scholarly journals MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Isabella Martínez Martínez ◽  
Andrés Florián Quitián ◽  
Daniel Díaz-López ◽  
Pantaleone Nespoli ◽  
Félix Gómez Mármol

Over the last few decades, the Internet has brought about a myriad of benefits to almost every aspect of our daily lives. However, malware attacks have also widely proliferated, mainly aiming at legitimate network users, resulting in millions of dollars in damages if proper protection and response measures are not settled and enforced. In this context, the paper at hand proposes MalSEIRS, a novel dynamic model, to predict malware distribution in a network based on the SEIRS epidemiological model. As a result, the time-dependent rates of infection, recovery, and loss of immunity enable us to capture the complex dynamism of malware spreading behavior, which is influenced by a variety of external circumstances. In addition, we describe both offensive and defensive techniques, based on the proposed MalSEIRS model, through extensive experimentation, as well as disclosing real-life malware campaigns that can be better understood by using the suggested model.

Author(s):  
Eralda Caushaj ◽  
Huirong Fu ◽  
Ishwar Sethi ◽  
Haissam Badih ◽  
Dion Watson ◽  
...  

The importance of wireless cellular communication in our daily lives has grown considerably in the last decade. The smartphones are widely used nowadays, besides voice communication; the authors routinely use them to access the internet, conduct monetary transactions, send text messages and query a lot of useful information regarding the location of specific places of interest. The use of smartphones in their day-to-day communication raises many unresolved security and privacy issues. In this paper they identify relevant security attacks in Wireless Cellular Network. The authors conduct experiments in four different platforms such as Iphone, Android, Windows and Blackberry. The packets captured through Wireshark for approximately 24 minutes, giving them a lot of information regarding security and privacy issues involving the users. A lot of useful apps installed and used by the end-users have serious issues in terms of privacy and the information exposed. Which is the better platform comparing all four and what exactly do they expose from the user’s information? What are the threats and countermeasures that the users should be aware of? The aim of the authors’ paper is to give answers to the above questions based on the data captured by conducting real-life scenarios.


Author(s):  
Tamara Vázquez-Barrio ◽  
Teresa Torrecillas-Lacave ◽  
Rebeca Suárez-Álvarez

Traditional television coexists with formats that originated on the internet, as well as on-demand consumption, paid television, and other audio-visual content distribution platforms. Audience data reveal a steady decline in television viewership, and digital technologies now allow any citizen to produce audio-visual content and distribute it for mass consumption through the internet. Given this new audio-visual ecosystem, the aim of this research is to ascertain whether there are any signs of a crisis regarding the dominance of television as a means of disseminating the products of the culture industry. Disinterest or indifference toward conventional programming by users would reveal a danger to the broadcast industry. In contrast, the consumption of television products through other channels would imply the retention of television audiences through the internet. This study analyzes perceptions regarding television through five online discussion groups. Three conclusions can be drawn: Firstly, television holds a prominent place in the daily lives of those who use it, including the youngest participants, despite the fact that audiences have declined in recent years. The second conclusion states that the perception of television is positive and associated with disengagement, relaxation, and family gatherings, which can be combined with individual consumption at other times of the day. As a third conclusion, this study reveals the high degree of compatibility between the internet and television screens, as new forms of consumption are emerging, yet there is still a predominant interest in content on television and from the mass culture industry. Resumen La televisión tradicional convive con formatos originados en internet, con el consumo bajo demanda, con la televisión de pago y con otras plataformas de distribución de contenido audiovisual. Los datos de audiencias muestran un descenso continuado de telespectadores y las tecnologías digitales permiten a cualquier ciudadano producir contenidos audiovisuales y distribuirlos para el consumo masivo a través de la Red. Ante este nuevo ecosistema audiovisual, el objetivo de esta investigación es comprobar si se pueden advertir signos de una crisis de la supremacía del televisor como medio de difusión de industria cultural. El desapego o indiferencia de los usuarios hacia la programación convencional evidenciaría un peligro para la televisión. Al contrario, el consumo de productos televisivos a través de otras pantallas implicaría el mantenimiento de las audiencias televisivas a través de internet. La investigación analiza las percepciones sobre la televisión mediante cinco grupos de discusión online. Se extraen tres conclusiones. La primera, que la televisión ocupa una posición relevante en la cotidianeidad de los participantes, incluidos los más jóvenes, a pesar de que las audiencias han descendido en los últimos años. La segunda, que la percepción sobre la televisión es positiva y se asocia a la desconexión, el relax y a un momento de reunión familiar compaginable con consumos individualizados en otros momentos del día. Tercera, el estudio demuestra el alto grado de compatibilidad entre internet y la pantalla del televisor porque surgen nuevas formas de consumo, pero se mantiene un interés predominante por los contenidos televisivos y de la gran industria cultural.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Cruyt Ellen ◽  
De Vriendt Patricia ◽  
De Letter Miet ◽  
Vlerick Peter ◽  
Calders Patrick ◽  
...  

