Email networks and the spread of computer viruses Authors:M. E. J. Newman, S. Forrest, and J. Balthrop. Published:September 10, 2002 - Physical Review.

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

Software Diversity for Information Security Gaurav Kataria Carnegie Mellon University.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Introduction to Your Name Goes Here
Chapter 12 Network Security.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Centrality Measures These measure a nodes importance or prominence in the network. The more central a node is in a network the more significant it is to.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Lecture 11 Reliability and Security in IT infrastructure.
1 Software Testing and Quality Assurance Lecture 14 - Planning for Testing (Chapter 3, A Practical Guide to Testing Object- Oriented Software)
(Geneva, Switzerland, September 2014)
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
A Study of Mass- mailing Worms By Cynthia Wong, Stan Bielski, Jonathan M. McCune, and Chenxi Wang, Carnegie Mellon University, 2004 Presented by Allen.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
BUSINESS B1 Information Security.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Data Analysis in YouTube. Introduction Social network + a video sharing media – Potential environment to propagate an influence. Friendship network and.
Directed-Graph Epidemiological Models of Computer Viruses Presented by: (Kelvin) Weiguo Jin “… (we) adapt the techniques of mathematical epidemiology to.
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
{ Macro by Gabriel and Brian. Definiti on a macro virus is a virus that is written in a macro language that is to say, a language built into a software.
history, hardware, software, safety, and computer ethics
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
5-4-1 Unit 4: Sampling approaches After completing this unit you should be able to: Outline the purpose of sampling Understand key theoretical.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Introduction to Student Name Student Class.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Topic 5: Basic Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Data Structures and Algorithms in Parallel Computing Lecture 3.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
1 Friends and Neighbors on the Web Presentation for Web Information Retrieval Bruno Lepri.
Computer virus Done: Aaesha Mohammed ID: H
Near repeat burglary chains: describing the physical and network properties of a network of close burglary pairs. Dr Michael Townsley, UCL Jill Dando Institute.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Knowledge, attitude, and practices and influencing factors related to seasonal influenza vaccination among health-care workers in Qingdao, China, 2013–14:
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Introduction to Your Name Goes Here
Unit 4 IT Security.
Introduction to Justin R. Scott CIS Introduction to .
Network Science: A Short Introduction i3 Workshop
Introduction to Your Name Goes Here
Electronic Communication and the Internet
The Internet and Electronic mail
Presentation transcript:

networks and the spread of computer viruses Authors:M. E. J. Newman, S. Forrest, and J. Balthrop. Published:September 10, Physical Review E 66 Presenter:Jonathan Hendricker

Contributions Realization of social network of personal connections through a directed network Provides data about the spread of viruses within social community More effective way in combating infection through strategic targeting Applicable to other socially dependant electronic services

Outline The social network – new ground & unique threat Using a real social network – demographic, testing & results Experiment Analysis & Prevention techniques: Random vs. Targeted vaccination

Social Network This network is entirely distinct from the physical network of optical fibers and other connections over which data are transferred between computers Social Network of personal not literal connections to users and computers Computers do not have to be linked via network, only via personal connections, i.e. Address Books

The PRIMARY vehicle for computer virus transmission is electronic mail. Viruses are distributed via attachments and are further propagated through the virus using the user’s Address Book for further targets. Address Books provide a unique social network of associations not dependant on physical location Unique Threat

Testing of Actual Network 20 Different Types of Address Books Network of 27,841 total users Reduced to16,881 active accounts Any connections from outside the network were omitted though recognized as the viral catalysist

Directed Social Network Account B Account C Account A

Testing & Results Number of vertices Number with address books 4581 Number with nonzero in- or out-degrees Mean number of entries per address book Mean degree z ~either in or out! 3.38

Testing & Results (cont) Total number of edges Number of edges that point both ways Fraction pointing both ways ~reciprocity! 0.231

Social in & out-degree sampling Results suggest a semi-directed social network

Spread of infection over an network Pessimistic assumption: virus spread efficiency is 100%  No Anti-virus software or other precautions – Worst Case Scenario Virus spread is directed through Address Book

Who’s at risk? The users at the highest level of risk are the those in the “strongly connected component” and the “links-out”(out-degree) Large scale virus infection occurs when there is an infection in the strongly connected component This tells us that this area is of the most importance for virus protection

Random vs. Targeted Current virus protection strategies focus on random “vaccination” Ineffective in combating infection, only reduces 10%

Weaknesses Only one network analyzed Assumption of no anti-virus protection for network too drastic Statistical equations thrown in with out much explanation Did not discuss privacy issues or vulnerabilities for determining “Strongly Connected Component” Alluded to future use but no examples given