Professional Documents
Culture Documents
Abstract: In process of digitalization all of us addicted to use of computer devices. In this situation the computer virus is no
longer potential but real and risky. So in this paper we discussed about how researchers giving more interest in computer virus
compare to Trojan and Worm. Also discussed virus control analysis through mail network, virtual and wireless local area
network. Proposed the mathematical model for computer virus transmission through Kermack and Mckendrick classical
Susceptible-Infected-Susceptible (SIS), Susceptible-Infected-Recovered (SIR) and Susceptible-Exposed-Infected-Recovered
(SEIR).
Keywords - Susceptible, Infected, Recovered, virtual local area network, wireless local area network, computer virus.
I. INTRODUCTION
Increase in population and digitalization have increased the interest in computer virus. A virus is a computer program created to
infect other programs with copies of itself. It has the ability to clone itself, so that it can multiply, constantly seeking new host
environments (McAfee et al, 1989). Since a virus’ goal is to get executed by the computer, it must attach itself to a COM, EXE or
SYS file. (Ludwig , 1996).Mathematical models have been important tools in analyzing the transmission of virus (Roshan and
Smita, 2017). Network analysis is powerful because of its breadth. By abstracting away the details of a problem and mapping it
onto a network, we can describe the important topological features with a clarity that would be impossible were all the details
retained (Newman et al, 2011). The computer virus impacted financial loss. The most damaging virus/worm is ‘MyDoom’ which
caused $38 billion in damages by slowing global Internet access by 10% in 2004, ‘Sasser’ which brought down Delta Airlines and
crashed millions of PCs to cause more than $18 billion in damages in 2008, ‘ILOVEYOU’ which ended up shutting down the US
government’s email servers and causing $15 billion in damages in 2000 (WebFX, 2014). In modern life, human intervention plays
a significant role in preventing the breakout of computer viruses (Yang et al, 2012).
The rest of the paper is organized as follows. Malicious objects details in section II , analysis of malicious objects research
work from different research journals in section III , discussed the computer virus problems in section IV , comparison of computer
virus Vs biological virus in section V, computer virus control methods in section VI , analysis of SIS and SIR model in section VII ,
timeline of computer virus in section VIII and Finally, this paper is summarized by a conclusion.
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 542
© 2019 IJRAR February 2019, Volume 6, Issue 1 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
Figure -1: Analysis of ‘Computer virus’, ‘Computer worm’ and ‘Computer Trojan’ text from research journals.
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 543
© 2019 IJRAR February 2019, Volume 6, Issue 1 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
VI. COMPUTER VIRUS CONTROL METHODS
The Computer virus differs from biological virus on the basis. Here we are going to discuss mail virus, virtual and wireless loan
area network virus control methods.
VIRTUAL LOCAL AREA NETWORK (VLAN) METHOD: It’s easy to share an Internet connection by purchasing a low-cost router
and subscribing a broadband line. As shown in the following Figure-3, all the home computers (PC-A to PC-E), wired or wireless,
share one Internet connection through a Router (Edimax, 1999).
But what if you are a mid-sized enterprise owner and you have 150 employees working with 150 computers. As shown in the
following Figure-4, if you connect all the 150 PCs to the router in a single LAN, the network performance will downgrade to an
intolerable level, and an even worse scenario is the network will totally crash when one PC is affected with virus or malfunctioned
network card.
So the solution is by breaking a large network (150 PCs) into 3 small networks (50 PCs for each). As shown in the Figure-5,
three networks are builded (called VLAN2, VLAN3 and VLAN4 respectively. When one PC of the VLAN4 is affected with virus,
only the PCs in that VLAN4 may be impacted, leaving all the other PCs in the VLAN2 and VLAN3 intact. Simply put, we separate
these 150 PCs into 3 totally different groups (again this is called VLAN, short for Virtual LAN), and when some PCs fall into virus
victims and may endanger others, this damage is contained in that particular VLAN.
VLANs do not necessarily improve performance in and of themselves, but I would say they ensure performance. A quick
example is if some workstation gets a virus/worm/malware that affects the subnet. At least with VLANs you may prevent that from
spreading to your servers. Another example could be a NIC failure or network loop that disrupts the VLAN, but only one VLAN
rather than the entire network (Santiagoberreta, 2019). In order to minimize/prevent the VLAN from computer virus infection we
need to practice below steps (Brian, 2014 ).
1. Subscribe to a good anti-virus protection program and keep it up to date. Some good ones include MacAfee, Norton,
Kaspersky. Keep your anti-virus software up to date. Run regularly scheduled scans with your anti-virus software.
