A Stochastic Model of Multivirus Dynamics

ABSTRACT:

Understanding the spreading dynamics of computer viruses (worms, attacks) is an
important research problem, and has received much attention from the
communities of both computer security and statistical physics. However, previous
studies have mainly focused on single-virus spreading dynamics. In this paper, we
study multi-virus spreading dynamics, where multiple viruses attempt to infect
computers while possibly combating against each other because, for example, they
are controlled by multiple bot masters. Specifically, we propose and analyze a
general model (and its two special cases) of multi-virus spreading dynamics in
arbitrary networks (i.e., we do not make any restriction on network topologies),
where the viruses may or may not core side on computers. Our model offers
analytical results for addressing questions such as: What are the sufficient
conditions (also known as epidemic thresholds) under which the multiple viruses
will die out? What if some viruses can “rob” others? What characteristics does the
multivirus epidemic dynamics exhibit when the viruses are (approximately)
equally powerful? The analytical results make a fundamental connection between
two types of factors: defense capability and network connectivity. This allows us to
draw various insights that can be used to guide security defense.


EXISTING SYSTEM:
In the existing system, studies have mainly focused on single-virus spreading
dynamics.




For multivirus spreading dynamics, there are two scenarios: the viruses spread
independent of each other and thus the dynamics can be understood as a trivial
extension of the single-virus dynamics; the viruses spread non-independently and
may further fight against each other.



DISADVANTAGES OF EXISTING SYSTEM:

The well established approaches such as access control and cryptography.


Despite the attention that has been paid by communities including computer
security and statistical physics, existing studies mainly focused on single-virus
spreading dynamics.


PROPOSED SYSTEM:

In this paper, we study multi-virus spreading dynamics, where multiple viruses
attempt to infect computers while possibly combating against each other because,
for example, they are controlled by multiple bot-masters.
Specifically, we propose and analyze a general model (and its two special cases) of
multi-virus spreading dynamics in arbitrary networks (i.e., we do not make any
restriction on network topologies), where the viruses may or may not core side on
computers. Our model offers analytical results for addressing questions such as:
What are the sufficient conditions (also known as epidemic thresholds) under
which the multiple viruses will die out? What if some viruses can “rob” others?
What characteristics does the multivirus epidemic dynamics exhibit when the
viruses are (approximately) equally powerful? The analytical results make a
fundamental connection between two types of factors: defense capability and
network connectivity. This allows us to draw various insights that can be used to
guide security defense.



ADVANTAGES OF PROPOSED SYSTEM:

To solve the problem of computer viruses (malware, worms, or bots), we need a set
of approaches, ranging from legislation to technology.


SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:


   • System               : Pentium IV 2.4 GHz.
   • Hard Disk            : 40 GB.
• Floppy Drive       : 1.44 Mb.
  • Monitor            : 15 VGA Colour.
  • Mouse              : Logitech.
  • Ram                : 512 Mb.


SOFTWARE REQUIREMENTS:


  • Operating system : - Windows XP.
  • Coding Language : JAVA




REFERENCE:

Shouhuai Xu, Wenlian Lu, and Zhenxin Zhan, “A Stochastic Model of Multivirus
Dynamics”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.

More Related Content

DOCX
An optimal distributed malware defense system for mobile networks with hetero...
DOCX
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
PPTX
Wireless sensor network security issues
PDF
Malware propagation in large scale networks
DOCX
Malware propagation in large scale networks
PDF
Malware propagation in large scale networks
An optimal distributed malware defense system for mobile networks with hetero...
JPJ1451 Optimal Distributed Malware Defense in Mobile Networks with Heteroge...
optimal distributed malware defense in mobile networks with heterogeneous dev...
Wireless sensor network security issues
Malware propagation in large scale networks
Malware propagation in large scale networks
Malware propagation in large scale networks

What's hot (6)

PDF
An overview of computer viruses in a research environment
PDF
An approach to containing computer viruses
PDF
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
PDF
A cooperative immunization system for an untrusting internet
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
An overview of computer viruses in a research environment
An approach to containing computer viruses
#AntimalwareDay: The ESET Celebration of the Origins of Computer Defense in N...
A cooperative immunization system for an untrusting internet
A wireless intrusion detection system and a new attack model (synopsis)
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
Ad

Viewers also liked (15)

PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
PPTX
Sindrome compartimental expo 1
PDF
2012 ieee android project titles
PDF
IEEE PROJECTS 2013 for me
DOCX
A trigger identification service for defending reactive jammers in wireless s...
PDF
Whadddyathink
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
PDF
2012 13 eee ieee projects - jp infotech
DOCX
Adaptive membership functions for hand written character recognition by voron...
PDF
Android ieee projects 2012
DOCX
A gossip protocol for dynamic resource management in large cloud environments
PDF
The China Analyst - September 2011
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Sindrome compartimental expo 1
2012 ieee android project titles
IEEE PROJECTS 2013 for me
A trigger identification service for defending reactive jammers in wireless s...
Whadddyathink
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
2012 13 eee ieee projects - jp infotech
Adaptive membership functions for hand written character recognition by voron...
Android ieee projects 2012
A gossip protocol for dynamic resource management in large cloud environments
The China Analyst - September 2011
Ad

Similar to A stochastic model of multivirus dynamics (20)

PDF
X-ware: a proof of concept malware utilizing artificial intelligence
PDF
Search Diverse Models for Proactive Software Diversification
PDF
A generic virus detection agent on the internet
PDF
A network worm vaccine architecture
PPT
Network virus detection & prevention
PPT
Virus vs Anti-Virus
PDF
Application of hardware accelerated extensible network nodes for internet wor...
PDF
An epidemiological model of virus spread and cleanup
PDF
A trust system based on multi level virus detection
PDF
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
PDF
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
PDF
Modeling and Containment of Uniform Scanning Worms
PDF
L018118083.new ramya publication (1)
PDF
A computational model of computer virus propagation
PDF
Ijfls05
PDF
A distributed approach against computer viruses inspired by the immune system
PDF
A framework for modelling trojans and computer virus infection
DOCX
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
PDF
Biologically inspired defenses against computer viruses
PDF
Broadband network virus detection system based on bypass monitor
X-ware: a proof of concept malware utilizing artificial intelligence
Search Diverse Models for Proactive Software Diversification
A generic virus detection agent on the internet
A network worm vaccine architecture
Network virus detection & prevention
Virus vs Anti-Virus
Application of hardware accelerated extensible network nodes for internet wor...
An epidemiological model of virus spread and cleanup
A trust system based on multi level virus detection
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
2011-A_Novel_Approach_to_Troubleshoot_Security_Attacks_in_Local_Area_Networks...
Modeling and Containment of Uniform Scanning Worms
L018118083.new ramya publication (1)
A computational model of computer virus propagation
Ijfls05
A distributed approach against computer viruses inspired by the immune system
A framework for modelling trojans and computer virus infection
1Running Head COMPUTER WORMS MALWARE IN CYBER SECURITY14COM.docx
Biologically inspired defenses against computer viruses
Broadband network virus detection system based on bypass monitor

Recently uploaded (20)

