Skip to main content

MASFMMS: Multi Agent Systems Framework for Malware Modeling and Simulation

  • Conference paper
Book cover Multi-Agent-Based Simulation IX (MABS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5269))

  • 917 Accesses

Abstract

The Internet and local area networks, which connect many personal computers, are also facilitating the proliferation of malicious programs. Modern malware takes advantage of network services like e-mail and file sharing to proliferate. Existing simulation environments use biological models or their variants for explaining the patterns of proliferation of malicious programs. This paper aims to provide a framework that enables the modeling of security threats using multi agent systems. Multi Agent Systems Framework for Malware Modeling and Simulation (MASFMMS) provides a generic environment for modeling security weaknesses and their exploitation in a computer network. We present various scenarios of exploits that are prevalent in real life and show how they can be simulated in MASFMMS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CERT Coordination Center, http://www.cert.org/

  2. CAIDA, http://www.caida.org/research/security/code-red/

  3. Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: 11th Usenix Security Symposium, San Francisco (August 2002)

    Google Scholar 

  4. Frauenthal, J.C.: Mathematical Modeling in Epidemiology. Springer, New York (1980)

    MATH  Google Scholar 

  5. Zou, C.C., Gao, L., Gong, W.: Monitoring and early warning for internet worms

    Google Scholar 

  6. “NMAP”, http://www.insecure.org/

  7. Skaggs, B., Blackburn, B., Manes, G., et al.: Network vulnerability analysis. In: Proceedings of Wales E., Vulnerability assessment tools. Network Security, vol. 2003(7), pp. 15–17 (July 2003)

    Google Scholar 

  8. Steel, P.: The Nature of Procrastination: A Meta-Analytic and Theoretical Review of Quintessential Self-Regulatory Failure. Psychological Bulletin (2007)

    Google Scholar 

  9. Chen, Z., Gao, L., Kwiat, K.: Modeling the Spread of Active Worms. In: IEEE INFOCOM (2003)

    Google Scholar 

  10. Zou, C.C., Towsley, D., Gong, W.: Email Worm Modeling and Defense. In: 13th International Conference on Computer Communications and Networks (ICCCN 2004), Chicago, October 11-13 (2004)

    Google Scholar 

  11. Weaver, N.C.: Warhol worms: the potential for very fast Internet plagues (August 2001)

    Google Scholar 

  12. Nachenberg, C.: The Evolving Virus Threat. In: 23rd NISSC Proceedings, Baltimore, Maryland (2000)

    Google Scholar 

  13. Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM workshop on Rapid malcode, Washington, DC, USA, October 27 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Monga, R., Karlapalem, K. (2009). MASFMMS: Multi Agent Systems Framework for Malware Modeling and Simulation. In: David, N., Sichman, J.S. (eds) Multi-Agent-Based Simulation IX. MABS 2008. Lecture Notes in Computer Science(), vol 5269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01991-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01991-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01990-6

  • Online ISBN: 978-3-642-01991-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics