Detection and Prevention of Botnets and Malware in Large Scale Network Topology

Authors(3) :-P H V Sai Kumari, Dr. K V V S Narayana Murthy, Dr. D Mohan Reddy

Malware is unavoidable in systems, and speaks to an essential risk to organize security. In any case, we have outstandingly obliged understanding of malware lead in systems to date. In this paper, we investigate how malware spreads in systems from an overall perspective. We figure the issue, and set up a careful two layer torment display for malware multiplication from framework to sort out. Considering the proposed display, our examination demonstrates that the movement of a given malware takes after the exponential transport, control law scattering with the short exponential tail, and power laws flow at its underlying, late what's all the more, last stages, independently. Expansive tests have been performed through two certifiable overall scale malware data sets, and the results attest our hypothetical revelations.

Authors and Affiliations

P H V Sai Kumari
PG Scholar, Department of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Dr. K V V S Narayana Murthy
Professor, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Dr. D Mohan Reddy
Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

Keywords: Malware, Propagation, Modeling, Power Law.

  1. Brador, http://www.f-secure.com/v-descs/brador.shtml.
  2. S. Peng, S. Yu, and A. Yang, "Smartphone malware and its propagation modeling: A survey," IEEE Communications Surveys and Tutorials, in press, 2014.
  3. Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530- 541, 2009.
  4. A. M. Jeffrey, xiaohua Xia, and I. K. Craig, "When to initiate hiv therapy: A control theoretic approach," IEEE Transactions on Biomedical Engineering, vol. 50, no. 11, pp. 1213-1220, 2003. 5Shui Yu, Senior Member, IEEE, GuofeiGu, Member, IEEE, Ahmed Barnawi, Member, IEEE, Song Guo, Senior Member, IEEE, and Ivan Stojmenovic, Fellow, IEEE, "Malware Propagation in Large-Scale Networks", IEEE 2015.
  5. B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in CCS ’09: Proceedings of the 2009 ACM conference on computer communication security, 2009.
  6. D. Dagon, C. Zou, andW. Lee, "Modeling botnet propagation using time zones," in Proceedings of the 13 th Network and Distributed System Security Symposium NDSS, 2006.
  7. M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
  8. D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones," in NDSS, 2006.
  9. P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1-14, 2009.
  10. Cabir,http://www.f-secure.com/en/web/labsglobal/2004- threat-summary.
  11. S. H. Sellke, N.B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 71-86, Apr.-Jun. 2008.
  12. P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413- 425, Mar. 2009.
  13. S. Shin, G. Gu, N. Reddy and C. P. Lee, "A Large-Scale Empirical Study of Conficker," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 676-690, April 2012.
  14. Cloud Based Protection For Multimedia Content, IJIT-V2I5P6]: Deepak N S V, Md.ShareefBasha, Karamala Suresh.

Publication Details

Published in : Volume 4 | Issue 2 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 383-388
Manuscript Number : IJSRST1841114
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