2. Back up your files.
3. Think before you click the websites that provide pirated material. Avoid such suspicious websites.
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 544
© 2019 IJRAR February 2019, Volume 6, Issue 1 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
WIRELESS LOCAL AREA NETWORK ( WLAN) METHOD: Wireless networks are naturally less secure than wired networks. Any
wireless device can attempt to connect to a WLAN, so it is important to limit access to the network if security is a concern. This is
typically done using wireless authentication such as WEP or WPA, which encrypts the communication. Additionally, wireless
networks are more susceptible to interference from other signals or physical barriers, such as concrete walls. Since LANs offer the
highest performance and security, they are still used for many corporate and government networks [Figure-6].
Security controls for WLAN are grouped into three categories: Management, Technical, and Operational controls. Management
controls are security controls that focus on management of risk and information system security (Noor Aida Idris, 2010).
The management needs to understand the objectives, benefits, threats and vulnerabilities, as well as risks, before deciding on the
deployment of a wireless LAN in an organisation. Once the decision is made, the management shall identify strategies and security
controls to prevent any compromise to the wireless LAN. However, the management controls cannot work independently; it should
and usually is complemented by two other aspects: technical and operational. Technical controls are security controls which are
primarily implemented and executed through mechanisms contained in computing related equipments (hardware, software, or
firmware components of the system) . They involve the use of countermeasures or safeguards which are already incorporated into
computing related equipments or wireless devices.
Operational controls are security controls which are primarily implemented and executed by people (as opposed to systems) .
They involve providing security awareness and training to employees, and securing the physical premise which houses the wireless
LAN facilities and/or devices. These controls need to be implemented by organizations continuously throughout the year to ensure
wireless network risks can be identified and mitigated effectively to reduce their impact to organizations. These three security
controls, Management, Technical, and Operational are to be used together not just to mitigate security risks in wireless LANs, but
also to ensure the preservation of confidentiality, availability and integrity of transactions, and data transmitted via wireless LANs.
MAIL VIRUS (𝐌𝐯 ) METHOD: An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by
automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require a
double-click, they launch when you view the infected message in the preview pane of your e-mail software. Example: ILOVEYOU
virus. The virus called “I LOVE YOU” caused over $15 billion loss in productivity as it crippled e-mail systems worldwide
(WebFX, 2014). The chance of contracting one of these computer viruses over the internet has increased dramatically (Yusuf et al,
2017). Some viruses are relatively harmless to individuals. They just attach themselves to outgoing massages or email themselves
to all the contacts that are listed in your address book. As a result, the sudden flood of e-mail overwhelmed mail servers causing the
system to crash.
In a technical report (Towsley et al, 2005) describe a model of e-mail worm propagation. The authors model the Internet e-mail
service as an undirected graph of relationship between people (i.e. if user A has user B’s e-mail address in his address book, B has
probably A’s address in her contacts also). Email viruses install themselves as startup services on the system, and spread
themselves at each opportunity spread rate of viruses gets higher as the variability of users’ e-mail checking times increases.
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 545
© 2019 IJRAR February 2019, Volume 6, Issue 1 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
SIS
The SIS (susceptible-infected-susceptible)disease model can be regarded as one of the simplest virus infection models, in
which nodes in a network is either in two states: “healthy, but susceptible to infection” or “infected by the virus and, thus,
infectious to neighbors” (Daley, 1999 ).
Each individual oscillates between the Susceptible (S) state and the Infectious (I) state. The susceptible individual becomes
infectious at a rate β if it is connected to one or more neighbors. The infectious individual becomes susceptible at a rate γ,
independent of its neighbors. Here at specific time, N represent the total number of network nodes.
Figure -8: Schematic diagram for the flow of virus in SIS model
𝑆 ′ (𝑡) = −𝛽𝑆𝐼 + 𝛾𝐼
𝐼′ (𝑡) = 𝛽𝑆𝐼 − 𝛾𝐼
𝑆(0) = 𝑁 − 𝐼0 , 𝐼(0) = 𝐼0
SIR
SIR (susceptible-infected-recovery) is the extension of SIS model, here R is the number of node recovered/immune from virus.
Figure -9: Schematic diagram for the flow of virus in SIR model
𝑆 ′ (𝑡) = −𝛽𝑆𝐼
𝐼′ (𝑡) = 𝛽𝑆𝐼 − 𝛾𝐼
𝑅′ (𝑡) = 𝛾𝐼
𝑆(0) = 𝑁 − 𝐼0 , 𝐼(0) = 𝐼0 , 𝑅(0) = 0
SEIR
SEIR (Susceptible–Exposed–Infected–Recovered) model that assumes, with a given mathematical probability, a permanent
immunization period related to the recovered hosts, which simply bears no relation to reality (P. Yan and S. Liu, 2006). In this
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 546
© 2019 IJRAR February 2019, Volume 6, Issue 1 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
model the β and γ is same as earlier but here α and µ are new symbols. Here α represent the probability of transmission from
exposed to infect and µ represent the probability of transmission from infected to suspected.
