scholarly journals Malware propagation model for cluster-based wireless sensor networks using epidemiological theory

2021 ◽  
Vol 7 ◽  
pp. e728
Author(s):  
Xuejin Zhu ◽  
Jie Huang

Due to limited resources, wireless sensor network (WSN) nodes generally possess weak defense capabilities and are often the target of malware attacks. Attackers can capture or infect specific sensor nodes and propagate malware to other sensor nodes in WSNs through node communication. This can eventually infect an entire network system and even cause paralysis. Based on epidemiological theory, the present study proposes a malware propagation model suitable for cluster-based WSNs to analyze the propagation dynamic of malware. The model focuses on the data-transmission characteristics between different nodes in a cluster-based network and considers the actual application parameters of WSNs, such as node communication radius, node distributed density, and node death rate. In addition, an attack and defense game between malware and defending systems is also established, and the infection and recovery rates of malware propagation under the mixed strategy Nash equilibrium condition are given. In particular, the basic reproductive number, equilibrium point, and stability of the model are derived. These studies revealed that a basic reproductive number of less than 1 leads to eventual disappearance of malware, which provides significant insight into the design of defense strategies against malware threats. Numerical experiments were conducted to validate the theory proposed, and the influence of WSN parameters on malware propagation was examined.

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Qingyi Zhu ◽  
Xuhang Luo ◽  
Yuhang Liu

By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. Through qualitative analysis, the basic reproductive number R 0 is given. Furthermore, it is proved that the virus-free equilibrium is globally asymptotically stable if R 0 is less than one, whereas the viral equilibrium is globally asymptotically stable if R 0 is greater than one. Then, some numerical examples are given to demonstrate the analytical results. Finally, we put forward some efficient control measures according to the theoretical and experimental analysis.


Mathematics ◽  
2020 ◽  
Vol 8 (9) ◽  
pp. 1518
Author(s):  
Jose Diamantino Hernández Guillén ◽  
Ángel Martín del Rey ◽  
Roberto Casado Vara

An important way considered to control malware epidemic processes is to take into account security measures that are associated to the systems of ordinary differential equations that governs the dynamics of such systems. We can observe two types of control measures: the analysis of the basic reproductive number and the study of control measure functions. The first one is taken at the beginning of the epidemic process and, therefore, we can consider this to be a prevention measure. The second one is taken during the epidemic process. In this work, we use the theory of optimal control that is associated to systems of ordinary equations in order to find a new function to control malware epidemic through time. Specifically, this approach is evaluate on a particular compartmental malware model that considers carrier devices.


2020 ◽  
Vol 17 (5) ◽  
pp. 2125-2129
Author(s):  
G. Maria Jones ◽  
S. Godfrey Winster

The evolution of mobile devices technology has no longer novelty but the usage of the device has been different from persons to persons with variety of purposes. Due to their compatibility in size and portability, the smart devices are prone to attack. Once a single node of the mobile network is attacked, it can compromise the entire network. In this paper, a study of malware attacking behavior is done and used fractional discrete model to analysis the attacking and spreading behavior of possible malware in mobile environment is examined. The mobile malware propagation model is analyzed, and investigated using the stability theory and also proposed a model S (Susceptible state), L (Latent state) and B (Breaking state). Here, basic reproductive number helps to analysis the malware propagation which helps us to find the threshold values. If the reproduction number is less than one, then the malware free equilibrium state is locally asymptotically stable. Endemic equilibrium state is globally asymptotically stable if reproductive number greater than one. Numerical illustrations assure the consistency of the theoretical analysis and interesting dynamical behavior of the system is observed.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Xiaojing Zhong ◽  
Baihao Peng ◽  
Feiqi Deng ◽  
Guiyun Liu

In this paper, we propose a novel heterogeneous model to describe the propagation dynamics of malware (viruses, worms, Trojan horses, etc.) in wireless sensor networks. Our model takes into consideration different battery-level sensor nodes contrary to existing models. In order to control the spread of malware, we design an aperiodically intermittent controller driven by white noise, which has striking advantages of lower cost and more flexible control strategy. We give a distinct condition on stability in probability one using graph-theoretical Lyapunov function and stochastic analysis method. Our results show that the nonlinear malware propagation system can be stabilized by intermittent stochastic perturbation under the intermittent time related to stochastic perturbation intensity. Our theoretical results can be applied to understand the observed mechanisms of malware and design interventions to control the spread of malware. Numerical simulations illustrate our analytical results clearly.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Dilara Acarali ◽  
Muttukrishnan Rajarajan ◽  
Nikos Komninos ◽  
B. B. Zarpelão

