15
Network Transport: Recipient Activated Malware Bruce W. Fowler University of Alabama in Huntsville Center for Management of Science and Technology P. O. Box 220 Arab, AL 35016 [email protected]

Recipient Activated Malware Diffusion

Embed Size (px)

Citation preview

Page 1: Recipient Activated Malware Diffusion

Network Transport: Recipient Activated Malware

Bruce W. FowlerUniversity of Alabama in Huntsville

Center for Management of Science and Technology

P. O. Box 220Arab, AL 35016

[email protected]

Page 2: Recipient Activated Malware Diffusion

Acknowledgement

The author wishes to gratefully acknowledge the assistance of Ms. Norma Lee in developing the process models herein presented.

Page 3: Recipient Activated Malware Diffusion

Background

Induced Fragility in

Information Age Warfare

Page 4: Recipient Activated Malware Diffusion

What's Malware?

Malware Definition (http://www.linfo.org/malware.html)

Malware is any software that is developed for the purpose of doing harm to computers or via computers.

Malware can be classified in several ways, including on the basis of how it is spread, how it is executed and/or what it does. The main types of malware include worms, viruses, trojans, backdoors, spyware, rootkits and spam.

Page 5: Recipient Activated Malware Diffusion

What's Recipient Activated Malware (RAM)?

Malware that is activated by the recipient: Type 1: the malware is linked to a recipient via an

email Malware embedded in email proper, Malware embedded as attachment, or Malware embedded in web page with link in the email. Malware on removable media obtained from a colleague.

Type 2: the malware is embedded in a web page that the user (recipient) visits either undirected or by direction other than email.

Page 6: Recipient Activated Malware Diffusion

Internet 'Reality' Space-Time

Time Similar to ‘material’

reality (mechanical clocks, parametric)

Space arcs (edges) and

nodes not Cartesian

Page 7: Recipient Activated Malware Diffusion

RAM + space-time

Neglecting server infection, RAM only afflicts terminating arcs (edges) on the boundaries of the network.

Only degree one nodes impacted, network statistics effectively irrelevant exception: non-American cellular phones? exception: positive correlation network contribution

structuring email addressing? No further spatiality (gridless)

Page 8: Recipient Activated Malware Diffusion

Rate Theory Interlude

1

1 1

Starting Equation

If the are regular, then to first order

in Laplace Transform expansion,

where

i iicontinuous

i

continuous

i i

du duu t t

dt dt

t

u tdu du

dt dt

t t

Page 9: Recipient Activated Malware Diffusion

RAM Type 1 Process

Page 10: Recipient Activated Malware Diffusion

RAM Type 1 Transport Equation - 1

1

2

number of infected, contagious computers

total number of computers on network

time between email transmissions

time for a non-contageous computer to become contageous

number of addresses

T

N

N

m

on advertising email with embedded

or linked malware (possibly RV)

p probability recipient computer is not infected

= 1

probability anti-malware filters catches malware

prob

NI

T

T Y

S

fs

N N N

N N

p

p

ability user releases nalware caught by filter

probability recipient executes/links to malware

population of infected, non-contagious computersep

n

Page 11: Recipient Activated Malware Diffusion

RAM Type 1 Transport Equation - 2

2

1 2

1 2

2

01

1 ;

, network transmission time

;

1

NI S S fs e

NI S S fs e

dn N nm p p p p p

dt

dN n

dt

dN NLim m p p p p p

dt

This is simply a Logistics DE! Disease-like

diffusion

Page 12: Recipient Activated Malware Diffusion

RAM Type 2 Process

Page 13: Recipient Activated Malware Diffusion

RAM Type 2 Transport Equation

3

Some previous plus

mean time between web site visits

, relative liklihood of visiting benign, malware web site

fraction of websites harboring malware

S total number of web sites

probabi

B M

M

T

MALp

3

lity of visiting a malware site

=1

probability of downloading Malware (may be 1 for some forms)

1

M M

M M B M

down

TMAL down S S fs e

p

N NdNp p p p p p

dt

This is simple NED.

Page 14: Recipient Activated Malware Diffusion

Insights

Type 2 potentially more serious – faster growth Counter-measures

Low hanging fruit – common pieces Anti-malware filters (good investment, keep up to date – conficker

worm!) Web site warning utilities/blocking Education – never take anything out of filter cache, never run

programs you don’t know, visit only good sites. Tree chopping and Baby tossing

Corporate network Wine

Two OS + Virtual Machines

Page 15: Recipient Activated Malware Diffusion

The Future

How to recover from MalWare Waiting for new methods Drilling down Commonalities