S. Tripathy, Sisira Kumar Kapat, R. Patro, Susant Kumar Das
{"title":"利用几何级数的恶意软件传播的综合研究","authors":"S. Tripathy, Sisira Kumar Kapat, R. Patro, Susant Kumar Das","doi":"10.1109/CINE.2017.31","DOIUrl":null,"url":null,"abstract":"This paper focuses to present malware propagation mathematically and it also shows how the population of malware grows in a well-defined ultra-large sized network. The propagation refers to entry of a malware to a system as well as copying malware from one device to another in networked environment. We assumed the network to be SNS. We have also discussed the closure properties used by malware while propagation. The properties are quite useful to detect and avoid malware. We have calculated the number of infected system in a geometrically progressed system without defense and modified the equation to calculate the number of infected system for practical network.","PeriodicalId":236972,"journal":{"name":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Comprehensive Study of Malware Propagation Using Geometric Progression\",\"authors\":\"S. Tripathy, Sisira Kumar Kapat, R. Patro, Susant Kumar Das\",\"doi\":\"10.1109/CINE.2017.31\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses to present malware propagation mathematically and it also shows how the population of malware grows in a well-defined ultra-large sized network. The propagation refers to entry of a malware to a system as well as copying malware from one device to another in networked environment. We assumed the network to be SNS. We have also discussed the closure properties used by malware while propagation. The properties are quite useful to detect and avoid malware. We have calculated the number of infected system in a geometrically progressed system without defense and modified the equation to calculate the number of infected system for practical network.\",\"PeriodicalId\":236972,\"journal\":{\"name\":\"2017 3rd International Conference on Computational Intelligence and Networks (CINE)\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 3rd International Conference on Computational Intelligence and Networks (CINE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINE.2017.31\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 3rd International Conference on Computational Intelligence and Networks (CINE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINE.2017.31","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Comprehensive Study of Malware Propagation Using Geometric Progression
This paper focuses to present malware propagation mathematically and it also shows how the population of malware grows in a well-defined ultra-large sized network. The propagation refers to entry of a malware to a system as well as copying malware from one device to another in networked environment. We assumed the network to be SNS. We have also discussed the closure properties used by malware while propagation. The properties are quite useful to detect and avoid malware. We have calculated the number of infected system in a geometrically progressed system without defense and modified the equation to calculate the number of infected system for practical network.