2022
DOI: 10.1007/978-3-031-17140-6_26
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Network Resilience Against Self-Propagating Malware Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 38 publications
0
7
0
Order By: Relevance
“…where t is the number of ties in the ego network (not including ties to ego) and n is the number of nodes (excluding ego). A recent work on cyber network resilience against self-propagating malware attacks [59] observed that nodes with the highest ENS tend to act as bridges between two dense clusters and monitoring them could be useful to prevent attack spreading.…”
Section: Stronger Structural Graph Attackmentioning
confidence: 99%
“…where t is the number of ties in the ego network (not including ties to ego) and n is the number of nodes (excluding ego). A recent work on cyber network resilience against self-propagating malware attacks [59] observed that nodes with the highest ENS tend to act as bridges between two dense clusters and monitoring them could be useful to prevent attack spreading.…”
Section: Stronger Structural Graph Attackmentioning
confidence: 99%
“…Moreover, resilience building is studied only from a network perspective and not in a regulatory framework. A specific attempt to build network resilience against self-propagating malware, and in particular the WannaCry worm, was recently presented in Chernikova et al (2022). The authors use synthetic WannaCry data to derive an adequate contagion model, similar to the classic SIR model, and appropriate parameter estimates.…”
Section: Literaturementioning
confidence: 99%
“…edge hardening, which corresponds to strong protection of network connections via firewalls, the closing of open ports, or the monitoring of data flows using specific detection systems, see Chernikova et al (2022).…”
Section: Implementing Suitable Interventionsmentioning
confidence: 99%
See 1 more Smart Citation
“…It targets consumers, governments, and commercial entities. One example of ransomware is WannaCry, which affected many computers worldwide in 2017 [5]. Users cannot access files or systems until the victim pays the ransom to get the decryption key [6].…”
Section: Introductionmentioning
confidence: 99%