Research Article Worms Propagation Modeling and Analysis in Big Data Environment

Size: px
Start display at page:

Download "Research Article Worms Propagation Modeling and Analysis in Big Data Environment"

Transcription

1 Distributed Sensor Networks Volume 2015, Article ID , 8 pages Research Article Worms Propagation Modeling and Analysis in Big Data Environment Song He, 1 Can Zhang, 2,3 Wei Guo, 3 and Li-Dong Zhai 3 1 School of Management and Economics, Beijing Institute of Technology, Beijing , China 2 North China Electric Power University, Baoding , China 3 Institute of Information Engineering, Chinese Academy of Sciences, Beijing , China Correspondence should be addressed to Li-Dong Zhai; zhailidong@iieaccn Received 5 August 2014; Accepted 16 November 2014 Academic Editor: Qingquan Zhang Copyright 2015 Song He et al This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited The integration of the Internet and Mobile networks results in huge amount of data, as well as security threat With the fragile capacity of security protection, worms can propagate in the integration network and undermine the stability and integrity of data ThepropagationofwormisagreatsecurityrisktomassiveamountsofdataintheintegrationnetworkWeproposeakindofworm propagating in big data environment named BD-Worm BD-Worm consumes computing resources and gets privacy information of users, which causes huge losses to our working and living This paper constructs an integration network topology model and designs the BD-Worm propagating in the big data environment To analyze the propagation of BD-Worm, we conduct a simulation and provide some recommendations to contain the widespread of BD-Worm according to the simulation results 1 Introduction The popularity of mobile intelligent terminal brings great convenience to people s lives Mobile shopping, mobile banking, mobile social network, mobile maps, and other applications provide users with a variety of services However, the convenience also brings up a security risk Mobile phones store a lot of privacy information including contacts, SMS, bank accounts, social network accounts, and geographic information Network attackers steal the user s private information to make correlation analysis and engage in illegal activities, which violates user s privacy The integration of the Internet and Mobile networks has brought great convenience for us The increasing number of mobile devices causes explosive growth of the amount of data in integration network While the high-speed development of the integration network brings people into the era of big data, it also brings some data security problems, such as theft and leakage of privacy data and sensitive data [1] As a kind of malicious program that can infect large amount of hosts in short time, worm is exploited by network attacker We name the worms destroying data security in integration network as BD-Worm, which takes advantage of the weak security protection ability, propagates in a large area in the network, and destroys the stability and security of data Here, BD-Worm constitutes one of the major network data security problems because of the integration of the Internet and Mobile network In order to ensure the massive data are much safer, we should analyze the propagation mechanism of BD-Worm firstly and then provide effective protection strategies against its propagation characteristics This paper constructs an integrated network topology and simulates the propagation of BD-Worm The worm propagates by files attached with malicious code Considering the differences between computerandmobileintelligentterminaloperatingsystem, worm propagation in different operation system needs cross different protocol The paper chooses files supported by a variety of operating systems as virus vector The formats of suchfilesincludetxtandmp3onceuseropensthefile attached with worm code, the worm will be activated, will copy itself, and will attach other files with BD-Worm

