Agent-based modeling of malware dynamics in heterogeneous environments

ABSTRACTThe increasing convergence of power‐law networks such as social networking and peer‐to‐peer applications, web‐delivered applications, and mobile platforms makes today's users highly vulnerable to entirely new generations of malware that exploit vulnerabilities in web applications and mo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2013-12, Vol.6 (12), p.1576-1589
Hauptverfasser: Bose, Abhijit, Shin, Kang G.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1589
container_issue 12
container_start_page 1576
container_title Security and communication networks
container_volume 6
creator Bose, Abhijit
Shin, Kang G.
description ABSTRACTThe increasing convergence of power‐law networks such as social networking and peer‐to‐peer applications, web‐delivered applications, and mobile platforms makes today's users highly vulnerable to entirely new generations of malware that exploit vulnerabilities in web applications and mobile platforms for new infections, while using the power‐law connectivity for finding new victims. The traditional epidemic models based on assumptions of homogeneity, average‐degree distributions, and perfect‐mixing are inadequate to model this type of malware propagation. In this paper, we study four aspects crucial to modeling malware propagation: application‐level interactions among users of such networks, local network structure, user mobility, and network coordination of malware such as botnets. Since closed‐form solutions of malware propagation considering these aspects are difficult to obtain, we describe an open‐source, flexible agent‐based emulation framework that can be used by malware researchers for studying today's complex malware. The framework, called Agent‐Based Malware Modeling (AMM), allows different applications, network structure, network coordination, and user mobility in either a geographic or a logical domain to study various infection and propagation scenarios. In addition to traditional worms and viruses, the framework also allows modeling network coordination of malware such as botnets. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios. As representative examples, we examine two well‐known malware spreading mechanisms: (i) a malicious virus such as Cabir spreading among the subscribers of a cellular network using Bluetooth and (ii) a hybrid worm that exploit email and file‐sharing to infect users of a social network. In both cases, we identify the parameters most important to the spread of the epidemic based upon our extensive simulation results. Copyright © 2011 John Wiley & Sons, Ltd. This paper presents a novel agent‐based framework for realistic modeling of malware propagation in heterogeneous networks, applications and platforms. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios for the given network. Two well‐known malware spreading m
doi_str_mv 10.1002/sec.298
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1475554292</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3139740151</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3938-8f38e4b92a74d9405dadfce9ba0f92d144be9f44438fb9c3f11a123af0b6d1ae3</originalsourceid><addsrcrecordid>eNp10E1Lw0AQBuBFFKxV_AsBDwqSul_52GMpTRWKClY8LptktqYm2bqbWvvvXY30IHjaOTwzO_MidE7wiGBMbxwUIyrSAzQggokQE0oP9zXhx-jEuRXGMeEJH6BsvIS2C3PloAwaU0JdtcvA6KBR9VZZCMpdq5qqcEHVBq_QgTW-AczGBdB-VNa0je93p-hIq9rB2e87RM_ZdDG5DecPs7vJeB4WTLA0TDVLgeeCqoSXguOoVKUuQOQKa0FLwnkOQnPOWapzUTBNiCKUKY3zuCQK2BBd9XPX1rxvwHWyqVwBda1-dpL-qCiKOBXU04s_dGU2tvXbeRVTkrCEEq8ue1VY45wFLde2apTdSYLld57S5yl9nl5e93Jb1bD7j8mn6aTXYa8r18HnXiv7JmP_cyRf7mcyw1n8SMVCztgX75GFGA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1462173721</pqid></control><display><type>article</type><title>Agent-based modeling of malware dynamics in heterogeneous environments</title><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Bose, Abhijit ; Shin, Kang G.</creator><creatorcontrib>Bose, Abhijit ; Shin, Kang G.</creatorcontrib><description>ABSTRACTThe increasing convergence of power‐law networks such as social networking and peer‐to‐peer applications, web‐delivered applications, and mobile platforms makes today's users highly vulnerable to entirely new generations of malware that exploit vulnerabilities in web applications and mobile platforms for new infections, while using the power‐law connectivity for finding new victims. The traditional epidemic models based on assumptions of homogeneity, average‐degree distributions, and perfect‐mixing are inadequate to model this type of malware propagation. In this paper, we study four aspects crucial to modeling malware propagation: application‐level interactions among users of such networks, local network structure, user mobility, and network coordination of malware such as botnets. Since closed‐form solutions of malware propagation considering these aspects are difficult to obtain, we describe an open‐source, flexible agent‐based emulation framework that can be used by malware researchers for studying today's complex malware. The framework, called Agent‐Based Malware Modeling (AMM), allows different applications, network structure, network coordination, and user mobility in either a geographic or a logical domain to study various infection and propagation scenarios. In addition to traditional worms and viruses, the framework also allows modeling network coordination of malware such as botnets. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios. As representative examples, we examine two well‐known malware spreading mechanisms: (i) a malicious virus such as Cabir spreading among the subscribers of a cellular network using Bluetooth and (ii) a hybrid worm that exploit email and file‐sharing to infect users of a social network. In both cases, we identify the parameters most important to the spread of the epidemic based upon our extensive simulation results. Copyright © 2011 John Wiley &amp; Sons, Ltd. This paper presents a novel agent‐based framework for realistic modeling of malware propagation in heterogeneous networks, applications and platforms. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios for the given network. Two well‐known malware spreading mechanisms in traditional as well as mobile environments were studied using extensive simulations within the framework and the most important spreading parameters were identified.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.298</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>agent-based modeling ; Cellular communication ; hybrid propagation ; infection strategies ; malware models ; mobile viruses ; worms</subject><ispartof>Security and communication networks, 2013-12, Vol.6 (12), p.1576-1589</ispartof><rights>Copyright © 2011 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2013 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3938-8f38e4b92a74d9405dadfce9ba0f92d144be9f44438fb9c3f11a123af0b6d1ae3</citedby><cites>FETCH-LOGICAL-c3938-8f38e4b92a74d9405dadfce9ba0f92d144be9f44438fb9c3f11a123af0b6d1ae3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Bose, Abhijit</creatorcontrib><creatorcontrib>Shin, Kang G.</creatorcontrib><title>Agent-based modeling of malware dynamics in heterogeneous environments</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>ABSTRACTThe increasing convergence of power‐law networks such as social networking and peer‐to‐peer applications, web‐delivered applications, and mobile platforms makes today's users highly vulnerable to entirely new generations of malware that exploit vulnerabilities in web applications and mobile platforms for new infections, while using the power‐law connectivity for finding new victims. The traditional epidemic models based on assumptions of homogeneity, average‐degree distributions, and perfect‐mixing are inadequate to model this type of malware propagation. In this paper, we study four aspects crucial to modeling malware propagation: application‐level interactions among users of such networks, local network structure, user mobility, and network coordination of malware such as botnets. Since closed‐form solutions of malware propagation considering these aspects are difficult to obtain, we describe an open‐source, flexible agent‐based emulation framework that can be used by malware researchers for studying today's complex malware. The framework, called Agent‐Based Malware Modeling (AMM), allows different applications, network structure, network coordination, and user mobility in either a geographic or a logical domain to study various infection and propagation scenarios. In addition to traditional worms and viruses, the framework also allows modeling network coordination of malware such as botnets. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios. As representative examples, we examine two well‐known malware spreading mechanisms: (i) a malicious virus such as Cabir spreading among the subscribers of a cellular network using Bluetooth and (ii) a hybrid worm that exploit email and file‐sharing to infect users of a social network. In both cases, we identify the parameters most important to the spread of the epidemic based upon our extensive simulation results. Copyright © 2011 John Wiley &amp; Sons, Ltd. This paper presents a novel agent‐based framework for realistic modeling of malware propagation in heterogeneous networks, applications and platforms. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios for the given network. Two well‐known malware spreading mechanisms in traditional as well as mobile environments were studied using extensive simulations within the framework and the most important spreading parameters were identified.</description><subject>agent-based modeling</subject><subject>Cellular communication</subject><subject>hybrid propagation</subject><subject>infection strategies</subject><subject>malware models</subject><subject>mobile viruses</subject><subject>worms</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2013</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp10E1Lw0AQBuBFFKxV_AsBDwqSul_52GMpTRWKClY8LptktqYm2bqbWvvvXY30IHjaOTwzO_MidE7wiGBMbxwUIyrSAzQggokQE0oP9zXhx-jEuRXGMeEJH6BsvIS2C3PloAwaU0JdtcvA6KBR9VZZCMpdq5qqcEHVBq_QgTW-AczGBdB-VNa0je93p-hIq9rB2e87RM_ZdDG5DecPs7vJeB4WTLA0TDVLgeeCqoSXguOoVKUuQOQKa0FLwnkOQnPOWapzUTBNiCKUKY3zuCQK2BBd9XPX1rxvwHWyqVwBda1-dpL-qCiKOBXU04s_dGU2tvXbeRVTkrCEEq8ue1VY45wFLde2apTdSYLld57S5yl9nl5e93Jb1bD7j8mn6aTXYa8r18HnXiv7JmP_cyRf7mcyw1n8SMVCztgX75GFGA</recordid><startdate>201312</startdate><enddate>201312</enddate><creator>Bose, Abhijit</creator><creator>Shin, Kang G.