
NETWORK MODELS OF MALWEAR PROLIFERATION PROCESSES
Author(s) -
Georgiy Aleksandrovich Popov,
Е А Попова,
Marina Georgievna Popova
Publication year - 2018
Publication title -
vestnik astrahanskogo gosudarstvennogo tehničeskogo universiteta. seriâ: upravlenie, vyčislitelʹnaâ tehnika i informatika
Language(s) - English
Resource type - Journals
eISSN - 2224-9761
pISSN - 2072-9502
DOI - 10.24143/2072-9502-2018-4-73-79
Subject(s) - malware , computer science , software , product (mathematics) , graph , theoretical computer science , computer security , operating system , mathematics , geometry
The paper deals with the analysis of possible ways of spreading malware on the basis of weighted graphs, where the graph describes the relationship between different programs, and the weight shows the probability of transition malware from one software system to another. The task is to identify the most likely routes of malicious programs distribution and to find the most likely ways of their penetration into a given software product. The method of dynamic programming is proposed to solve the problem. The procedure of solving the problem has been demonstrated on a particular example. The results of calculations helped to determine the most probable route of penetration and to estimate the probability of successful attack of malicious programs on the required software product. Graph theory methods also allowed to estimate a number of other numerical characteristics related to the process of the malicious programs distribution, which include the minimum number of clock cycles of the system (after the implementation of this characteristic it becomes possible for a malicious program to penetrate the specified software product); the number of clock cycles of the system (when probability of penetration of the malware into a specific file will be greater than the specified value). Besides, the method helps identify cyclical routes of malware distribution, which characterizes repeated attempts of malware to impact on the software product, find the most likely sources of distribution, detect the files, through which penetration into given software product is possible.