2 2 Distributed Sensor Networks The remaining sections of the paper are organized as follows Section 2 introduces related work Modeling of BD-Worm will be presented in Section 3 InSection 4, we simulate the BD-Worm in integration network and study the BD-Worm spreading in the different network topology and defense Finally, Section5 concludes this paper 2 Related Work In this section, we first introduce the effect of integration network on data Then, we introduce the security risk of big data and several related improvements At last, we explore the work related to worm theory and new generation worm in different scenarios Here, the integration of the Internet and Mobile network is the integration of fixed node and Mobile network, which has greatly expanded the network s flexibility [2] The popularity of smart phones and tablets spawned a large number of network applications, such as social network, online shopping, and games It is much more convenient for people s lives by using those applications The integrated network produces a variety of data formats In addition, much data such as communications and online transaction need real-time analysis and process It presents a great challenge to integrated network s data processing capability [3] More and more privacy leak events raise people s awareness about importance of personal information With the integration of Mobile network and Internet, the storage, management, and use of huge amount of data are faced with serious security challenges The protection of mobile phone and Internet users privacy information has become a major research question in integration network Considering the security risks of distributed data storage in big data environment, Zhao [4] takes data access patterns and query into consideration and designed a distributed platform, to ensure the integrity and security of data Data encryption and privacy protection technologies and management modes cannot meet the requirements in capacity, performance, storage, and security of big data Data security and privacy protection of users are faced with huge impact and challenges Wang [5] provides a kind of big data encryption algorithm based on data deduplication technology The studies have shown that the security of the algorithm is reliable and the algorithm improves the speed of large data encryption processing effectively The research on worms over the past few years has focused on future worms and those future worms may propagate in specific complex environment or be designed with new function For example, Su [6] designs a new kind of network worm that propagates in IPv6 and IPv4-IPv6 transition environment, and the new worm is named NHIW, New Hybrid Internet Worm Based on the analysis of network worm scanning strategy, Xu et al [7] design a new kind of network worm-dnsworm-v6, which can propagate rapidly in IPv6 network by scanning the whole network applying two layers different scanning strategy Wang [8] analysesthe propagation characteristics of worms propagate in Internet of Vehicles and proposes a kind of benign worm defensing maliciouswormininternetofvehicles The study of worms mainly focuses on function structure, scan strategy, and propagation models [9] Function structure of the worm consists of two parts: the main function structure and the auxiliary function structure The main function structure controls the basic characteristics of worms, and the auxiliary function is designed for enhancing the properties of worms Worms scan the whole network to find next attack target There are many kinds of scan strategies and different strategy will achieve different effects [10] The research of worms propagation model is based on the spread of epidemic in biology [11] The classic worm propagation models include SIR/SIS model [12], two-factor model [13], and WOW model [14] Allofthesestudiesasmentionedabovefocusonthetraditional worm; however, our paper focuses on constructing apropagationmodelofbd-wormthesecurityofbigdata has attracted the attention of mobile phone and computer users Once the BD-Worm is released into the integrated network by attacker, it will steal huge privacy data Attacker can control the whole data in infected host through the backdoor reserved by worms 3 Modeling of BD-Worm In this section, we provide the big data structure of integrated network and model the BD-Worm The integration of Internet and Mobile network makes many data services shared in the mobile terminals and computers Users can access the Internet anytime and anywhere Mobileoffice,remoteoffice,andreal-timeofficearethemarks of big data era The data in Internet and Mobile network are collected into the cloud platform for further storage and management The structure of big data environment is showed in Figure 1 The model of BD-Worm can be modeled in five aspects: the infecting process of BD-Worm, the connection probability among each node, the defense capability of mobile nodes and fixed nodes, the opening probability of each suspicious fileafterbeingreceived,and,thelastpart,computingresource controlling 31 Infection Process of BD-Worm The integrated network produced variety of data formats, such as gif, doc, mp3, and rmvb [15] BD-Worm propagates in integrated network by embedding in the document BD-Worm spreading in a large scale occupies amounts of data storage space For the reason that BD-Worm runs on various operating systems, the malicious software programs attached by the document must contain most of the major operating systems both for computer and smart phone, such as windows, Mac, and Android TheprocessofworminfectionisshowninFigure 2 As the figure shows, when user received a file attached worm, the file should be scanned by antivirus software to detect whether there are any abnormalities or not If the file is abnormal, it will be deleted If the file is opened by user, it will copy itself and infect other files, which will consume large amount of computing resources That means the abnormal computing

