Browse > Article
http://dx.doi.org/10.6109/jkiice.2020.24.4.522

A Spread Prediction Tool based on the Modeling of Malware Epidemics  

Shin, Weon (Department of Information Security, Tongmyong University)
Abstract
Rapidly spreading malware, such as ransomware, trojans and Internet worms, have become one of the new major threats of the Internet recently. In order to resist against their malicious behaviors, it is essential to comprehend how malware propagate and how main factors affect spreads of them. In this paper, we aim to develop a spread prediction tool based on the modeling of malware epidemics. So we surveyed the related studies, and described the system design and implementation. In addition, we experimented on the spread of malware with major factors of malware using the developed spread prediction tool. If you make good use of the proposed prediction tool, it is possible to predict the malware spread at major factors and explore under various responses from a macro perspective with only basic knowledge of the recently wormable malware.
Keywords
Malware epidemics; Spread modeling; Spread prediction tool; Wormable malware;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Microsoft, Microsoft Security Intelligence Report Vol. 24, [Internet]. Available: https://info.microsoft.com/ww-landing-M365-SIR-v24-Report-eBook.html?lcid=en-us
2 IBM, IBM X-Force Threat Intelligence Index 2019, [Internet]. Available: https://xforceintelligenceindex.mybluemix.net/
3 S. Kim, J. Yoo, "A Study on Prediction of Malicious Code Infection Websites Using Markov Chain", Journal of Security Engineering, Vol.14, No.1, pp. 9-20, 2017.   DOI
4 H. W. Hethcote, "The Mathematics of Infectious Diseases", SIAM Review, vol. 42, No. 4, pp.599-653, 2000.   DOI
5 Y. Wang, S. Wen, Y. Xiang, and W. Zhou, "Modeling the Propagation of Worms in Networks: A Survey", IEEE Communications Surveys and Tutorials, Vol. 16, Issue 2, pp. 942-960, 2014.   DOI
6 J. D. Murray, Mathematical Biology, Springer International Publishing, 1993.
7 W. Shin, "A Study on the Spread and Responses of Mobile Worms by Wireless Network Environments", Journal of Korea Institute of Information and Communication Engineering, vol. 10, No. 4, pp.429-440, 2013.
8 C. C. Zou, W. Gong, D. Towsley. "Code Red Worm Propagation Modeling and Analysis", in Proceedings of the 9th ACM conference on Computer and communications security, pp.138-147, 2002.
9 Microsoft Security Response Center, Prevent a worm by updating Remote Desktop Services (CVE-2019-0708) [Internet]. Available: https://msrc-blog.microsoft.com/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
10 AhnLab ASEC, "WannaCryptor Ransomware Analysis", AhnLab, Analysis Report, 2017.
11 KISA KrCERT, WannaCry Analysis Special Report [Internet]. Available:, https://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence=26747
12 T. H. Park, K. B. Kim and W. Shin, "A Prediction Model for the Spread of WannaCryptor Ransomware," in Proceeding of Conference on Information Security and Cryptography-Summer 2019, Busan, pp. 204-208, 2019.