2019
DOI: 10.1109/access.2019.2960552
|View full text |Cite
|
Sign up to set email alerts
|

Potential Risk Analysis Method for Malware Distribution Networks

Abstract: In this study, the structural characteristics of malware distribution networks (MDNs) were examined and the network centrality of the relationships between websites containing malware, infection sites, intermediate connection sites, and initial connection sites were analyzed. The core malware sites within MDNs that contribute to the success of cyberattacks were identified, and the overall risk of the MDNs, which changes dynamically, was examined quantitatively to predict additional attacks. As such, real-time … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…Newman et al [14] conducted an empirical study investigating the email network structure to examine what nodes can significantly contribute to spreading computer viruses. Kim [17] measured the risk of websites exposing security vulnerability (e.g., malware, fake infectious sites) based on degree, betweenness, eigenvector, and closeness.…”
Section: Communication Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Newman et al [14] conducted an empirical study investigating the email network structure to examine what nodes can significantly contribute to spreading computer viruses. Kim [17] measured the risk of websites exposing security vulnerability (e.g., malware, fake infectious sites) based on degree, betweenness, eigenvector, and closeness.…”
Section: Communication Networkmentioning
confidence: 99%
“…In-degree; out-degree; degree; betweenness; eigenvector centrality; closeness centrality [9], [15], [17], [14], [16] Geographic Networks…”
Section: Community Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Malware programs such as Conficker and Kraken, which have caused considerable worldwide damage, implement DGAs as one aspect of their capabilities. Moreover, researchers have found improper codes embedded in websites and web-based advertisements that are designed to promote the spread of such malware programs over broad target areas [15,16].…”
Section: Dga Malwarementioning
confidence: 99%
“…Malware programs such as Conficker and Kraken, which have caused considerable worldwide damage, implement DGAs as one aspect of their capabilities. Moreover, researchers have found improper codes embedded in websites and web-based advertisements that are designed to promote the spread of such malware programs over broad target areas [11], [12]. Figure 1 schematically depicts callbacks implemented by DGA malware.…”
Section: A Dga Malwarementioning
confidence: 99%