A Comparative Analysis of VirLock and Bacteriophage ϕ6 through the Lens of Game Theory

Author:

Kostadimas Dimitris1ORCID,Kastampolidou Kalliopi1ORCID,Andronikos Theodore1ORCID

Affiliation:

1. Department of Informatics, Ionian University, 7 Tsirigoti Square, 49100 Corfu, Greece

Abstract

The novelty of this paper lies in its perspective, which underscores the fruitful correlation between biological and computer viruses. In the realm of computer science, the study of theoretical concepts often intersects with practical applications. Computer viruses have many common traits with their biological counterparts. Studying their correlation may enhance our perspective and, ultimately, augment our ability to successfully protect our computer systems and data against viruses. Game theory may be an appropriate tool for establishing the link between biological and computer viruses. In this work, we establish correlations between a well-known computer virus, VirLock, with an equally well-studied biological virus, the bacteriophage ϕ6. VirLock is a formidable ransomware that encrypts user files and demands a ransom for data restoration. Drawing a parallel with the biological virus bacteriophage ϕ6, we uncover conceptual links like shared attributes and behaviors, as well as useful insights. Following this line of thought, we suggest efficient strategies based on a game theory perspective, which have the potential to address the infections caused by VirLock, and other viruses with analogous behavior. Moreover, we propose mathematical formulations that integrate real-world variables, providing a means to gauge virus severity and design robust defensive strategies and analytics. This interdisciplinary inquiry, fusing game theory, biology, and computer science, advances our understanding of virus behavior, paving the way for the development of effective countermeasures while presenting an alternative viewpoint. Throughout this theoretical exploration, we contribute to the ongoing discourse on computer virus behavior and stimulate new avenues for addressing digital threats. In particular, the formulas and framework developed in this work can facilitate better risk analysis and assessment, and become useful tools in penetration testing analysis, helping companies and organizations enhance their security.

Publisher

MDPI AG

Reference93 articles.

1. Computer viruses: Theory and experiments;Cohen;Comput. Secur.,1987

2. Kaspersky (2023, October 31). What’s the Difference between a Virus and a Worm?. Available online: https://www.kaspersky.com/resource-center/threats/computer-viruses-vs-worms.

3. Uniserve IT Solutions (2023, October 31). What Are the Different Types of Computer Viruses?. Available online: https://uniserveit.com/blog/what-are-the-different-types-of-computer-viruses.

4. Norton (2023, October 31). What is a Computer Worm, and how Does It Work?. Available online: https://us.norton.com/blog/malware/what-is-a-computer-worm.

5. Taylor, K. (2023, October 31). What Is A Worm Virus?, VIPRE. Available online: https://vipre.com/resources/articles/what-is-a-worm-virus/.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3