Malware Epidemics Effects in a Lanchester Conflict Model

11/05/2018
by   Joachim Draeger, et al.
0

For developing a better comprehension of the consequences of cyber-attacks, the paper examines the influence of system infections with self-replicating malware on the outcome of kinetic combat. The situation is represented as a system-dynamics model consisting of a SIR-like and a Lanchester component. The game-like context of kinetic combat illustrates the effects of malware in a concise way. Corresponding assessment criteria are derived and applied to scenario classes resulting from assumptions about the expected circumstances. Remaining uncertainties are taken into account by applying Monte-Carlo simulations, whereby the specific scenarios to be processed can be selected randomly by information-theoretic principles. The resulting framework allows a model-based calculation of e.g. the risk and the fraction of scenarios, in which malware attacks turn around the outcome of the kinetic combat. Some of our basic findings derived from computational calculations are: (1) Malware attacks affecting availability can turn around the outcome of kinetic combat in a significant fraction of scenarios. (2) Cyber capabilities tend to soften out kinetic superiority or inferiority. (3) Using the most aggressive malware is not necessarily the best decision for an aggressor. (4) Starting countermeasures against a malware attack at the earliest possible time is not always the best decision for a defender.

READ FULL TEXT
research
04/27/2017

Artificial Intelligence Based Malware Analysis

Artificial intelligence methods have often been applied to perform speci...
research
12/19/2018

Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge

Malware continues to be a major cyber threat, despite the tremendous eff...
research
04/04/2022

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

The volume of malware and the number of attacks in IoT devices are risin...
research
11/09/2019

Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis

Malware constitutes a major global risk affecting millions of users each...
research
09/23/2021

ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

Advanced metamorphic malware and ransomware, by using obfuscation, could...
research
05/23/2019

Characterizing Certain DNS DDoS Attacks

This paper details data science research in the area of Cyber Threat Int...
research
07/30/2021

Winning the Ransomware Lottery: A Game-Theoretic Model for Mitigating Ransomware Attacks

Ransomware is a growing threat to individuals and enterprises alike, con...

Please sign up or login with your details

Forgot password? Click here to reset