Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
1 / 47
Behavioral Detection and Containment of Proximity Malware in Delay - - PowerPoint PPT Presentation
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks Wei Peng, Feng Li, Xukai Zou, and Jie Wu 1 / 47 Proximity malware Definition. Proximity malware is a malicious program which propagates
1 / 47
2 / 47
3 / 47
4 / 47
5 / 47
6 / 47
7 / 47
8 / 47
9 / 47
10 / 47
11 / 47
12 / 47
13 / 47
14 / 47
15 / 47
16 / 47
N→∞
17 / 47
18 / 47
19 / 47
j (1 − Sj)A−sA
Sj∈[0,1],A=∅
20 / 47
0.0 0.2 0.4 0.6 0.8 1.0 5 10 15 Sj P(Sj A) 1, 3 10, 30 100, 300
21 / 47
Le
22 / 47
0 SsA j (1 − Sj)A−sA)−1 dSj be the (probability) normalization
j (1 − Sj)A−sA dSj
Le
j (1 − Sj)A−sA dSj.
23 / 47
24 / 47
25 / 47
26 / 47
27 / 47
28 / 47
29 / 47
30 / 47
31 / 47
32 / 47
33 / 47
34 / 47
35 / 47
36 / 47
37 / 47
38 / 47
39 / 47
40 / 47
41 / 47
Bayesian 1−robust 2−robust 3−robust 4−robust 5−robust DR FPR (%) 20 40 60 80 100
Bayesian decision with and without the look-ahead extension for Haggle. “Bayesian” shows the vanilla Bayesian decision; “λ-robust” shows λ-robust decision.
42 / 47
Bayesian 1−robust 2−robust 3−robust 4−robust 5−robust DR FPR (%) 20 40 60 80 100
Bayesian decision with and without the look-ahead extension for MIT reality. “Bayesian” shows the vanilla Bayesian decision; “λ-robust” shows λ-robust decision.
43 / 47
44 / 47
none all dogma a dogma b dogma c DR FPR (%) 20 40 60 80 100
Effect of dogmatism δ on Haggle. Look-ahead is 3. “none” takes no indirect evidence; “all” takes all indirect evidence; “dogma” a, b, and c takes a dogmatism of 0.0001, 0.0010, and 0.0100, respectively.
45 / 47
none all dogma a dogma b dogma c DR FPR (%) 20 40 60 80 100
Effect of dogmatism δ on MIT reality. Look-ahead is 3. “none” takes no indirect evidence; “all” takes all indirect evidence; “dogma” a, b, and c takes a dogmatism of 0.0001, 0.0010, and 0.0100, respectively.
46 / 47
47 / 47