Browse > Article

ESP model for predictions Trojan  

Kim, JongMin (경기대학교 산업보안학과)
Kim, MinSu (경기대학교 산업보안학과)
Kim, Kuinam J. (경기대학교 융합보안학과)
Publication Information
Abstract
A Trojan malicious code is one of largest malicious codes and has been known as a virus that causes damage to a system as itself. However, it has been changed as a type that picks user information out stealthily through a backdoor method, and worms or viruses, which represent a characteristic of the Trojan malicious code, have recently been increased. Although several modeling methods for analyzing the diffusion characteristics of worms have proposed, it allows a macroscopic analysis only and shows limitations in estimating specific viruses and malicious codes. Thus, in this study an ESP model that can estimate future occurrences of Trojan malicious codes using the previous Trojan data is proposed. It is verified that the estimated value obtained using the proposed model is similar to the existing actual frequency in causes of the comparison between the obtained value and the result obtained by the Markov chain.
Keywords
Trojan; Markov Chain; Malicious Code; Prediction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Cliff Changchun Zou, Weibo Gong, Don Towsley "Code Red Worm Propagation Modeling and Analysis", Conferrence on Computer and Communications Security, 2002.
2 D. J. Deley and J. Gani, "Epidemic Modeling: An Introduction", Cambridge university Press, 1999.
3 F. B Cohen, "A Formal Definition of Computer Worms and Some Related Results", Computer & Security, 7(11) pp.641-652, 1992.
4 Dr. Winfried Gleissner, "A Mathematical Theory for the Spread of Computer Viruses", Computer & Security, 8(1) pp.35-41, 1989.   DOI
5 Wangner A., Dubendorfer T., Plattner B. and Hiestand R., "experiences with worm propagation simulations", Proceedings of the 2003 ACM workshop on Rapid malcode, pp.34-41, 2003.
6 Yang W. and Chenxi W., "modeling the effects of timing parameters on virus propagation", Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 61-66, 2003.
7 박원형, 김영진, 이동휘, 김귀남, "마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구", 정보보안논문지, 제8권 제4호, pp. 173-181, 2008.
8 한학용, "패턴 인식 개론", 한빛미디어, pp. 432-438, 2009.
9 Farrington, David P., Martin Gill, Sam J., Waples, and Javier Argomaniz., "The effects of closed-circuit television on crime: meta-analysis of an English national quasi-experimental multi-site evaluation", Journal of Experimental Criminology Volume 3 Number 1, pp. 21-38, 2007.   DOI
10 Symantec, "Symantec Internet Security Threat Report trends for 2010", Volume 16, 2011.
11 AhnLab, "ASEC REPORT", Annual Report, 2013.
12 http://www.trojanhunter.com/trojanhunter/portlist/