The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Life Cycle Pattern Study of Malicious Codes
Abstract
This chapter investigates the patterns of malicious code attacks based on monthly data of the top 10 virus shares from 1998 to 2005. Three parameters were identified for study, overall pattern of the attack, the number reentries into the top 10 most prevalent attacks, and the maximum percentage share. The dataset was validated by comparing it to an independent dataset that measured the same parameters for a subset of the period of the primary dataset. The effects of malicious code that started before or disappeared outside the collection period were found to not have a significant effect. A multivariate regression analysis showed that the number of entries and the maximum share had a strong relationship with the visible life span. Multivariate cluster analysis was conducted on the reentry parameters and yielded six virus clusters classifications. The high impact viruses, 43 of the 230, are identified and further grouped.
Related Content
Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar.
© 2025.
30 pages.
|
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala.
© 2025.
28 pages.
|
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh.
© 2025.
20 pages.
|
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian.
© 2025.
28 pages.
|
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain.
© 2025.
28 pages.
|
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur.
© 2025.
22 pages.
|
Djamel Saba, Abdelkader Hadidi.
© 2025.
28 pages.
|
|
|