MASFMMS: Multi Agent Systems Framework for Malware Modeling and Simulation

  • Rohan Monga
  • Kamalakar Karlapalem
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5269)


The Internet and local area networks, which connect many personal computers, are also facilitating the proliferation of malicious programs. Modern malware takes advantage of network services like e-mail and file sharing to proliferate. Existing simulation environments use biological models or their variants for explaining the patterns of proliferation of malicious programs. This paper aims to provide a framework that enables the modeling of security threats using multi agent systems. Multi Agent Systems Framework for Malware Modeling and Simulation (MASFMMS) provides a generic environment for modeling security weaknesses and their exploitation in a computer network. We present various scenarios of exploits that are prevalent in real life and show how they can be simulated in MASFMMS.


Multi Agent System Trojan Horse Security Software Message Queue Security Weakness 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    CERT Coordination Center,
  2. 2.
  3. 3.
    Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: 11th Usenix Security Symposium, San Francisco (August 2002)Google Scholar
  4. 4.
    Frauenthal, J.C.: Mathematical Modeling in Epidemiology. Springer, New York (1980)zbMATHGoogle Scholar
  5. 5.
    Zou, C.C., Gao, L., Gong, W.: Monitoring and early warning for internet wormsGoogle Scholar
  6. 6.
  7. 7.
    Skaggs, B., Blackburn, B., Manes, G., et al.: Network vulnerability analysis. In: Proceedings of Wales E., Vulnerability assessment tools. Network Security, vol. 2003(7), pp. 15–17 (July 2003)Google Scholar
  8. 8.
    Steel, P.: The Nature of Procrastination: A Meta-Analytic and Theoretical Review of Quintessential Self-Regulatory Failure. Psychological Bulletin (2007)Google Scholar
  9. 9.
    Chen, Z., Gao, L., Kwiat, K.: Modeling the Spread of Active Worms. In: IEEE INFOCOM (2003)Google Scholar
  10. 10.
    Zou, C.C., Towsley, D., Gong, W.: Email Worm Modeling and Defense. In: 13th International Conference on Computer Communications and Networks (ICCCN 2004), Chicago, October 11-13 (2004)Google Scholar
  11. 11.
    Weaver, N.C.: Warhol worms: the potential for very fast Internet plagues (August 2001)Google Scholar
  12. 12.
    Nachenberg, C.: The Evolving Virus Threat. In: 23rd NISSC Proceedings, Baltimore, Maryland (2000)Google Scholar
  13. 13.
    Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM workshop on Rapid malcode, Washington, DC, USA, October 27 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Rohan Monga
    • 1
  • Kamalakar Karlapalem
    • 1
  1. 1.International Institute of Information Technology 

Personalised recommendations