Economics of Information Security and Privacy III 2012
DOI: 10.1007/978-1-4614-1981-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Internet-Scale Policies for Cleaning up Malware

Abstract: An emerging consensus among policy makers is that interventions undertaken by Internet Service Providers are the best way to counter the rising incidence of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. For instance, we find that coordinated intervention by the 0.2%-biggest ASes is more effective than uncoordinated eff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Traffic dynamics affect the concentration of malicious hosts [25], but appropriate network traffic datasets are not publicly available. Numerous models of traffic flow have been proposed for the AS network, ranging from simple [64] to elaborate [5], and for this study we adapted Roughan et al's gravity model [64] to simulate malicious traffic between nodes in the ISP graph.…”
Section: Network Traffic Dynamicsmentioning
confidence: 99%
See 2 more Smart Citations
“…Traffic dynamics affect the concentration of malicious hosts [25], but appropriate network traffic datasets are not publicly available. Numerous models of traffic flow have been proposed for the AS network, ranging from simple [64] to elaborate [5], and for this study we adapted Roughan et al's gravity model [64] to simulate malicious traffic between nodes in the ISP graph.…”
Section: Network Traffic Dynamicsmentioning
confidence: 99%
“…These predictions could be incorporated into our model to better predict some of the large changes in wickedness over time. A model of global malware dynamics was also proposed by Hofmeyr et al, which used an agent-based model to investigate the dynamics of malicious traffic flowing across the Internet at the AS level [25]. This model was significantly more abstract than ours, and did not incorporate actual data about spam, ISPs, demographic features, or intervention events such as takedowns.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…(b) Power-law website popularity eled responses available to ISPs [12]. Other researchers have identified suitable intervention strategies based on empirical research, which might also be amenable to depreferencing.…”
Section: Related Workmentioning
confidence: 99%
“…Several studies have focused on alternative intervention strategies, which could potentially be generalized using our depreferencing method. For example, Hofmeyr et al modeled responses available to ISPs [27]. Other researchers have identified suitable intervention strategies based on empirical research, which might also be amenable to depreferencing.…”
Section: Related Workmentioning
confidence: 99%