Dynamics of Malicious Software in the Internet

15
Dynamics of Malicious Software in the Internet Tatehiro Kaiwa, University of Aizu. E-mail:[email protected] 1

description

Tatehiro Kaiwa, University of Aizu. E-mail:[email protected]. Dynamics of Malicious Software in the Internet. 1. Outline. Random Network and Scale-free Network Observed Arrivals of E-mail Simulation Model of Worm Spread Dynamics Local Network Structure Inference - PowerPoint PPT Presentation

Transcript of Dynamics of Malicious Software in the Internet

Page 1: Dynamics of Malicious Software in the Internet

Dynamics of Malicious Software

in the InternetTatehiro Kaiwa,

University of Aizu.

E-mail:[email protected]

1

Page 2: Dynamics of Malicious Software in the Internet

Outline●Random Network and Scale-free Network

●Observed Arrivals of E-mail

●Simulation Model of Worm Spread Dynamics

●Local Network Structure Inference

●Mathematical Model of Outbreak

●Hub Defense Strategy

●Conclusion

2

Page 3: Dynamics of Malicious Software in the Internet

Two Model of Network● Model of Network

– Random Network Degree Distribution: bell curve– Scale-free Network Degree Distribution: power-law

3

Page 4: Dynamics of Malicious Software in the Internet

Scale-free and Preferential Attachment

Scale-free Network is a network with power-law degree distribution.

4

Page 5: Dynamics of Malicious Software in the Internet

Structure of E-mail Network

Degree Distribution of an e-mail network.Reference:Holger Ebel, Lutz-Ingo Mielsch, and Stefan Bornholdt,“Scale-free topology of e-mail networks”,Physical Review E 66, 2002

*k: The number of links.

5

Page 6: Dynamics of Malicious Software in the Internet

Spoofed From-field

● The From-filed of an e-mail message a worm sends is varies and/or is spoofed.

● It is almost impossible to identify where a worm sends the e-mail and how many worms send observed e-mails.

● It is only arrival intervals that we can obtain a correct data from received e-mails.

6

Page 7: Dynamics of Malicious Software in the Internet

Observed Arrivals of E-mail

● There are log data* of the time on which each e-mail messages with a worm attached arrived at University of Aizu. * http://web-int/labs/istc/ipc/Security/virus/index.html

7

Page 8: Dynamics of Malicious Software in the Internet

Simulation Model of Worm Spread Dynamics

8

Page 9: Dynamics of Malicious Software in the Internet

Comparison between Simulation and Observed Data

9

Page 10: Dynamics of Malicious Software in the Internet

Arrival Intervals of Simulationi) ii)

iii) i) mk:115.619 ii) mk:92.15

iii) mk:61.95

*mk : Mean of Number of links neighbors have.

10

Page 11: Dynamics of Malicious Software in the Internet

Mathematical Model of Outbreak

][2

][1][

eME

MESE

11

Page 12: Dynamics of Malicious Software in the Internet

Hub Defense Strategy (1)

*h = Number of immune hub nodes

Difference of Number of immune hub nodes.

12

Page 13: Dynamics of Malicious Software in the Internet

Hub Defense Strategy (2)

r = Number of immune nodes selected randomly. h= Number of immune hub nodes.

Comparison Between Hub Defense and Random Defense

13

Page 14: Dynamics of Malicious Software in the Internet

Conclusion● Observing arrival intervals, we can estimate damage

of a worm and estimate a network structure around observer.

● We can confirm that hub defense strategy is an effective method in this network even though the number of immune hub nodes are not much enough.

14

Page 15: Dynamics of Malicious Software in the Internet

Thank you

15