3 Distributed Sensor Networks 3 Data center Cloud platform Remote office ISDN WAN Services Internet ISDN WiFi 3G WiFi Remote office Airport Figure 1: The big data environment structure Coffee shop Home Receive a file Antivirus software Abnormal No Open the file Memory consuming abnormal No Normal file Yes Delete the file Yes Delete the process 32 Connection Probability of Nodes In big data environment,thetopologyoftheintegratednetworkplaysacritical role in determining the propagation speed of BD-Worm In this paper, the topology of the integrated network is determined by connection probability of nodes All notations used in our paper are shown in Abbreviations Section To analyse the topology of integrated network, G = (V, E) stands for the network There are N nodes and m edges in the network V = {V 1, V 2,,V N } is the set of nodes, while E={e 1,e 2,,e M } is the set of edges The nodes in the integrated network are classified into two categories: fixed nodes and mobile nodes Let VM denote the mobile nodes and VF denote the fixed nodes: V={V 1, V 2,,V N }, VM = {Vm 1, Vm 2,,Vm m }, VF = {Vf 1, Vf 2,,Vf n }, (1) Figure 2: The process of worm infecting resource consuming will cause user s awareness The user will adjudge the memory consuming If he or she finds that the computed resource controlling is abnormal, the progress of the worm will be killed directly Otherwise, we consider that the file is benign If the file is a normal one, it will continue receiving the file The BD-Worm which runs with infected file will begin to control the computing resources Finally, it continues to receive the file This process will be repeated in the whole network unless all BD-Worms are removed m+n=n, where Vm i, i [1,m],standsforamobilenode,Vf j, j [1,n], stands for a fixed node, and the total number of mobile nodes and fixed nodes is N In the integration network, we define P F =m/nas the proportion of the fixed nodes in the network On the other hand, we define P M astheproportionofmobilenodesinthe network: P M =1 P F (2) When P F =1, the integrated network is the Internet in fact As P F decreases, there will be more mobile devices added in the integrated network while less computers are added as

4 4 Distributed Sensor Networks well When P F =0, the integrated network changes to be a Mobile network Therefore, in order to generate the integrated network, we need to analyze the degree distribution P(k) of the Internet and Mobile network, respectively, and integrate them to be the integrated network In the Internet, recently Faloutsos et al [16] showed empirically that certain properties of the AS-level Internet topology are well-described power laws The most interesting of these regards the degree of a node If we let P(k) be the fraction of nodes with degree k, then it is demonstrated that P(k) k α The exponent α is obtained by performing a linear regression on P(k) whenplottedon2002as-leveltopology; here α = 218 To keep it simple, the Internet in this paper is defined as a scale-free network with the degree distribution P(k) k 2 [17] Inthemobilenetwork,Lambiotteetal[18] analyzed statistical properties of a Mobile network constructed from the records of a mobile phone company The network consists of 25 million customers that have placed 810 million communications (phone calls and text messages) over a period of 6 months It is shown that the degree distribution in themobilenetworkhasapower-lawdegreedistribution P(k) k 5 In this paper, although worm spreads in Mobile network only through SMS, MMS, and GPRS, which do not contain phone calls, this spreading still mainly follows the relationship between the mobile users Therefore, the Mobile network is also defined as a scale-free network with powerlaw exponent α= 5 According to the above analysis, the power-law exponent of the integrated network degree distribution can be written as 5 α 2,andα changed with proportion of the fixed node (mobile node) in integration network P F (P M ) We denote that α= 2 3ρis the power-law exponent of integrated network Recently, a power-law topology generator is the best candidate to generate the integrated network, although the degree of a real integrated network may not be strictly power-law distributed when the integrated Internet and Mobile network are the heterogeneous network In this paper, we use the generalized linear preference (GLP) power-law generator [19] There are two important reasons Firstly, it presents a generalized linear preference model that, coupled with the incremental algorithm of [20], generates topologies that more closely model the Internet Secondly, we choose the GLP power-law network generator instead of other generators because it also has an adjustable power-law exponent η The following is the formula of η: 2m β(1 p) (1 + p) m =η, (3) where m isthenumberofinitialedgesofanewnode,p [0, 1] is the probability that adds m new links, and β (, 1) is a tunable parameter that indicates the preference for a new node (edge) connecting to more popular nodes The bigger the value of β is, the more preference is given to high degree nodes There are no self-loops and merge duplicate edges in the GLP Then [19] demonstrated that η= α+1approximately According to the α, η can be derived as η= 1 3ρ In the GLP generator, m and p always change little in different network and are less effective in ηthenwe assume that m and p have a constant value observed from empirical data and only adjust β to match η In the integrated network, infected nodes will transfer files with other connected nodes Among the large number of connected nodes, which node the infected node would like to choose is a significant problem Then, we will calculate the node connecting probability If there is an edge between node i and node j, wenote that b ij =1;otherwiseb ij =0Thus,thewholenetworkcan be defined as correlation matrix A: b 11 b 12 b 1n b 21 b 22 b 2n A=( ) (4) b n1 b n2 b nn According to the matrix, we can find that the nodes directly connected with node i canbedefinedasa i = (b i1 b i2 b in ) k i is the degree of node i, anditcanbe derived from k i = n j=1 b ij K is all the degrees of the network: k K=( 0 d 0 ) (5) 0 0 k n The total degree of all nodes connected to node i is k D si =a i K=(b i1 b i2 b in ) ( 0 d 0 ) (6) 0 0 k n We consider a node only transferring files to the other node that is connected It sounds more reasonable than transferring files to all the nodes no matter whether it is connected or not cp is the connected probability Therefore, the probability of node i being connected to node j is as follows: cp = k i D si = n j=1 b ij (b i1 b i2 b in ) ( k d k n ) 33 Opening Probability One of the most significant studies of modeling the worm propagation model is qualifying the user awareness The user security consciousness determines whether the worm can be activated successfully User awareness is too complex to be modeled well, for the reason that it may be affected by everything around the user Based on the BD-Worm malicious acts to the system and the common characters of the computer and smartphone, we can study the computing resource consuming acting on the user awareness Because worm copies itself and infects other files, it will cause CPU hogs and rewrite hard-disk driver frequently and that will reduce the system operability sharply (7)

