CFP last date
20 May 2024
Reseach Article

A Survey on Malware Propagation Analysis and Prevention Model

by Sneha S., Malathi L., Saranya R.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 11
Year of Publication: 2015
Authors: Sneha S., Malathi L., Saranya R.
10.5120/ijca2015907466

Sneha S., Malathi L., Saranya R. . A Survey on Malware Propagation Analysis and Prevention Model. International Journal of Computer Applications. 131, 11 ( December 2015), 23-27. DOI=10.5120/ijca2015907466

@article{ 10.5120/ijca2015907466,
author = { Sneha S., Malathi L., Saranya R. },
title = { A Survey on Malware Propagation Analysis and Prevention Model },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 11 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number11/23494-2015907466/ },
doi = { 10.5120/ijca2015907466 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:03.144636+05:30
%A Sneha S.
%A Malathi L.
%A Saranya R.
%T A Survey on Malware Propagation Analysis and Prevention Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 11
%P 23-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, the security threats imposed by email-based malware, modeling the propagation analysis and prevention of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of mail malware, modern email malware exhibits two new features. One is reinfection and another one is self-start. In reinfection, whenever any healthy or infected recipients open the malicious attached file the modern email malware sends its copy to the recipients contact. In self-start, whenever compromised computers restart or malicious files are visited the malware spreads over the system. To avoid these types of issues the security specialists use some of the possible techniques and methods to stop and remove the threats. At the same time the malware developers exploit new malware that bypass implemented security features. In this paper, we analyzed the malware propagation and detecting mechanisms. This survey paper highlights the existing detection and analysis methodologies used for these malicious code.

References
  1. Y. Wang, S. Wen, Y. Xiang, and W. Zhou. ‘Modeling the propagation of worms in networks: A survey’, Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013.
  2. M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis. ‘Sampling strategies for epidemic-style information dissemination. Networking’, IEEE/ACM Transactions on, 18(4):1013–1025, 2010.
  3. C. C. Zou, W. Gong, and D. Towsley. ‘Code red worm propagation modeling and analysis’, In Proceedings of the 9th ACM conference on Computer and communications security, CCS’02, pages 138–147, New York, NY, USA, 2002.
  4. R. Pastor-Satorras and A. Vespignani. ‘Epidemic spreading in scale-free networks’, PHYS.REV.LETT., 86:3200–3203, 2001.
  5. M. Boguna, R. Pastor-Satorras, and A. Vespignani,’Epidemic spreading in complex networks with degree correlations’, Lecture Notes in Physics, pages 1–23, 2003.
  6. Y. Moreno, J. B. G´omez, and A. F. Pacheco, ‘Epidemic incidence in correlated complex networks’ , Phys. Rev. E, 68, Sep 2003.
  7. Y. Moreno, R. Pastor-Satorras, and A. Vespignani. ‘Epidemic outbreaks in complex heterogeneous networks’, The European Physical Journal B, 26(4):521–529, Apr. 2002.
  8. C. C. Zou, D. Towsley, and W. Gong, ‘Modeling and simulation study of the propagation and defense of internet e-mail worms’, IEEE Transactions on Dependable and Secure Computing, 4(2):105–118,2007.
  9. Z. Chen, L. Gao, and K. Kwiat, ‘Modeling the spread of active worms’, In INFOCOM 2003. 22th IEEE International Conference on Computer Communications. Proceedings, pages 1890–1900, 2003.
  10. S. Wen, W. Zhou, Y. Wang, W. Zhou, and Y. Xiang,’ Locating defense positions for thwarting the propagation of topological worms’. Communications Letters, IEEE, 16(4):560–563, 2012
  11. S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia, ‘Modeling propagation dynamics of social network worms’, Parallel and Distributed Systems,IEEE Transactions on, 24(8):1633–1643, 2013.
  12. C. C. Zou, W. Gong, and D. Towsley, ’Code red worm propagation modeling and analysis’. In Proceedings of the 9th ACM conference on Computer and communications security, CCS’02, pages 138–147, New York, NY, USA, 2002.
  13. Yanping Zhang, Tingting Sun and Shu Zhao, ‘A Novel Model to Restrain Email Virus Propagation’, IEEE International Conference on Granular Computing, 2012.
  14. Chao Wang, Ke Xu and Gaoyu Zhang, ‘A SEIR-based model for virus propagation on SNS’, IEEE DOI 10.1109/EIDWT, 2013.
  15. Jintao Xiong, ‘ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control’, October 29, 2004.
  16. Sheng Wen, Yang Xiang and Weijia Jia, ‘Modeling and Analysis on the Propagation Dynamics of Modern Email Malware’, IEEE transactions on dependable and secure computing, vol. 11, no. 4, July/August 2014.
  17. Ms Ranjani.R, Mrs L.Malathi, “SIP Flooding Attack Detection Using Hybrid Detection Algorithm” in “International Journal of Modern Trends in Engineering Research” vol 01, issue 05, Nov 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Email malware SIS Model SIR Model SII model ACT SEIR Model.