Exploring the Dynamics of a Malware Propagation Model and Its Control Strategy

Author(s):  
Sangeeta Kumari ◽  
Ranjit Kumar Upadhyay
2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
José Roberto C. Piqueira ◽  
Cristiane M. Batistela

As the beginning of the 21st century was marked by a strong development in data science and, consequently, in computer networks, models for designing preventive actions against intruding, data stealing, and destruction became mandatory. Following this line, several types of epidemiological models have been developed and improved, considering different operational approaches. The development of the research line using traditional SIR(Susceptible, Infected, Removed) model for data networks started in the 1990s. In 2005, an epidemiological compartmental model containing antidotal nodes, SIRA (Susceptible, Infected, Removed, Antidotal), was introduced to study how the antivirus policies affect the network reliability. The idea here is to study the consequence of quarantine actions in a network by modifying the SIRA model, introducing quarantine nodes generating the SIQRA (Susceptible, Infected, Quarantine, Removed, Antidotal) model. Analytical and numerical approaches result in parameter conditions for the existence and stability of disease-free and endemic equilibrium points for two different cases: saturation and nonsaturation of the quarantine population block. Based on these results, operational actions can be planned to improve the network reliability.


2013 ◽  
Vol 860-863 ◽  
pp. 2750-2753
Author(s):  
Ya Qin Fan ◽  
Xin Zhang ◽  
Xin Yu Chen ◽  
Chi Li

In order to defense malicious codes increasing serious infestations actively. We proposed several corresponding malicious code found and detection technology on the basis of malware propagation principle. We use MATLAB simulation software to achieve the malware propagation model and detection technology. We proved the practicability of the discovery technology, and present improved methods for the deficiency of the model.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Qingyi Zhu ◽  
Xuhang Luo ◽  
Yuhang Liu

By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. Through qualitative analysis, the basic reproductive number R 0 is given. Furthermore, it is proved that the virus-free equilibrium is globally asymptotically stable if R 0 is less than one, whereas the viral equilibrium is globally asymptotically stable if R 0 is greater than one. Then, some numerical examples are given to demonstrate the analytical results. Finally, we put forward some efficient control measures according to the theoretical and experimental analysis.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-10 ◽  
Author(s):  
Da-Wen Huang ◽  
Lu-Xing Yang ◽  
Xiaofan Yang ◽  
Xiang Zhong ◽  
Yuan Yan Tang

To cope with evolving computer viruses, antivirus programs must be periodically updated. Due to the limited network bandwidth, new virus patches are typically injected into a small subset of network nodes and then forwarded to the remaining nodes. A static patching strategy consists of a fixed patch injection rate and a fixed patch forwarding rate. This paper focuses on evaluating the performance of a static patching strategy. First, we introduce a novel autonomous node-level virus-patch propagation model to characterize the effect of a static patching strategy. Second, we show that the model is globally attracting, implying that regardless of the initial expected state of the network, the expected fraction of the infected nodes converges to the same value. Therefore, we use the asymptotic expected fraction of the infected nodes as the measure of performance of a static patching strategy. On this basis, we evaluate the performances of a few static patching strategies. Finally, we examine the influences of a few parameters on the performance of a static patching strategy. Our findings provide a significant guidance for restraining malware propagation.


Sign in / Sign up

Export Citation Format

Share Document