1 / 12

Modeling Penetration of Viruses at the Gateway

Modeling Penetration of Viruses at the Gateway. S1080063 Keiichi Kato Supervised by Prof.Hiroshi Toyoizumi. Purpose. To make useful when we work out new defense way from viruses by verifying that virus mails obey exponential distribution. Target Virus Information.

dtreadwell
Download Presentation

Modeling Penetration of Viruses at the Gateway

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Modeling Penetration of Viruses at the Gateway S1080063 Keiichi Kato Supervised byProf.Hiroshi Toyoizumi

  2. Purpose • To make useful when we work out new defense way from viruses by verifying that virus mails obey exponential distribution.

  3. Target Virus Information

  4. All viruses retrieve mail addresses from some files, make an individual mailing list and send large number of mail by using the list and own SMTP engine. The common point of the viruses

  5. The feature of SWEN.A • The time when it should be necessary to send a mail is under 1-second. • Sending mails every several seconds. • Not to send all members of mailing list but some members chosen at random

  6. The day when each virus reached most abundantly was taken as a sample. Time data information

  7. To calculate the probability of optional ranges. β decides unit time. To solve Dis is to know whether the result is near to exponential distribution or not. The desirable Dif answer is more closer 0. X is the interval of every virus mail. Equation

  8. SWEN.A MIMAIL.R LOVGATE.F Calculations

  9. Bar graph: The amount of virus mail. Line graph: The exponential distribution. The number of samples: 373 Probability of the top of bar: 14.8% Probability of the top of bar: 12.2% The bar graph isn’t ideal type falling down as it goes to the right.We couldn’t catch the feature of the bar graph. Result of SWEN.A

  10. Bar graph: The amount of virus mail. Line graph: The exponential distribution. The number of samples: 1003 Probability of the top of bar: 32.1% Probability of the top of line: 29.4% The bar graph is ideal type and almost matches with the line. The bar graph almost matches with the line. Result of MIMAIL.R

  11. Bar graph: The amount of virus mail. Line graph: The exponential distribution. The number of samples: 519 Probability of the top of bar: 99.9% Probability of the top of line: 47.0% Anyone in University of Aizu sent all mails. We can capture the feature for sending mails. Result of LOVGATE.F

  12. Conclusion • Depending on the network environment and the number of samples, virus mails obey Poisson process though there is an exception. • To need to sort out the sending mails from the receiving to obtain correct results.

More Related