5 Distributed Sensor Networks 5 In particular, when the computing resource consuming is at a very high level, the obvious abnormal lag of opening files or software will easily draw the user s attention and replace his normal work (such as opening received files from ) with checking his system When the amount of computing resource consumption increases at a high level, we can notice the abnormity Also, we can conclude that the opening probability equals 100 percent with no computing resource consuming and zero percent with full use of computing resource consumption Therefore, we should simulate the opening probability with an equation like circle x 2 +y 2 = 1, x > 0, y > 0 While the circle equation with radio equals one did not work well in simulating user awareness, to keep simple, let opp n (t) be the opening probability of node n at time t Consider opp n (t) = 1 crc n (t), wherecrc n (t) is computing resource consuming and crc n (t) [0, 1) OPP(t) is the opening probability of wholenetwork,forcalculatinginthewormpropagation model OPP i,t (t) = OPP 1 (t) is the opening probability of node 1: OPP (t) =( opp 1 (t) opp n (t) d opp 1 (t) opp n (t) ) (8) 34 Computing Resource Controlling In big data environment, when a host is infected by worm, it will consume many computing resources The high computing resource consuming will result in users security consciousness and will kill the worms The computing resource controlling is a complex factor that affects the worm propagation speed There are two reasons One is the higher computing resource consuming intending to increase user awareness which will reduce the opening probability The other is the higher computing resource consuming and longer infected time which will increase abnormal files among the transferring files which will increase the propagation speed Let diagonal matrix CRC(t) be the abnormal files probability of the whole network CRC i,i (t) [0, 1] is the sum of crc t (t) from time one to time t divide a constant CWhen t i=1 crc 1(i) equals C,we think that all of the certain files have already been infected Then, we can draw the conclusion that computing resource consuming affecting worm propagation speed in reason one is opposite to reason two In practice, forever propagation might not be possible because the worm will ultimately be detected by host-/software-based detection methods and the vulnerability exploited by the worm will be fixed through software updates within a certain amount of time [21] Hence, how to get a high propagation speed is a necessary and significant work in this paper: t i=1 crc 1 (i) 0 0 C CRC (t) =( 0 d t i=1 crc n (i) C ) (9) To control the worms resource consuming, we provide a greedy method In the greedy method, the BD-Worm is always greedy on the computing resource consuming since it infects a node successfully In the greedy method, the BD- Worm will firstly infect a target node with a low computing resource consuming to avoid abnormality After the BD- Worm infects the node, it will increase the consuming in order to copy itself and infect other nodes It is a serious problem when and how much should the BD-Worm increase theconsumingitishardtomakeastandardthatfitsforall nodes, for the reason that user awareness is different with anybody and unfit increasing lead the progress to be killed by user One standard only fits for one node Therefore, we make a rule that will test the user awareness to solve the problem As we know, an infected node still receives abnormal files frequently when the worm outbreaks The rule is to control the new progress consuming created by the new abnormal files which is equal to the consuming which the BD-Worm will increase If the increasing draws user attention, only the new progress will be killed Otherwise, the increase of consuming can be trusted Let crc n (t) = μ+cou n (t) φ where μ is the initial computing resource consuming, cou n (t) is the time of an infected opening the abnormal files, and φ is the increasing computing resource consuming It is a linear equation and ranges from zero to one 35 Defense Capability of Nodes Because of difference of defense capability of mobile nodes and fixed nodes, the probability of worm nodes being detected is different In this paper, we define defense capability of nodes as the probability of worm nodes being detected Defense strategy can be generally classified into two categories: active defense strategy and passive defense strategy Active defense refers to those strategies aiming at enhancing the defense capability of the system actively For example, abnormal detection can reduce the possibility of worm to attack system successfully Active defense strategy is deployed not for a particular worm, while passive defense strategy is deployed after detecting worms on the Internet There are many passive strategies, such as system patch and blacklist of malicious address [22] Actually, whether it is active defense strategy or passive defense strategy, the defense capability of mobile nodes is weaker than fixed nodes We introduce a parameter DC(n) denoting the defense capability of node n, which represents the undetected probability of the integrated network Compared with the computer, mobile phone is weaker in some aspects, such as its limited computing resources and its limited battery life In the big data environment constituted by mobile nodes and fixed nodes, the abnormalities caused by worms in mobile nodes are more obvious, which means the capability of mobile nodes is weaker than fixed nodes We introduce α m,α f denoting the undetected probability of mobile nodes and fixed nodes, respectively The bigger the undetected probability is, the stronger the defense capability will be