Figure -10: Schematic diagram for the flow of virus in SEIS model
𝑆 ′ (𝑡) = −𝛽𝑆𝐼 + 𝜇𝐼
𝐸 ′ (𝑡) = 𝛽𝑆𝐼 − 𝛼𝐸
𝐼′ (𝑡) = 𝛼𝐸 − (𝜇 + 𝛾)𝐼
𝑅′ (𝑡) = 𝛾𝐼
𝑆(0) = 𝑁 − 𝐼0 , 𝐸(0) = 0, 𝐼(0) = 𝐼0 , 𝑅(0) = 0
The following is a timeline of many of the significant viruses discovered publicly from 1949 to date (Bert, 2018). Not every
virus is listed below, but many of the major outbreaks or changes in virus infection techniques are highlighted.
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 548
© 2019 IJRAR February 2019, Volume 6, Issue 1 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
than 121,000 victims in the United States and 234,000 victims worldwide, paying approximately $30 million in ransom
between Sept. and Dec. 2013.
2014 Backoff: Malware designed to compromise Point-of-Sale (POS) systems to steal credit card data.
2016 Cerber: One of the heavy-hitters in the ransomware sphere. It’s also one of the most prolific crypto-malware threats. At
one point, Microsoft found more enterprise PCs infected with Cerber than any other ransomware family.
2017 WannaCry Ransomware: Exploiting a vulnerability first uncovered by the National Security Agency, the WannaCry
Ransomware brought major computer systems in Russia, China, the UK, and the US to their knees, locking people out
of their data and demanding they pay a ransom or lose everything. The virus affected at least 150 countries, including
hospitals, banks, telecommunications companies, warehouses, and many other industries.
IX. CONCLUSIONS
In process of digitalization we need to ensure the network security from computer virus. Due to this computer virus we faced lot
of financial loss throughout world. From the study we learn the transmission and control of computer virus. Computer and
biological virus having similar characteristics, researcher doing more research on computer virus as compare to worm and Trojan.
SIR model have virus memory function but SIS model have no memory function.
REFERENCES
[1] McAfee, J. and Haynes, C., “Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System”,
pp. 1, St. Martin's Press, 1989.
[2] Mark Ludwig “The little black book of computer virus” page 15, 1996.
[3] Roshan Kumar, Smita Dey, “Analysis of SEIR Model of Ebola Virus through Equilibrium Approach”
DOI:10.15680/IJIRSET.2017.0606001,2017.
[4] Newman, Mark, Albert-Laszlo Barabasi, and Duncan J. Watts, “The structure and dynamics of networks” Princeton
University Press, 2011.
[5] The real cost of computer virus-https://www.webfx.com/blog/internet/cost-of-computer-viruses-infographic/
[6] C. Gan, X. Yang, W. Liu, Q. Zhu and X. Zhang. “Propagation of computer virus under human intervention: a dynamical
model”, Discr. Dyn. Nat. Soc. 2012 ,Article ID 106950, 2012.
[7] Security topic-“The Difference Between a Virus, Worm and Trojan Horse” - Norton secured, 2019.
[8] Karsten Johansson, ‘COMPUTER VIRUSES: The Technology and Evolution of an Artificial Life Form’, 1994.
[9] Wireless development case study-http://www.edimax.com/images/Image/FAQ/General-Q/Edimax-VLAN&Wireless-
Deployment-Case-Study.pdf
[10] Santiagoberreta, “General networking- VLAN or not VLAN”,2019.
[11] Brian Benton, “10 Tips on How to Prevent Malware From Infecting Your Computer—and Your Livelihood”, 2014.
[12] Noor Aida Idris, Mohamad Nizam Kassim, “Wireless Local Area Network (LAN) Security Guideline”, CyberSecurity
Malaysia, 2010.
[13] Yusuf , Onotehinwa and Okon , “Productivity Of Business Enterprises: Effect Of Computer Virus Infection On Files”,
Ijcsmc, Page-184, 2017.
[14] Zou, C.C., Towsley, D., Gong, W., “Email virus propagation modeling and analysis. Technical Report TR-CSE-03-04”,
2005.
[15] Daley DJ, Gani J, “Epidemic modelling: an introduction”, Cambridge University Press, Cambridge, 1999 .
[16] P. Yan and S. Liu. “SEIR epidemic model with delay. J. Aust. Math. Soc. Ser. B, 48(1):119– 134”, 2006.
[17] Bert Rankin, “A Brief History of Malware — Its Evolution and Impact”, 2018.
IJRAR19J2801 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 549