Abstract
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease spread in human populations. In this work, we utilise game theory in order to extend two very commonly used malware spread models (SIS and SIR) by incorporating defence strategies against malware proliferation. We consider three different security mechanisms, “patch”, “removal” and “patch and removal” on which our model is based. We also propose a cost-benefit model that describes optimal strategies the defender could follow when cost is taken into account. Lastly, as a way of illustration, we apply our models on the well studied Code-Red worm.
This work has been kindly supported by the Faculty of Engineering’s Systems Centre and its Industrial Partners.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10 (January 2010)
van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: FlipIt: the game of “Stealthy takeover”. Technical Report 103 (2012)
Andersson, H., Britton, T.: Stochastic Epidemic Models and Their Statistical Analysis. Springer (July 2000)
Kermack, W.O., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. Proceedings of the Royal Society of London. Series A 115(772), 700–721 (1927)
Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics. II. the problem of endemicity. Proceedings of the Royal Society of London. Series A 138(834), 55–83 (1932)
Kermack, W.O., McKendrick, A.G.: Contributions to the mathematical theory of epidemics. III. further studies of the problem of endemicity. Proceedings of the Royal Society of London. Series A 141(843), 94–122 (1933)
Capasso, V., Serio, G.: A generalization of the kermack-McKendrick deterministic epidemic model. Mathematical Biosciences 42(12), 43–61 (1978)
Van der Molen, H.: Math on malware. ISACA Journal 3, 40–47 (2011)
Osborne, M.J., Rubinstein, A.: A course in game theory. MIT Press, Cambridge (1996)
Turocy, T.: Texas a&m university. Bernhard von Stengel, London School of Economics “Game Theory” CDAM Research Report (October 2001)
Lin, J.C., Chen, J.M., Chen, C.C., Chien, Y.S.: A game theoretic approach to decision and analysis in strategies of attack and defense. In: Proceedings of the 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, pp. 75–81. IEEE Computer Society, Washington, DC (2009)
Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. In: Proceedings of the 2010 Spring Simulation Multiconference, SpringSim 2010, pp. 159:1–159:8. Society for Computer Simulation International, San Diego (2010)
Khouzani, M., Sarkar, S., Altman, E.: A dynamic game solution to malware attack. In: 2011 Proceedings IEEE INFOCOM, pp. 2138–2146. IEEE (2011)
Saudi, M., Tamil, E., Nor, S., Idris, M., Seman, K.: Edowa worm classification. In: Proceedings of the World Congress on Engineering, vol. 1 (2008)
Moore, D., Shannon, C., Brown, J.: Code-Red: a case study on the spread and victims of an Internet worm. In: ACM SIGCOMM/USENIX Internet Measurement Workshop (IMW), Marseille, France, pp. 273–284 (November 2002)
Vojnovic, M., Ganesh, A.: On the race of worms, alerts, and patches. IEEE/ACM Transactions on Networking (TON) 16(5), 1066–1079 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Spyridopoulos, T., Oikonomou, G., Tryfonas, T., Ge, M. (2013). Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds) Security and Privacy Protection in Information Processing Systems. SEC 2013. IFIP Advances in Information and Communication Technology, vol 405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39218-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-39218-4_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39217-7
Online ISBN: 978-3-642-39218-4
eBook Packages: Computer ScienceComputer Science (R0)