6 6 Distributed Sensor Networks Table 1: Default simulation parameters list Parameter Value N P F 50% β 35 m 1 p 05 μ 01 φ 005 α m 01 α f 01 That is to say, α m α f DC(n) istheundetectedprobability of the whole network: DC (n) = { α m if M n,n =1 { α { f if F n,n =1 4 BD-Worm Simulation (10) To study the characteristics of BD-Worm propagation in integrated network, we simulate the propagation on OMNet First, we generate several GLP topological networks by BriteSecond,wesimulatethespreadingprocessofBD- Worm by sending message Lastly, we compare the BD-Worm spreading simulation results with different parameters There is a parameters list of integrated network which is shown in Table 1 41 The Influence of Network Topology The network topology hasagreatimpactonwormpropagation We know the amount of mobile phones and computers in the integrated network will affect the propagation of worms obviously Therefore, we try to find the character of worm propagation on the topology we proposed by simulating worm propagation on the network topology of Internet, Mobile network, and integrated network In the simulation, the integrated network consists of nodes of Internet and nodes of Mobile network, and the total number of the nodes in integrated network is Unlike the traditional worm, BD-Worm could spread on both the Internet and Mobile network The network proportion is 05 We generate the topology by Brite and the average degree in Internet degree is 40196, in Mobile network the degree is 39794, and in the integrated network the degree is So, the average degree of the network topology is 4 From the worm propagation in the complex network, we know the degree of the first infected node makes a big differenceonwormpropagationinthispaper,wechoosea high degree node instead of the average degree for the reason that a node with high degree has a more stable spreading From the result showed in Figure 3, worm propagation in Mobile network is a little faster than in Internet Worm propagatesthefastestintheintegratednetworkwhenp F = 50%orP M =50%, that is to say, there are fixed nodes Number of nodes Propagation speed Time fixed nodes mobile nodes heterogeneous nodes fixed nodes in heterogeneous network mobile nodes in heterogeneous network Figure 3: BD-Worm propagation in integrated network compared with traditional worm spreading in single network or mobile nodes in the integrated network, the two propagation curves are nearly the same We can draw a conclusion from the simulation results that BD-Worm spreads fast at the beginning of the propagation and spreads faster in integrated network than in Internet or Mobile network Once worm outbreaks in integrated network, its high propagation speed will lead the existing defense to be useless and the loss will be catastrophic Therefore, we need to improve the capability of anomaly detection and early warning in both Internet and Mobile network to contain the spread of worms 42 The Influence of Defense Capability Because of the limited computing resources of mobile intelligent terminals, the defense in the Mobile network is absolutely not as good as in the Internet In this simulation, we increase the defense capability of Mobile network α m from 01 to 03 and compare it with the default parameter 01 As showed in Figure 4, first, the propagation speed with α m = 03 has remarkable increasing compared with α m = 01 Second,notonlydoes the BD-Worm propagation speed in Mobile network gain a lotofspeed,buttheinternetwiththeunchangedα f =01 also accelerates the BD-Worm spreading speed Furthermore, BD-Worm propagation in Mobile network is faster than in Internet As we all know, the replacement of smartphones is very fast The security technology for smartphones is not keeping up with the development of phones, leading to the weak defense capability to virus and worm Our personal information is stored in smartphone; the security capability is a serious problem