P H V Sai Kumari, Dr. K V V S Narayana Murthy, Dr. D Mohan Reddy, " Detection and Prevention of Botnets and Malware in Large Scale Network Topology", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 2, pp.383-388, January-February-2018.
Journal URL : https://ijsrst.com/IJSRST1841114
Citation Detection and Elimination     |      | |
  • Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530- 541, 2009.
  • A. M. Jeffrey, xiaohua Xia, and I. K. Craig, "When to initiate hiv therapy: A control theoretic approach," IEEE Transactions on Biomedical Engineering, vol. 50, no. 11, pp. 1213-1220, 2003. 5Shui Yu, Senior Member, IEEE, GuofeiGu, Member, IEEE, Ahmed Barnawi, Member, IEEE, Song Guo, Senior Member, IEEE, and Ivan Stojmenovic, Fellow, IEEE, "Malware Propagation in Large-Scale Networks", IEEE 2015.
  • B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in CCS ’09: Proceedings of the 2009 ACM conference on computer communication security, 2009.
  • D. Dagon, C. Zou, andW. Lee, "Modeling botnet propagation using time zones," in Proceedings of the 13 th Network and Distributed System Security Symposium NDSS, 2006.
  • M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
  • D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones," in NDSS, 2006.
  • P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1-14, 2009.
  • Cabir,http://www.f-secure.com/en/web/labsglobal/2004- threat-summary.
  • S. H. Sellke, N.B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 71-86, Apr.-Jun. 2008.
  • P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413- 425, Mar. 2009.
  • S. Shin, G. Gu, N. Reddy and C. P. Lee, "A Large-Scale Empirical Study of Conficker," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 676-690, April 2012.
  • Cloud Based Protection For Multimedia Content, IJIT-V2I5P6]: Deepak N S V, Md.ShareefBasha, Karamala Suresh.
  • " target="_blank"> BibTeX
    |
  • Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530- 541, 2009.
  • A. M. Jeffrey, xiaohua Xia, and I. K. Craig, "When to initiate hiv therapy: A control theoretic approach," IEEE Transactions on Biomedical Engineering, vol. 50, no. 11, pp. 1213-1220, 2003. 5Shui Yu, Senior Member, IEEE, GuofeiGu, Member, IEEE, Ahmed Barnawi, Member, IEEE, Song Guo, Senior Member, IEEE, and Ivan Stojmenovic, Fellow, IEEE, "Malware Propagation in Large-Scale Networks", IEEE 2015.
  • B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in CCS ’09: Proceedings of the 2009 ACM conference on computer communication security, 2009.
  • D. Dagon, C. Zou, andW. Lee, "Modeling botnet propagation using time zones," in Proceedings of the 13 th Network and Distributed System Security Symposium NDSS, 2006.
  • M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
  • D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones," in NDSS, 2006.
  • P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1-14, 2009.
  • Cabir,http://www.f-secure.com/en/web/labsglobal/2004- threat-summary.
  • S. H. Sellke, N.B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 71-86, Apr.-Jun. 2008.
  • P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413- 425, Mar. 2009.
  • S. Shin, G. Gu, N. Reddy and C. P. Lee, "A Large-Scale Empirical Study of Conficker," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 676-690, April 2012.
  • Cloud Based Protection For Multimedia Content, IJIT-V2I5P6]: Deepak N S V, Md.ShareefBasha, Karamala Suresh.
  • " target="_blank">RIS
    |
  • Z. Chen and C. Ji, "An information-theoretic view of network-aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530- 541, 2009.
  • A. M. Jeffrey, xiaohua Xia, and I. K. Craig, "When to initiate hiv therapy: A control theoretic approach," IEEE Transactions on Biomedical Engineering, vol. 50, no. 11, pp. 1213-1220, 2003. 5Shui Yu, Senior Member, IEEE, GuofeiGu, Member, IEEE, Ahmed Barnawi, Member, IEEE, Song Guo, Senior Member, IEEE, and Ivan Stojmenovic, Fellow, IEEE, "Malware Propagation in Large-Scale Networks", IEEE 2015.
  • B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in CCS ’09: Proceedings of the 2009 ACM conference on computer communication security, 2009.
  • D. Dagon, C. Zou, andW. Lee, "Modeling botnet propagation using time zones," in Proceedings of the 13 th Network and Distributed System Security Symposium NDSS, 2006.
  • M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
  • D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones," in NDSS, 2006.
  • P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1-14, 2009.
  • Cabir,http://www.f-secure.com/en/web/labsglobal/2004- threat-summary.
  • S. H. Sellke, N.B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 71-86, Apr.-Jun. 2008.
  • P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413- 425, Mar. 2009.
  • S. Shin, G. Gu, N. Reddy and C. P. Lee, "A Large-Scale Empirical Study of Conficker," in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 676-690, April 2012.
  • Cloud Based Protection For Multimedia Content, IJIT-V2I5P6]: Deepak N S V, Md.ShareefBasha, Karamala Suresh.
  • " target="_blank">CSV

    Article Preview