All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Swarm Virus, Evolution, Behavior and Networking

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F18%3A10241924" target="_blank" >RIV/61989100:27240/18:10241924 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/18:10241924

  • Result on the web

    <a href="https://link.springer.com/chapter/10.1007/978-3-662-55663-4_11" target="_blank" >https://link.springer.com/chapter/10.1007/978-3-662-55663-4_11</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Swarm Virus, Evolution, Behavior and Networking

  • Original language description

    In this chapter we would like to outline how behavior of malicious software, i.e. computer virus can be connected with evolution and visualization of its spreading as the network. The approach presented here is not based on single classical virus spreading, but more on hypothetical swarm virus and its dynamics of spread in PC. The latest development of virus code shows, that CnC technology (command and control) has been used as in the case of Stuxnet virus or Botnet malware. It is logical to expect that development of the viral code will never stop at this level, but will continue up to viruses that will evolve according to the Darwinian theory of evolution and will mimic swarm in the nature, such as the swarm algorithms already do. The aim of our research is not developing a swarm virus, but using its expectable behavior we show that its dynamics can be then modeled as the network structure and thus likely controlled and stopped, as our experiments in the first part of this book suggest. The same methodology can be used not only in laboratory conditions on a single PC, but also on virus spreading over the network or Internet, if real data is available. Ideas and results of this chapter were also presented on Post Graduation in Cyber Security and Ciberdefense, Multinational Cyber Defence Education and Training Project, NATO Smart Defence Project, Lisbon 2017.

  • Czech name

  • Czech description

Classification

  • Type

    C - Chapter in a specialist book

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    Result was created during the realization of more than one project. More information in the Projects tab.

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2018

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Book/collection name

    Evolutionary Algorithms, Swarm Dynamics and Complex Networks

  • ISBN

    978-3-662-55661-0

  • Number of pages of the result

    27

  • Pages from-to

    213-239

  • Number of pages of the book

    312

  • Publisher name

    Springer, Berlin, Heidelberg

  • Place of publication

    Germany

  • UT code for WoS chapter