Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Life Cycle Pattern Study of Malicious Codes

Life Cycle Pattern Study of Malicious Codes
View Sample PDF
Author(s): June C. Wei (University of West Florida, USA), Randall Reid (University of West Florida, USA) and Hongmei Zhang (University of South Carolina, USA)
Copyright: 2011
Pages: 16
Source title: Pervasive Information Security and Privacy Developments: Trends and Advancements
Source Author(s)/Editor(s): Hamid Nemati (The University of North Carolina at Greensboro, USA)
DOI: 10.4018/978-1-61692-000-5.ch014


View Life Cycle Pattern Study of Malicious Codes on the publisher's website for pricing and purchasing information.


This chapter investigates the patterns of malicious code attacks based on monthly data of the top 10 virus shares from 1998 to 2005. Three parameters were identified for study, overall pattern of the attack, the number reentries into the top 10 most prevalent attacks, and the maximum percentage share. The dataset was validated by comparing it to an independent dataset that measured the same parameters for a subset of the period of the primary dataset. The effects of malicious code that started before or disappeared outside the collection period were found to not have a significant effect. A multivariate regression analysis showed that the number of entries and the maximum share had a strong relationship with the visible life span. Multivariate cluster analysis was conducted on the reentry parameters and yielded six virus clusters classifications. The high impact viruses, 43 of the 230, are identified and further grouped.

Related Content

. © 2021. 31 pages.
. © 2021. 23 pages.
. © 2021. 20 pages.
. © 2021. 29 pages.
. © 2021. 27 pages.
. © 2021. 20 pages.
. © 2021. 20 pages.
Body Bottom