RUS  ENG
Full version
JOURNALS // Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics // Archive

Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018 Number 4, Pages 73–79 (Mi vagtu557)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Network models of malwear proliferation processes

G. A. Popov, E. A. Popova, M. G. Popova

Astrakhan State Technical University

Abstract: The paper deals with the analysis of possible ways of spreading malware on the basis of weighted graphs, where the graph describes the relationship between different programs, and the weight shows the probability of transition malware from one software system to another. The task is to identify the most likely routes of malicious programs distribution and to find the most likely ways of their penetration into a given software product. The method of dynamic programming is proposed to solve the problem. The procedure of solving the problem has been demonstrated on a particular example. The results of calculations helped to determine the most probable route of penetration and to estimate the probability of successful attack of malicious programs on the required software product. Graph theory methods also allowed to estimate a number of other numerical characteristics related to the process of the malicious programs distribution, which include the minimum number of clock cycles of the system (after the implementation of this characteristic it becomes possible for a malicious program to penetrate the specified software product); the number of clock cycles of the system (when probability of penetration of the malware into a specific file will be greater than the specified value). Besides, the method helps identify cyclical routes of malware distribution, which characterizes repeated attempts of malware to impact on the software product, find the most likely sources of distribution, detect the files, through which penetration into given software product is possible.

Keywords: malicious program, software product, graphs, penetration route, dynamic programming method.

UDC: 529.6

Received: 24.09.2018

DOI: 10.24143/2072-9502-2018-4-73-79



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024