CFP last date
20 January 2025
Reseach Article

An OS Integrity Measurement System based on Epidemiology

by K. Venugopal Dasarathy, Samuya Hegde, Radhesh Mohandas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 24 - Number 9
Year of Publication: 2011
Authors: K. Venugopal Dasarathy, Samuya Hegde, Radhesh Mohandas
10.5120/2988-3985

K. Venugopal Dasarathy, Samuya Hegde, Radhesh Mohandas . An OS Integrity Measurement System based on Epidemiology. International Journal of Computer Applications. 24, 9 ( June 2011), 15-18. DOI=10.5120/2988-3985

@article{ 10.5120/2988-3985,
author = { K. Venugopal Dasarathy, Samuya Hegde, Radhesh Mohandas },
title = { An OS Integrity Measurement System based on Epidemiology },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 24 },
number = { 9 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume24/number9/2988-3985/ },
doi = { 10.5120/2988-3985 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:10:31.507803+05:30
%A K. Venugopal Dasarathy
%A Samuya Hegde
%A Radhesh Mohandas
%T An OS Integrity Measurement System based on Epidemiology
%J International Journal of Computer Applications
%@ 0975-8887
%V 24
%N 9
%P 15-18
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Consider an analogy when dealing with human diseases, when a person discovers something different happening to him/her, a common course of action is to know if others have experienced the same thing. In this paper we propose a design for an integrity system for a connected network that attempts to measure the degree of infection of a system on the network using an epidemiological model. Furthermore we present the outcome of simulations that model the process of infection over a network and show how the infectiousness degree of a program varies with parameter values of the model.

References
  1. Lora Billings, William M. Spears, Ira B. Schwartz “A unified prediction of computer virus spread in connected networks” Physics Letters A 297(2002) 261-266J
  2. J. Kephart, S. White, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 343–359.
  3. N. Bailey, The Mathematical Theory of Infectious Diseases and Its Applications, Oxford University Press, New York, 1975.
  4. Allen W.H., Ford R. , ” How Not to Be Seen II: The Defenders Fight Back” Security & Privacy, IEEE, Nov.-Dec. 2007,pp. 65- 68
  5. Y.-M. Wang et al., "Detecting Stealth Software with Strider GhostBuster," Proc. IEEE Int"l Conf. Dependable Systems and Networks (DSN 05), IEEE CS Press, 2005, pp. 368–377.
  6. James Butler and Sherri Sparks. “Shadow walker: Rasing the bar for windows rootkit detection.” In Phrack 63, July 2005.
  7. Mihai Christodorescu, Somesh Jha, Sanjit Seshia, Dawn Song, and Randal Bryant. “Semantics-aware malware detection.” In Proceedings of the 2005 IEEE Security and Privacy Conference, 2005.
  8. James Butler and Greg Hoglund. “VICE–catch the hookers!” In BlackHat USA, July 2004. ttp://www.blackhat.com/presentations/bh-usa-04/ bh-us-04-butler/bh-us-04-butler.pdf
  9. Joanna Rutkowska. “System virginity verifier: Defining the roadmap for malware detection on windows systems.” In Hack In The Box Security Conference, September 2005
  10. J. O. Kephart, S. R. White and D. M. Chess. “Computers and Epidemiology”. IEEE Spectrum, 20-26. May 1993.
Index Terms

Computer Science
Information Sciences

Keywords

Malware rootkits epidemiology