In a method for tracking carrier documents containing an encapsulated software module, a model is created from a directed graph. The nodes of the directed graph include a plurality of computer clusters each having at least one computer, and the arcs of the directed graph represent the transfer paths of carrier documents. The time of day and location of the nodes are used to establish expected traffic values. Expected traffic values are compared to actual traffic values in order to determine inappropriate traffic and to extract transfer paths of interest that may be transferring a carrier document containing an encapsulated software module. Notices regarding the propagation of an undesirable carrier document containing an encapsulated software module are issued, or preventative steps, such as blocking messages from certain nodes and transfer paths, may be implemented to prevent further dissemination of the undesirable carrier documents. The method also permits extrapolations and models of future threats, in order to predict the way carrier documents may be propagated in the future.
Lexington Elementary School Lexington SC 1985-1990, Lexington Intermediate School Lexington SC 1990-1992, Lexington Middle School Lexington SC 1992-1995, Rosman High School Rosman NC 1996-1996
Community:
Courtney Hagins, Andrea Hand, April Corley, Mary Elkin, Ashley Ball, Wendy Hewett