Vol.12, No.3, August 2023.                                                                                                                                                                               ISSN: 2217-8309

                                                                                                                                                                                                                        eISSN: 2217-8333

 

TEM Journal

 

TECHNOLOGY, EDUCATION, MANAGEMENT, INFORMATICS

Association for Information Communication Technology Education and Science


Model for the Propagation of Malicious Objects in a Computer Network with Variable Infection Intensity

 

Antoaneta Popova

 

© 2023 Antoaneta Popova, published by UIKTEN. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. (CC BY-NC-ND 4.0)

 

Citation Information: TEM Journal. Volume 12, Issue 3, Pages 1275-1280, ISSN 2217-8309, DOI: 10.18421/TEM123-06, August 2023.

 

Received: 23 March 2023.

Revised:   12 June 2023.
Accepted: 19 July 2023.
Published: 28 August 2023.

 

Abstract:

 

There are a significant number of scientific publications that use epidemic models to propagate malicious objects in a computer network. These models are based on Markovian models with a constant intensity of transitions, which does not correspond to real conditions, since the intensity of transitions changes due to the fact that after some time antivirus systems start to recognize malware. This paper proposes an original approach based on an epidemic model with variable infection intensity of hosts in a computer network. In the beginning, when the threat is not recognized, the malware spreads rapidly. After a certain period of time, the antivirus system recognizes the malicious code, which leads to a decrease in the infection intensity. Simulations have been done for different infection intensity and threat recognition. Demonstrated models account for the infection time of hosts in the computer network, latency phase, malware detection, and clearance from the system.

 

Keywords –Antivirus agent, epidemic model, malicious objects, Markov model, threats.

 

-----------------------------------------------------------------------------------------------------------

Full text PDF >  

-----------------------------------------------------------------------------------------------------------

 


Copyright © 2023 UIKTEN
Copyright licence: All articles are licenced via Creative Commons CC BY-NC-ND 4.0 licence