</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201312</creationdate><title>Agent-based modeling of malware dynamics in heterogeneous environments</title><author>Bose, Abhijit ; Shin, Kang G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3938-8f38e4b92a74d9405dadfce9ba0f92d144be9f44438fb9c3f11a123af0b6d1ae3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2013</creationdate><topic>agent-based modeling</topic><topic>Cellular communication</topic><topic>hybrid propagation</topic><topic>infection strategies</topic><topic>malware models</topic><topic>mobile viruses</topic><topic>worms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bose, Abhijit</creatorcontrib><creatorcontrib>Shin, Kang G.</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bose, Abhijit</au><au>Shin, Kang G.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Agent-based modeling of malware dynamics in heterogeneous environments</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2013-12</date><risdate>2013</risdate><volume>6</volume><issue>12</issue><spage>1576</spage><epage>1589</epage><pages>1576-1589</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>ABSTRACTThe increasing convergence of power‐law networks such as social networking and peer‐to‐peer applications, web‐delivered applications, and mobile platforms makes today's users highly vulnerable to entirely new generations of malware that exploit vulnerabilities in web applications and mobile platforms for new infections, while using the power‐law connectivity for finding new victims. The traditional epidemic models based on assumptions of homogeneity, average‐degree distributions, and perfect‐mixing are inadequate to model this type of malware propagation. In this paper, we study four aspects crucial to modeling malware propagation: application‐level interactions among users of such networks, local network structure, user mobility, and network coordination of malware such as botnets. Since closed‐form solutions of malware propagation considering these aspects are difficult to obtain, we describe an open‐source, flexible agent‐based emulation framework that can be used by malware researchers for studying today's complex malware. The framework, called Agent‐Based Malware Modeling (AMM), allows different applications, network structure, network coordination, and user mobility in either a geographic or a logical domain to study various infection and propagation scenarios. In addition to traditional worms and viruses, the framework also allows modeling network coordination of malware such as botnets. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios. As representative examples, we examine two well‐known malware spreading mechanisms: (i) a malicious virus such as Cabir spreading among the subscribers of a cellular network using Bluetooth and (ii) a hybrid worm that exploit email and file‐sharing to infect users of a social network. In both cases, we identify the parameters most important to the spread of the epidemic based upon our extensive simulation results. Copyright © 2011 John Wiley &amp; Sons, Ltd. This paper presents a novel agent‐based framework for realistic modeling of malware propagation in heterogeneous networks, applications and platforms. The majority of the parameters used in the framework can be derived from real‐life network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios for the given network. Two well‐known malware spreading mechanisms in traditional as well as mobile environments were studied using extensive simulations within the framework and the most important spreading parameters were identified.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.298</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2013-12, Vol.6 (12), p.1576-1589
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1475554292
source EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects agent-based modeling
Cellular communication
hybrid propagation
infection strategies
malware models
mobile viruses
worms
title Agent-based modeling of malware dynamics in heterogeneous environments
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T01%3A42%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Agent-based%20modeling%20of%20malware%20dynamics%20in%20heterogeneous%20environments&rft.jtitle=Security%20and%20communication%20networks&rft.au=Bose,%20Abhijit&rft.date=2013-12&rft.volume=6&rft.issue=12&rft.spage=1576&rft.epage=1589&rft.pages=1576-1589&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.298&rft_dat=%3Cproquest_cross%3E3139740151%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1462173721&rft_id=info:pmid/&rfr_iscdi=true