T. Spyridopoulos, G. Oikonomou, T. Tryfonas, M. Ge

Abstract:
Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease spread in human populations. In this work, we utilise game theory in order to extend two very commonly used malware spread models (SIS and SIR) by incorporating defence strategies against malware proliferation. We consider three different security mechanisms, ``patch'', ``removal'' and ``patch and removal'' on which our model is based. We also propose a cost-benefit model that describes optimal strategies the defender could follow when cost is taken into account. Lastly, as a way of illustration, we apply our models on the well studied Code-Red worm.
Reference:
T. Spyridopoulos, G. Oikonomou, T. Tryfonas, M. Ge, "Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention", in Proc. 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, pp. 28-41, 2013
Bibtex Entry:
@INPROCEEDINGS{Spyridopoulos-2013-2-sec,
	author = {Theodoros Spyridopoulos and George Oikonomou and Theo Tryfonas and Mengmeng Ge},
	title = {Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention},
	booktitle = {Proc. 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference},
	year = {2013},
	month = {July},
	pages = {28--41},
	publisher = {Springer},
	doi = {10.1007/978-3-642-39218-4_3},
	url = {http://link.springer.com/chapter/10.1007/978-3-642-39218-4_3},
	gsid = {17494868145662175539},
	abstract = {Many existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease spread in human populations. In this work, we utilise game theory in order to extend two very commonly used malware spread models (SIS and SIR) by incorporating defence strategies against malware proliferation. We consider three different security mechanisms, ``patch'', ``removal'' and ``patch and removal'' on which our model is based. We also propose a cost-benefit model that describes  optimal strategies the defender could follow when cost is taken into account. Lastly, as a way of illustration, we apply our models on the well studied Code-Red worm.}
}

Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention