Hunting Distributed Malware with the κ-Calculus

作者: Mila Dalla Preda , Cinzia Di Giusto

DOI: 10.1007/978-3-642-22953-4_9

关键词:

摘要: The defense of computer systems from malicious software attacks, such as viruses and worms, is a key aspect security. analogy between biological infections suggested us to use the ?- calculus, formalism originally developed for analysis systems, formalization software. By modeling different actors involved in code attack k-calculus by simulating their behavior, it possible extract important information that can drive choice technique apply.

参考文章(29)
Eric Filiol, Formalisation and implementation aspects of K-ary (malicious) codes Journal in Computer Virology. ,vol. 3, pp. 75- 86 ,(2007) , 10.1007/S11416-007-0044-2
Grégoire Jacob, Eric Filiol, Hervé Debar, Formalization of Viruses and Malware Through Process Algebras 2010 International Conference on Availability, Reliability and Security. pp. 597- 602 ,(2010) , 10.1109/ARES.2010.59
Z. Zuo, Some Further Theoretical Results about Computer Viruses The Computer Journal. ,vol. 47, pp. 627- 633 ,(2004) , 10.1093/COMJNL/47.6.627
G. Bonfante, M. Kaczmarek, J.-Y. Marion, On abstract computer virology from a recursion theoretic perspective Journal in Computer Virology. ,vol. 1, pp. 45- 54 ,(2006) , 10.1007/S11416-005-0007-4
J.O. Kephart, S.R. White, Directed-graph epidemiological models of computer viruses ieee symposium on security and privacy. pp. 343- 359 ,(1991) , 10.1109/RISP.1991.130801
Giorgio Delzanno, Cinzia Di Giusto, Maurizio Gabbrielli, Cosimo Laneve, Gianluigi Zavattaro, The κ-Lattice: Decidability Boundaries for Qualitative Analysis in Biological Languages computational methods in systems biology. ,vol. 5688, pp. 158- 172 ,(2009) , 10.1007/978-3-642-03845-7_11
B. McCarty, Botnets: big and bigger ieee symposium on security and privacy. ,vol. 1, pp. 87- 90 ,(2003) , 10.1109/MSECP.2003.1219079
Qian Wang, Zesheng Chen, Chao Chen, Niki Pissinou, On the Robustness of the Botnet Topology Formed by Worm Infection global communications conference. pp. 1- 6 ,(2010) , 10.1109/GLOCOM.2010.5684002
David Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee, A Taxonomy of Botnet Structures annual computer security applications conference. pp. 325- 339 ,(2007) , 10.1109/ACSAC.2007.44
Jonghyun Kim, S. Radhakrishnan, S.K. Dhall, Measurement and analysis of worm propagation on Internet network topology international conference on computer communications and networks. pp. 495- 500 ,(2004) , 10.1109/ICCCN.2004.1401716