PDF
anganwadi services for the b.sc nursing and GNM
PPTX
growth and developement.pptxweeeeerrgttyyy
PPTX
Copy of ARAL Program Primer_071725(1).pptx
PPSX
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
PDF
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
African Communication Research: A review
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PPTX
Approach to a child with acute kidney injury
PPT
hemostasis and its significance, physiology
PPTX
Power Point PR B.Inggris 12 Ed. 2019.pptx
PPTX
Theoretical for class.pptxgshdhddhdhdhgd
PPTX
4. Diagnosis and treatment planning in RPD.pptx
PDF
Unleashing the Potential of the Cultural and creative industries
PDF
GSA-Past-Papers-2010-2024-2.pdf CSS examination
PPTX
operating_systems_presentations_delhi_nc
PDF
Health aspects of bilberry: A review on its general benefits
PPTX
MMW-CHAPTER-1-final.pptx major Elementary Education
PPTX
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
anganwadi services for the b.sc nursing and GNM
growth and developement.pptxweeeeerrgttyyy
Copy of ARAL Program Primer_071725(1).pptx
namma_kalvi_12th_botany_chapter_9_ppt.ppsx
POM_Unit1_Notes.pdf Introduction to Management #mba #bba #bcom #bballb #class...
2025 High Blood Pressure Guideline Slide Set.pptx
African Communication Research: A review
ACFE CERTIFICATION TRAINING ON LAW.pptx
Approach to a child with acute kidney injury
hemostasis and its significance, physiology
Power Point PR B.Inggris 12 Ed. 2019.pptx
Theoretical for class.pptxgshdhddhdhdhgd
4. Diagnosis and treatment planning in RPD.pptx
Unleashing the Potential of the Cultural and creative industries
GSA-Past-Papers-2010-2024-2.pdf CSS examination
operating_systems_presentations_delhi_nc
Health aspects of bilberry: A review on its general benefits
MMW-CHAPTER-1-final.pptx major Elementary Education
pharmaceutics-1unit-1-221214121936-550b56aa.pptx
Cite It Right: A Compact Illustration of APA 7th Edition.pptx

A stochastic model of multivirus dynamics

  • 1. A Stochastic Model of Multivirus Dynamics ABSTRACT: Understanding the spreading dynamics of computer viruses (worms, attacks) is an important research problem, and has received much attention from the communities of both computer security and statistical physics. However, previous studies have mainly focused on single-virus spreading dynamics. In this paper, we study multi-virus spreading dynamics, where multiple viruses attempt to infect computers while possibly combating against each other because, for example, they are controlled by multiple bot masters. Specifically, we propose and analyze a general model (and its two special cases) of multi-virus spreading dynamics in arbitrary networks (i.e., we do not make any restriction on network topologies), where the viruses may or may not core side on computers. Our model offers analytical results for addressing questions such as: What are the sufficient conditions (also known as epidemic thresholds) under which the multiple viruses will die out? What if some viruses can “rob” others? What characteristics does the multivirus epidemic dynamics exhibit when the viruses are (approximately) equally powerful? The analytical results make a fundamental connection between two types of factors: defense capability and network connectivity. This allows us to draw various insights that can be used to guide security defense. EXISTING SYSTEM:
  • 2. In the existing system, studies have mainly focused on single-virus spreading dynamics. For multivirus spreading dynamics, there are two scenarios: the viruses spread independent of each other and thus the dynamics can be understood as a trivial extension of the single-virus dynamics; the viruses spread non-independently and may further fight against each other. DISADVANTAGES OF EXISTING SYSTEM: The well established approaches such as access control and cryptography. Despite the attention that has been paid by communities including computer security and statistical physics, existing studies mainly focused on single-virus spreading dynamics. PROPOSED SYSTEM: In this paper, we study multi-virus spreading dynamics, where multiple viruses attempt to infect computers while possibly combating against each other because, for example, they are controlled by multiple bot-masters.
  • 3. Specifically, we propose and analyze a general model (and its two special cases) of multi-virus spreading dynamics in arbitrary networks (i.e., we do not make any restriction on network topologies), where the viruses may or may not core side on computers. Our model offers analytical results for addressing questions such as: What are the sufficient conditions (also known as epidemic thresholds) under which the multiple viruses will die out? What if some viruses can “rob” others? What characteristics does the multivirus epidemic dynamics exhibit when the viruses are (approximately) equally powerful? The analytical results make a fundamental connection between two types of factors: defense capability and network connectivity. This allows us to draw various insights that can be used to guide security defense. ADVANTAGES OF PROPOSED SYSTEM: To solve the problem of computer viruses (malware, worms, or bots), we need a set of approaches, ranging from legislation to technology. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB.
  • 4. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : JAVA REFERENCE: Shouhuai Xu, Wenlian Lu, and Zhenxin Zhan, “A Stochastic Model of Multivirus Dynamics”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.