7 Distributed Sensor Networks 7 Number of node 10 4 Propagation speed Time nodes mix 01, fixed nodes mobile nodes mix nodes 01, fixed nodes mobile nodes 03 Figure 4: BD-Worm spreading with different defense Therefore, we can draw the conclusion that the weakness of host detection in Mobile network increases the BD-Worm propagation sharply and causes the defense in Internet to be not useful as before On the other hand, if we could reduce the undetected probability α m, which means enhancing the defense capability of mobile nodes, it will protect the worm spreading not only in Mobile network, but also in the Internet Also, unlike the case in the Internet, the defense in the mobile network still has a lot of room to develop Hence, we should put more resources into developing the defense in Mobile network 5 Conclusion In this paper, we first propose a BD-Worm, worm propagating in big data environment caused by integration of Internet and Mobile network Then we model the BD-Worm with its infection process, connection probability opening probability and computing resource consuming in theory Finally, we simulate the propagation of BD-Worm From the simulation result, we draw the conclusions First, worms in big data environment which are integrated by mobile nodes and fixed nodes propagate faster than worms in traditional Internet and they will cause more serious damage than traditional ones Second, if we put more resources into developing the defense on Mobile network node, it also protects the Internet nodes BD-Worm provided in this paper is just one classic security problem under the big data field The privacy protection is a serious problem in big data environment Enhancing security and defense capability should improve our technology both in smartphones and computers Abbreviations P(k): Heterogeneous network degree distribution VM: Mobilenode VF: Fixednode P F : Proportion of the fixed node in integration network P M : Proportion of the mobile node in integration network ρ: Proportion of computer in heterogeneous network α: Exponent in scale-free network η: Exponent in GLP generator p: Probability that adds m new links β: Tunable parameter that indicates the preference for a new node K: All the degrees of the network Np: Network proportion cp: Network connected probability DC(n): Noden having a probability of undetected worm α m : Undetected probability on Mobile network α f : Undetected probability on Internet opp n (t): Openingprobabilityofnoden at time t crc n (t): Computing resource consuming OPP(t): Opening probability of whole network CRC(t): Diagonal matrix, abnormal files probability of the whole network μ: Initialcomputingresourceconsuming φ: Increasing computing resource consuming λ: Infected probability Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper Acknowledgment This work is partially supported by 863 National Hi-Tech Research and Development Program (2011AA01A103) References [1] J Manyika, M Chui, B Brown et al, Big Data: The Next Frontier for Innovation, Competition, and Productivity, 2011 [2] W Guo, L Zhai, Y Ren, and L Guo, Intelligent heterogeneous network worms propagation modeling and analysis, in Computer Science and Its Applications, vol 203, pp , Springer,Amsterdam,TheNetherlands,2012 [3]JKLaurila,DGatica-Perez,IAadetal, Themobiledata challenge: big data for mobile computing research, in Proceedings of the International Conference on Pervasive Computing, (EPFL-CONF ), 2012 [4] S N Zhao, The Research on Big Data s Distributed Storage and Secure Protection, Shan Dong University, 2014 [5] M M Wang, BigDataEncryptionAlgorithmBasedonData Deduplication Technology, North China University of Water Resources and Electric Power, 2013

8 8 Distributed Sensor Networks [6] F Su, Research on Worm Propagation Modeling and Defense Strategies in the Next Generation Internet, Beijing University of Posts and Telecommunications, 2011 [7] Y G Xu, H T Qian, and K Zhang, Research of DNS worm in IPv6 networks, Computer Science, vol36,no12,pp32 36, 2009 [8] Z Wang, Research on Worm Propagation and Prevention-Cure in Internet of Vehicles, Nanjing University of Science & Technology, 2013 [9] A Wagner, T Dübendorfer, B Plattner et al, Experiences with worm propagation simulations, in Proceedings of the ACM workshop on Rapid Malcode, pp 34 41, ACM, 2003 [10] C C Zou, D Towsley, and W Gong, On the performance of internet worm scanning strategies, Performance Evaluation, vol63,no7,pp ,2006 [11] Y Wang, D Chakrabarti, C Wang, and C Faloutsos, Epidemic spreading in real networks: an eigenvalue viewpoint, in Proceedings of the 22nd International Symposium on Reliable Distributed Systems (SRDS 03), pp 25 34, October 2003 [12] C C Zou, D Towsley, and W Gong, On the performance of Internet worm scanning strategies, Performance Evaluation, vol63,no7,pp ,2006 [13] R Pastor-Satorras and A Vespignani, Epidemic dynamics and endemic states in complex networks, Physical Review E,vol63, Article ID , 2001 [14] Z Chen, L Gao, and K Kwiat, Modeling the spread of active worms, in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 03),vol3,pp ,April2003 [15] P Zikopoulos and C Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, McGraw-Hill Osborne Media, 2011 [16] M Faloutsos, P Faloutsos, and C Faloutsos, On power-law relationships of the internet topology, in Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM 99), pp ,September1999 [17] A-L Barabási and R Albert, Emergence of scaling in random networks, Science,vol286,no 5439,pp , 1999 [18] R Lambiotte, V D Blondel, C de Kerchove et al, Geographical dispersal of mobile communication networks, PhysicaA:Statistical Mechanics and Its Applications,vol387,no21,pp , 2008 [19] T Bu and D Towsley, On distinguishing between Internet power law topology generators, in Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom 02),vol2,pp ,June2002 [20] R Albert and A-L Barabási, Topology of evolving networks: local events and universality, Physical Review Letters, vol 85, no24,pp ,2000 [21]MChristodorescu,SJha,SASeshia,DSong,andRE Bryant, Semantics-aware malware detection, in Proceedings of theieeesymposiumonsecurityandprivacy,pp32 46,May 2005 [22]DBrumley,L-HLiu,PPoosankam,andDSong, Design space and analysis of worm defense strategies, in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 06), pp , ACM, March 2006

9 Rotating Machinery Engineering The Scientific World Journal Distributed Sensor Networks Sensors Control Science and Engineering Advances in Civil Engineering Submit your manuscripts at Electrical and Computer Engineering Robotics VLSI Design Advances in OptoElectronics Navigation and Observation Chemical Engineering Active and Passive Electronic Components Antennas and Propagation Aerospace Engineering Modelling & Simulation in Engineering Shock and Vibration Advances in Acoustics and Vibration

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security

Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security International Distributed Sensor Networks Volume 2015, Article ID 581563, 5 pages http://dx.doi.org/10.1155/2015/581563 Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data:

More information

Research Article Average Bandwidth Allocation Model of WFQ

Research Article Average Bandwidth Allocation Model of WFQ Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Research Article Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design

Research Article Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design VLSI Design, rticle ID 698041, 5 pages http://dx.doi.org/10.1155/2014/698041 Research rticle Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design Yu-Cheng Fan, Chih-Kang

More information

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014

86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP Mingzhe Wang School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: mingzhew@gmail.com Yu Liu School

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Fault Analysis in Software with the Data Interaction of Classes

Fault Analysis in Software with the Data Interaction of Classes , pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation (U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Open Access Research and Design for Mobile Terminal-Based on Smart Home System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System

More information

Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining

Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining Electrical and Computer Engineering Volume 25, Article ID 357378, 7 pages http://dx.doi.org/.55/25/357378 Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

Research on Situation and Key Issues of Smart Mobile Terminal Security

Research on Situation and Key Issues of Smart Mobile Terminal Security Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Special Properties of Ad-hoc Wireless Network and Security Models

