loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Kazumasa Omote 1 ; Takeshi Shimoyama 2 and Satoru Torii 2

Affiliations: 1 University of Tsukuba, Japan ; 2 Fujitsu Laboratories, Ltd., Japan

Keyword(s): Malware countermeasure, enterprise network, threshold, computer simulation.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention

Abstract: One of the worst threats present in an enterprise network is the propagation of “scanning malware” (e.g., scanning worms and bots). It is important to prevent such scanning malware from spreading within an enterprise network. It is especially important to suppress scanning malware infection to less than a few infected hosts. We estimated the timing of containment software to block “scanning malware” in a homogeneous enterprise network. The “combinatorics proliferation model”, based on discrete mathematics, developed in this study derives a threshold that gives the number of the packets sent by a victim that must not be exceeded in order to suppress the number of infected hosts to less than a few. This model can appropriately express the early state under which an infection started. The result from our model fits very well to the result of computer simulation using a typical existing scanning malware and an actual network.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.220.97.161

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Omote, K.; Shimoyama, T. and Torii, S. (2007). A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING MALWARE. In Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT; ISBN 978-989-8111-12-8; ISSN 2184-3236, SciTePress, pages 16-24. DOI: 10.5220/0002119300160024

@conference{secrypt07,
author={Kazumasa Omote. and Takeshi Shimoyama. and Satoru Torii.},
title={A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING MALWARE},
booktitle={Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT},
year={2007},
pages={16-24},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002119300160024},
isbn={978-989-8111-12-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the Second International Conference on Security and Cryptography (ICETE 2007) - SECRYPT
TI - A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING MALWARE
SN - 978-989-8111-12-8
IS - 2184-3236
AU - Omote, K.
AU - Shimoyama, T.
AU - Torii, S.
PY - 2007
SP - 16
EP - 24
DO - 10.5220/0002119300160024
PB - SciTePress