Abstract Background The spread of COVID-19 has affected people’s daily lives, and the lockdown may have led to a disruption of daily activities and a decrease of people’s mental health. Aim To identify correlates of adults’ mental health during the COVID-19 lockdown in Belgium and to assess the role of meaningful activities in particular. Methods A cross-sectional web survey for assessing mental health (General Health Questionnaire), resilience (Connor-Davidson Resilience Scale), meaning in activities (Engagement in Meaningful Activities Survey), and demographics was conducted during the first Belgian lockdown between April 24 and May 4, 2020. The lockdown consisted of closing schools, non-essential shops, and recreational settings, employees worked from home or were technically unemployed, and it was forbidden to undertake social activities. Every adult who had access to the internet and lived in Belgium could participate in the survey; respondents were recruited online through social media and e-mails. Hierarchical linear regression was used to identify key correlates. Results Participants (N = 1781) reported low mental health (M = 14.85/36). In total, 42.4% of the variance in mental health could be explained by variables such as gender, having children, living space, marital status, health condition, and resilience (β = −.33). Loss of meaningful activities was strongly related to mental health (β = −.36) and explained 9% incremental variance (R2 change = .092, p < .001) above control variables. Conclusions The extent of performing meaningful activities during the COVID-19 lockdown in Belgium was positively related to adults’ mental health. Insights from this study can be taken into account during future lockdown measures in case of pandemics.


2008 ◽  
Vol 2008 ◽  
pp. 1-9 ◽  
Author(s):  
Peter Quax ◽  
Jeroen Dierckx ◽  
Bart Cornelissen ◽  
Wim Lamotte

The explosive growth of the number of applications based on networked virtual environment technology, both games and virtual communities, shows that these types of applications have become commonplace in a short period of time. However, from a research point of view, the inherent weaknesses in their architectures are quickly exposed. The Architecture for Large-Scale Virtual Interactive Communities (ALVICs) was originally developed to serve as a generic framework to deploy networked virtual environment applications on the Internet. While it has been shown to effectively scale to the numbers originally put forward, our findings have shown that, on a real-life network, such as the Internet, several drawbacks will not be overcome in the near future. It is, therefore, that we have recently started with the development of ALVIC-NG, which, while incorporating the findings from our previous research, makes several improvements on the original version, making it suitable for deployment on the Internet as it exists today.


Author(s):  
Michel Mandjes ◽  
Birgit Sollie

AbstractThis paper considers a continuous-time quasi birth-death (qbd) process, which informally can be seen as a birth-death process of which the parameters are modulated by an external continuous-time Markov chain. The aim is to numerically approximate the time-dependent distribution of the resulting bivariate Markov process in an accurate and efficient way. An approach based on the Erlangization principle is proposed and formally justified. Its performance is investigated and compared with two existing approaches: one based on numerical evaluation of the matrix exponential underlying the qbd process, and one based on the uniformization technique. It is shown that in many settings the approach based on Erlangization is faster than the other approaches, while still being highly accurate. In the last part of the paper, we demonstrate the use of the developed technique in the context of the evaluation of the likelihood pertaining to a time series, which can then be optimized over its parameters to obtain the maximum likelihood estimator. More specifically, through a series of examples with simulated and real-life data, we show how it can be deployed in model selection problems that involve the choice between a qbd and its non-modulated counterpart.


2021 ◽  
pp. 254-267
Author(s):  
John Royce

Good readers evaluate as they go along, open to triggers and alarms which warn that something is not quite right, or that something has not been understood. Evaluation is a vital component of information literacy, a keystone for reading with understanding. It is also a complex, complicated process. Failure to evaluate well may prove expensive. The nature and amount of information on the Internet make evaluation skills ever more necessary. Looking at research studies in reading and in evaluation, real-life problems are suggested for teaching, modelling and discussion, to bring greater awareness to good, and to less good, readers.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


The article analyzes different approaches to the definition of «social networks» as technological complexes of organization and management of electronic information exchange among the subjects of social relations, united by common interests, information needs and skills. Based on the analysis of the scientific literature the essential characteristics of social networks that affect the formation and development of the adolescent's personality are revealed. Role of social networks at the present stage of development of society, which is manifested in the representation of interests not only of social groups but also of entire social groups, is defined in the article. The negative impact of social networks on the personality of the adolescent, which is manifested in the expansion of adolescents in cyberspace, the desire for independence and adulthood, selfexperimentation, which leads to risky activities both on the Internet and in real life are revealed. Concept of safe behavior in social networks as a set of actions of the individual when using the Internet, helping to meet the needs and at the same time prevent the possibility of causing damage to physical, mental, social well-being and property of man and others is analyzed. The basic rules of safe behavior in social Internet communities are highlighted. The structural components of safe behavior of adolescents in social networks are singled out: cognitive, motivational and actionreflexive; the concept of «professional training of future social professionals for the formation of safe behavior of adolescents in social networks» is revealed. Readiness is revealed as a result of the process of training future social specialists for professional activity on the formation of safe behavior of adolescents in social networks; the author's definition of the concept «readiness of future social professionals to form safe behavior of adolescents in social networks» is given. Components of readiness of future social workers to form safe behavior of teenagers in social networks, such as cognitive, motivational-personal and activity, are described.


2014 ◽  
Vol 52 ◽  
Author(s):  
Noluxolo Kortjan ◽  
Rossouw Von Solms

The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA) in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.


Sign in / Sign up

Export Citation Format

Share Document