Special Properties of Ad-hoc Wireless Network and Security Models Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of

More information

IDS or IPS? Pocket E-Guide

IDS or IPS? Pocket E-Guide Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly

More information

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Distributed Sensor Networks Volume 2015, Article ID 512463, 6 pages http://dx.doi.org/10.1155/2015/512463 Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Xiaojin

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Research of Smart Distribution Network Big Data Model

Research of Smart Distribution Network Big Data Model Research of Smart Distribution Network Big Data Model Guangyi LIU Yang YU Feng GAO Wendong ZHU China Electric Power Stanford Smart Grid Research Institute Smart Grid Research Institute Research Institute

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department

More information

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

Research and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform

Research and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform Send Orders for Reprints to reprints@benthamscience.ae 50 The Open Cybernetics & Systemics Journal, 2015, 9, 50-54 Open Access Research and Application of Redundant Data Deleting Algorithm Based on the

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks

DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks : Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

A Security Architecture for. Wireless Sensor Networks Environmental

A Security Architecture for. Wireless Sensor Networks Environmental Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental

More information

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, 100876 Email: yq_10@sohu.

Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, 100876 Email: yq_10@sohu. JOURNAL OF NETWORKS, VOL. 3, NO. 7, JULY 28 1 fuser Behavior and Topology Analysis Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China,

More information

The Behavioral Analysis of Android Malware

The Behavioral Analysis of Android Malware , pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

New possibilities in latest OfficeScan and OfficeScan plug-in architecture New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping

More information

ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS)

ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS) ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS) Aleksandar Sokolovski Faculty Of Informatics, European University Skopje, Macedonia Saso Gelev Faculty Of Informatics, European

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture

Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture

More information

Attacks from the Inside

Attacks from the Inside Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The

More information

Research Article BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks

Research Article BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks International Journal of Distributed Sensor Networks Volume, Article ID 74, 9 pages http://dx.doi.org/.55//74 Research Article BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks

More information

High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture

High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture , pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College

More information

MOBILE MALWARE REPORT

MOBILE MALWARE REPORT TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Addressing Big Data Security Challenges: The Right Tools for Smart Protection Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Spread of Viruses on a Computer Network

Spread of Viruses on a Computer Network Spread of Viruses on a Computer Network New Mexico Supercomputing Challenge Final Report March 31, 2015 Team Number: 63 Los Alamos Middle School Team: Christie Djidjev Teacher: Project Mentors: Hristo

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Cloud Security - Characteristics, Advantages and Disadvantages

Cloud Security - Characteristics, Advantages and Disadvantages The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Detecting Computer Worms in the Cloud

Detecting Computer Worms in the Cloud Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Towards Better Definitions and Measures of Internet Security (Position Paper)

Towards Better Definitions and Measures of Internet Security (Position Paper) Towards Better Definitions and Measures of Internet Security (Position Paper) J. Aspnes and J. Feigenbaum Yale University {aspnes,feigenbaum}@cs.yale.edu M. Mitzenmacher and D. Parkes Harvard University

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY

CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY ABHILASH SREERAMANENI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEOUL NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

The assignment of chunk size according to the target data characteristics in deduplication backup system

The assignment of chunk size according to the target data characteristics in deduplication backup system The assignment of chunk size according to the target data characteristics in deduplication backup system Mikito Ogata Norihisa Komoda Hitachi Information and Telecommunication Engineering, Ltd. 781 Sakai,

More information

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu

More information

Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments

Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments International Distributed Sensor Networks, Article ID 828092, 7 pages http://dx.doi.org/10.1155/2014/828092 Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

How To Protect Your Data From Being Hacked On Security Cloud

How To Protect Your Data From Being Hacked On Security Cloud F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security

More information

Research Article Hadoop-Based Distributed Sensor Node Management System

Research Article Hadoop-Based Distributed Sensor Node Management System Distributed Networks, Article ID 61868, 7 pages http://dx.doi.org/1.1155/214/61868 Research Article Hadoop-Based Distributed Node Management System In-Yong Jung, Ki-Hyun Kim, Byong-John Han, and Chang-Sung

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the

More information