The propagation approach of a botnet largely dictates its formation, establishing a foundation of bots for future exploitation. The chosen propagation method determines the attack surface and, consequently, the degree of network penetration, as well as the overall size and the eventual attack potency. It is therefore essential to understand propagation behaviours and influential factors in order to better secure vulnerable systems. Whilst botnet propagation is generally well studied, newer technologies like IoT have unique characteristics which are yet to be thoroughly explored. In this paper, we apply the principles of epidemic modelling to IoT networks consisting of wireless sensor nodes. We build IoT-SIS, a novel propagation model which considers the impact of IoT-specific characteristics like limited processing power, energy restrictions, and node density on the formation of a botnet. Focusing on worm-based propagation, this model is used to explore the dynamics of spread using numerical simulations and the Monte Carlo method to discuss the real-life implications of our findings.


Author(s):  
Zhou Xiaodan ◽  
Qiu Liqing ◽  
Hao Tingyu

Rumors, as a typical social phenomenon in real life, have a negative impact on the harmony of the society. When people hear rumors, they may not resonate with rumors because they do not trust them during the process of rumors transmission. Thus, they will not spread rumors. The essential difference between chord mechanism and spreader mechanism is that spreaders will spread regardless of whether they think it is true or false. The chord needs to believe that the rumor is true in order to keep spreading it, otherwise they become immune to spreading it. Therefore, this paper proposes a new Spreader-Chord-Ignorant-Restorer (SCIR) model, which considers that the trust may affect the level of empathy. Since the level of trust affects the spread of rumors and the extent to which the immune person trusts the rumor is different, the connecting edges from the restorer to the chord and the restorer to the ignorant were added to the model. First, the basic reproductive number [Formula: see text] is derived by the next generation matrix method and thus equilibriums are obtained. Then, the global stability of the rumor-free equilibrium [Formula: see text] and the persistence of rumor propagation are proved in detail during the theoretical analysis.


2013 ◽  
Vol 9 (1) ◽  
pp. 74
Author(s):  
Hakan Koyuncu ◽  
Ahmet Çevik

Jennic type wireless sensor nodes are utilized together with a novel particle filtering technique for indoor localization. Target objects are localized with an accuracy of around 0.25 meters. The proposed technique introduces a new particle generation and distribution technique to improve current estimation of object positions. Particles are randomly distributed around the object in the sensing area within a circular strip of 2 STD of object distance measurements. Particle locations are related to object locations by using Gaussian weight distribution methods. Object distances from the transmitters are determined by using received RSSI values and ITU-R indoor propagation model. Measured object distances are used together with the particle distances from the transmitters to predict the object locations.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Liping Feng ◽  
Lipeng Song ◽  
Qingshan Zhao ◽  
Hongbin Wang

An improved SIRS model considering communication radius and distributed density of nodes is proposed. The proposed model captures both the spatial and temporal dynamics of worms spread process. Using differential dynamical theories, we investigate dynamics of worm propagation to time in wireless sensor networks (WSNs). Reproductive number which determines global dynamics of worm propagation in WSNs is obtained. Equilibriums and their stabilities are also found. If reproductive number is less than one, the infected fraction of the sensor nodes disappears and if the reproduction number is greater than one, the infected fraction asymptotically stabilizes at the endemic equilibrium. Based on the reproduction number, we discuss the threshold of worm propagation about communication radius and distributed density of nodes in WSNs. Finally, numerical simulations verify the correctness of theoretical analysis.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 123
Author(s):  
Guiyun Liu ◽  
Baihao Peng ◽  
Xiaojing Zhong

With the development of wireless rechargeable sensor networks (WRSNs ), security issues of WRSNs have attracted more attention from scholars around the world. In this paper, a novel epidemic model, SILS(Susceptible, Infected, Low-energy, Susceptible), considering the removal, charging and reinfection process of WRSNs is proposed. Subsequently, the local and global stabilities of disease-free and epidemic equilibrium points are analyzed and simulated after obtaining the basic reproductive number R0. Detailedly, the simulations further reveal the unique characteristics of SILS when it tends to being stable, and the relationship between the charging rate and R0. Furthermore, the attack-defense game between malware and WRSNs is constructed and the optimal strategies of both players are obtained. Consequently, in the case of R0<1 and R0>1, the validity of the optimal strategies is verified by comparing with the non-optimal control group in the evolution of sensor nodes and accumulated cost.


Sign in / Sign up

Export Citation Format

Share Document