Projects per year
Abstract
Epidemic models like the SIS or SIR model enable us to describe simple spreading processes over networks but are often not sufficient to accurately capture more complex network dynamics as exhibited by sophisticated and malicious computer worms. Many of the common assumptions behind epidemic models do not necessary hold if the process under investigation spans big networks or large scales of time.We extend the standard SIS network model by dropping the assumption of a constant curing rate in favour of a time-dependent curing rate function, which enables us to reflect changes in the effectiveness of the active worm removal process over time. The resulting time-dependent mean-field SIS model allows us to study the evolution of the size of computer worm bot-nets. We exemplify the complete procedure, including data-processing, needed to obtain a reliable model on data from Conficker, an extremely resilient computer worm. Using empirical data obtained from the Conficker sinkhole, we fit long time periods of up to 6 years on multiple scales and different levels of noise. We end by reflecting on the limits of epidemic models in empirical analysis of malware threats.
Original language | English |
---|---|
Title of host publication | IEEE Conference on Communications and Network Security 2016 |
Place of Publication | Piscataway, NJ |
Publisher | IEEE |
Pages | 1-9 |
Number of pages | 9 |
ISBN (Electronic) | 978-1-5090-3065-1 |
DOIs | |
Publication status | Published - 2016 |
Event | IEEE Conference on Communications and Network Security, ICNS 2016 - Philadelpia, United States Duration: 17 Oct 2016 → 19 Oct 2016 http://cns2016.ieee-cns.org/ |
Conference
Conference | IEEE Conference on Communications and Network Security, ICNS 2016 |
---|---|
Abbreviated title | IEEE CNS 2016 |
Country/Territory | United States |
City | Philadelpia |
Period | 17/10/16 → 19/10/16 |
Internet address |
Keywords
- Computational modeling
- DVD
- Mathematical model
- Grippers
Fingerprint
Dive into the research topics of 'A Time-dependent SIS-model for Long-term Computer Worm Evolution'. Together they form a unique fingerprint.Projects
- 1 Active
-
Cybersecurity (TPM)
van Eeten, M. J. G., Hernandez Ganan, C., Gürses, F. S., van Wegberg, R. S., Parkin, S. E., Zhauniarovich, Y., van Engelenburg, S. H., Kadenko, N. I., Labunets, K., Akyazi, U., Bouwman, X. B., Jansen, B. A., Kaur, M., Al Alsadi, A., Lone, Q. B., Turcios Rodriguez, E. R., Vermeer, M., van Harten, V. T. C., Vetrivel, S., Oomens, E. C., Kustosch, L. F., Bisogni, F., Ciere, M., Fiebig, T., Korczynski, M. T., Moreira Moura, G. C., Noroozian, A., Pieters, W., Tajalizadehkhoob, S., Dacier, B. H. A., San José Sanchez, J. & Çetin, F. O.
1/01/10 → …
Project: Research