Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2018, Number 4, Pages 73–79
DOI: https://doi.org/10.24143/2072-9502-2018-4-73-79
(Mi vagtu557)
 

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Network models of malwear proliferation processes

G. A. Popov, E. A. Popova, M. G. Popova

Astrakhan State Technical University
References:
Abstract: The paper deals with the analysis of possible ways of spreading malware on the basis of weighted graphs, where the graph describes the relationship between different programs, and the weight shows the probability of transition malware from one software system to another. The task is to identify the most likely routes of malicious programs distribution and to find the most likely ways of their penetration into a given software product. The method of dynamic programming is proposed to solve the problem. The procedure of solving the problem has been demonstrated on a particular example. The results of calculations helped to determine the most probable route of penetration and to estimate the probability of successful attack of malicious programs on the required software product. Graph theory methods also allowed to estimate a number of other numerical characteristics related to the process of the malicious programs distribution, which include the minimum number of clock cycles of the system (after the implementation of this characteristic it becomes possible for a malicious program to penetrate the specified software product); the number of clock cycles of the system (when probability of penetration of the malware into a specific file will be greater than the specified value). Besides, the method helps identify cyclical routes of malware distribution, which characterizes repeated attempts of malware to impact on the software product, find the most likely sources of distribution, detect the files, through which penetration into given software product is possible.
Keywords: malicious program, software product, graphs, penetration route, dynamic programming method.
Received: 24.09.2018
Bibliographic databases:
Document Type: Article
UDC: 529.6
Language: Russian
Citation: G. A. Popov, E. A. Popova, M. G. Popova, “Network models of malwear proliferation processes”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 4, 73–79
Citation in format AMSBIB
\Bibitem{PopPopPop18}
\by G.~A.~Popov, E.~A.~Popova, M.~G.~Popova
\paper Network models of malwear proliferation processes
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2018
\issue 4
\pages 73--79
\mathnet{http://mi.mathnet.ru/vagtu557}
\crossref{https://doi.org/10.24143/2072-9502-2018-4-73-79}
\elib{https://elibrary.ru/item.asp?id=36164444}
Linking options:
  • https://www.mathnet.ru/eng/vagtu557
  • https://www.mathnet.ru/eng/vagtu/y2018/i4/p73
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024