems by Cellular Automata. Springer: Berlin, Heidelberg, Germany, 2010.
    • (2010) Simulating Complex Systems by Cellular Automata
  • 64
    • 84884812495 scopus 로고    scopus 로고
    • Cellular automata to describe seismicity: a review
    • Jimenez A. Cellular automata to describe seismicity: a review. Acta Geophysica 2013; 61:1325-1350.
    • (2013) Acta Geophysica , vol.61 , pp. 1325-1350
    • Jimenez, A.1
  • 65
    • 84899547219 scopus 로고    scopus 로고
    • Modeling dynamics of HIV infected cells using stochastic cellular automata
    • Precharattana N, Triampo W. Modeling dynamics of HIV infected cells using stochastic cellular automata. Physica A 2014; 407:303-311.
    • (2014) Physica A , vol.407 , pp. 303-311
    • Precharattana, N.1    Triampo, W.2
  • 66
    • 84899587152 scopus 로고    scopus 로고
    • Addressing population heterogeneity and distribution in epidemics models using a cellular automata approach
    • López L, Burguerner G, Giovanini L. Addressing population heterogeneity and distribution in epidemics models using a cellular automata approach. BMC Res. Notes 2014; 7:234-245.
    • (2014) BMC Res. Notes , vol.7 , pp. 234-245
    • López, L.1    Burguerner, G.2    Giovanini, L.3
  • 67
    • 0030619791 scopus 로고    scopus 로고
    • A model for predicting forest fire spreading using cellular automata
    • Karafyllidis I, Thanailakis A. A model for predicting forest fire spreading using cellular automata. Ecological Modelling 1997; 99:87-97.
    • (1997) Ecological Modelling , vol.99 , pp. 87-97
    • Karafyllidis, I.1    Thanailakis, A.2
  • 68
    • 36049013617 scopus 로고    scopus 로고
    • Design and implementation of an integrated GIS-based cellular automata model to characterize forest fire behaviour
    • Yassemi S, Dragićević S, Schmidt M. Design and implementation of an integrated GIS-based cellular automata model to characterize forest fire behaviour. Ecological Modelling 2008; 210:71-84.
    • (2008) Ecological Modelling , vol.210 , pp. 71-84
    • Yassemi, S.1    Dragićević, S.2    Schmidt, M.3
  • 72
    • 38549110113 scopus 로고    scopus 로고
    • On the stability of the malware free equilibrium in cell phones networks with spatial dynamics
    • Glasgow, Scotland
    • Ramachandran K, Sikdar B. On the stability of the malware free equilibrium in cell phones networks with spatial dynamics, Proceedings of 2007 IEEE International Conference on Communications, Glasgow, Scotland, 2007; :6169-6174.
    • (2007) Proceedings of 2007 IEEE International Conference on Communications , pp. 6169-6174
    • Ramachandran, K.1    Sikdar, B.2
  • 74
    • 53949105871 scopus 로고    scopus 로고
    • The opportunistic transmission of wireless worms between mobile devices
    • Rhodes CJ, Nekovee M. The opportunistic transmission of wireless worms between mobile devices. Physica A 2008; 387:6837-6844.
    • (2008) Physica A , vol.387 , pp. 6837-6844
    • Rhodes, C.J.1    Nekovee, M.2
  • 76
    • 84875292903 scopus 로고    scopus 로고
    • A combinatorial model of malware diffusion via Bluetooth connections
    • Merler S, Jurmanm G . A combinatorial model of malware diffusion via Bluetooth connections. PLos ONE 8 2013. art. no. e59468.
    • (2013) PLos ONE , vol.8
    • Merler, S.1    Jurmanm, G.2
  • 77
    • 84902247607 scopus 로고    scopus 로고
    • Propagation model of smartphone worms based on semi-Markov process and social relationship graph
    • Peng S, Wu M, Wang G, Yu S. Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Computer Security 2014; 44:92-103.
    • (2014) Computer Security , vol.44 , pp. 92-103
    • Peng, S.1    Wu, M.2    Wang, G.3    Yu, S.4
  • 78
    • 84875215204 scopus 로고    scopus 로고
    • Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
    • Peng S, Wang G, Yu S. Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. Journal of Computational and System Sciences 2013; 79:586-595.
    • (2013) Journal of Computational and System Sciences , vol.79 , pp. 586-595
    • Peng, S.1    Wang, G.2    Yu, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.