scholarly journals Dynamical analysis and control strategies on malware propagation model

2013 ◽  
Vol 37 (16-17) ◽  
pp. 8225-8236 ◽  
Author(s):  
Liping Feng ◽  
Xiaofeng Liao ◽  
Qi Han ◽  
Huaqing Li
2013 ◽  
Vol 2013 ◽  
pp. 1-13 ◽  
Author(s):  
Yihong Li ◽  
Jinxiao Pan ◽  
Lipeng Song ◽  
Zhen Jin

Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability of the computer and play an important role in the spread of worm. In this paper, in order to characterize the impacts of adaptive user protection behaviors, an improved SIS model is proposed to describe the Internet worm propagation. The results of theoretical analysis indicate that the protective campaigns of users can indeed reduce the worm’s reproduction number to values less than one. But it may not be sufficient to eradicate the worm. In certain condition, a backward bifurcation leading to bistability can occur. These are new findings in the worm propagation model that bring new challenges to control the spread of the worm and further demonstrate the importance of user behaviors in controlling the worm propagation. Corresponding to the analysis results, defense and control strategies are provided.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Qian Zhang ◽  
Xianyong Li ◽  
Yajun Du ◽  
Jian Zhu

Due to the inequality of users’ (nodes’) status and the influence of external forces in the progress of the information propagation in a social network, the infected nodes hold different levels of propagation capacity. For this reason, the infected nodes are classified into two categories: the high influential infected nodes and the ordinary influential infected nodes which separately account for 20% and 80% by Pareto’s principle. By borrowing the SEIR epidemic model, this paper proposes an SE2IR information propagation model. Meanwhile, the global asymptotical stabilities of the spread-free equilibrium point and local spread equilibrium point are proved for this model. This paper also puts forward a series of information control strategies including perceived values of users, social reinforcement intensity, and information timeliness in the social network. Through simulation experiments without or with control strategies on a real company e-mail network dataset, this paper verifies the stability and correctness of the model and the feasibility and effectiveness of the control strategies in the information propagation process, presenting that the model is closer to the real process of the information propagation in the social network.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Qing Yan ◽  
Lipeng Song ◽  
Chenlu Zhang ◽  
Jing Li ◽  
Shanshan Feng

Wireless Internet of Things (IoT) devices densely populate our daily life, but also attract many attackers to attack them. In this paper, we propose a new Heterogeneous Susceptible-Exposed-Infected-Recovered (HSEIR) epidemic model to characterize the effect of heterogeneity of infected wireless IoT devices on malware spreading. Based on the proposed model, we obtain the basic reproduction number, which represents the threshold value of diffusion and governs that the malware is diffusion or not. Also, we derive the malware propagation scale under different cases. These analyses provide theoretical guidance for the application of defense techniques. Numerical simulations validated the correctness and effectiveness of theoretical results. Then, by using Pontryagin’s Minimum Principle, optimal control strategy is proposed to seek time-varying cost-effective solutions against malware outbreaks. More numerical results also showed that some control strategies, such as quarantine and vaccination, should be taken at the beginning of the malware outbreak immediately and become less necessary after a certain period. However, the repairing and fixing strategy, for example applying antivirus patches, would be keep on going constantly.


2015 ◽  
Vol 36 (3) ◽  
pp. 1333-1348 ◽  
Author(s):  
Steady Mushayabasa ◽  
Theresia Marijani ◽  
Mhosisi Masocha

Sign in / Sign up

Export Citation Format

Share Document