IJMTES – MODELING AND RESTRAINING MOBILE VIRUS PROPAGATION

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : MODELING AND RESTRAINING MOBILE VIRUS PROPAGATION

Author’s Name : Sasikala R | Elavarasi K  unnamed

Volume 03 Issue 07 2016

ISSN no:  2348-3121

Page no: 178-179

Abstract – Malware is persistent in networks, and poses a serious threat to network security. In order to fight against cyber attackers, it is important for defenders to understand malware behavior. In the existing system, malware is detected only in host level. This project examines the propagation of malware and proposes a two layer malware propagation model that is two time scanning to detect the spread of malware: the upper layer detects malware in network level, for example, domains of the Internet; the lower layer detects malware in hosts of a given network. The major advantage of the proposed system is that the IP address of the sender who is sending virus file will be blocked by the server. The virus file is deleted in the server itself and it cannot be sent to the intended receiver. The receiver can get the attacker details from the server. This two layer model improves the exactness compared with the available single layer epidemic model in malware modelling. Moreover, the proposed two layer model offers us the dissemination of malware in terms of the low layer network.    

Keywords— Malware; Mobile Virus ; Networks  

Reference

  1. B. Aditya Prakash, Hanghang Tong, “Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms”, 2013.
  2. Yajin Zhou, “Dissecting Android Malware: Characterization and Evolution”, 2014.
  3. Sancheng Peng, Shui Yu, and Aimin Yang, “Smartphone Malware and Its Propagation Modeling: A Survey”, 2014.
Scroll Up