CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
Authors
Alexios Mylonas
Cashell B.
+10 more
George Oikonomou
Kim J.
Konstantinos Maraslis
Osborne M. J.
Saudi M.
Staniford S.
Theo Tryfonas
Theodoros Spyridopoulos
Turocy T.
Van der Molen H.
Publication date
31 December 2015
Publisher
'Informa UK Limited'
Doi
Cite
Abstract
Copyright © Taylor & Francis Group, LLC. Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, have been used against this threat to analyze the way malware spreads in a network. This work presents a modified version of the commonly used epidemiology models Susceptible Infected Recovered (SIR) and Susceptible Infected Susceptible (SIS), which incorporates the ability to capture the relationships between nodes within a network, along with their effect on malware dissemination process. Drawing upon a model that illustrates the network’s behavior based on the attacker’s and the defender’s choices, we use game theory to compute optimal strategies for the defender to minimize the effect of malware spread, at the same time minimizing the security cost. We consider three defense mechanisms: patch, removal, and patch and removal, which correspond to the defender’s strategy and use probabilistically with a certain rate. The attacker chooses the type of attack according to its effectiveness and cost. Through the interaction between the two opponents we infer the optimal strategy for both players, known as Nash Equilibrium, evaluating the related payoffs. Hence, our model provides a cost-benefit risk management framework for managing malware spread in computer networks
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
Supporting member
Explore Bristol Research
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:research-information.bris....
Last time updated on 17/09/2019
Supporting member
Online Research @ Cardiff
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:https://orca.cardiff.ac.uk...
Last time updated on 28/01/2023
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
info:doi/10.1080%2F19393555.20...
Last time updated on 05/06/2019
UWE Bristol Research Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:uwe-repository.worktribe.c...
Last time updated on 08/06/2020