Modeling and controlling spatiotemporal malware propagation in mobile Internet of Things

被引:0
|
作者
Cao, Huiying [1 ]
Peng, Da-Tian [2 ]
Yu, Dengxiu [3 ]
机构
[1] Northwestern Polytech Univ, Sch Mech Engn, Xian 710072, Peoples R China
[2] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[3] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware propagation; Cybersecurity; Mobile Internet of Things; Temporal multilayer networks; Optimal control; MULTIPLEX NETWORKS; IMPACT; VIRUS; CENTRALITY; SPREAD;
D O I
10.1016/j.apm.2025.116042
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The mobility of devices in mobile Internet of Things (IoT) enables dynamic interactions, facilitating the spatiotemporal malware propagation. However, few studies have focused on accurately modeling and effectively controlling this form of malware propagation. To address this issue, we propose a theoretical framework that integrates patch-malware spreading dynamics with optimal patch allocation policy. First, we establish a novel temporal multilayer network comprising a central node, a patch dissemination layer, and a malware propagation layer. The hybrid patching process is implemented by the integration of the central node and the patch dissemination layer. In the malware propagation layer, the mobility of IoT devices is modeled as a diffusion process across multiple areas. Next, we design a dynamic spreading model to capture the evolution of malware propagation and analytically derive the invasion threshold. The threshold indicates that malware propagation is significantly influenced by both the patching process and the topological structure of mobile IoT. Furthermore, considering the central host's capacity and patch effectiveness, we develop an optimization algorithm to determine the optimal patch allocation policy under resource constraints. This algorithm significantly outperforms traditional centrality- based methods in malware mitigation. Finally, we analyze the impact of device mobility, the connectivity of the patch dissemination layer, the device distribution, the central node's capacity, and the patch effectiveness on malware propagation. Our study provides a theoretical foundation for predicting and controlling malware spreading in mobile IoT.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things
    Li, Li
    Cui, Jufu
    Zhang, Rui
    Xia, Hui
    Cheng, Xiangguo
    IEEE ACCESS, 2020, 8 : 64184 - 64192
  • [2] Analysis of malware propagation behavior in Social Internet of Things
    Al Kindi, Asma
    Al Abri, Dawood
    Al Maashri, Ahmed
    Bait-Shiginah, Fahad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)
  • [3] Fractional Optimal Control for Malware Propagation in Internet of Underwater Things
    Liu, Guiyun
    Tan, Zhihao
    Liang, Zhongwei
    Chen, Hanjie
    Zhong, Xiaojing
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11632 - 11651
  • [4] Modeling the propagation of mobile malware on complex networks
    Liu, Wanping
    Liu, Chao
    Yang, Zheng
    Liu, Xiaoyang
    Zhang, Yihao
    Wei, Zuxue
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2016, 37 : 249 - 264
  • [5] Modeling and Analysis Botnet Propagation in Social Internet of Things
    Xia, Hui
    Li, Li
    Cheng, Xiangguo
    Cheng, Xiuzhen
    Qiu, Tie
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7470 - 7481
  • [6] Formal Specification for Internet of Things Malware
    Karanja, Evanson Mwangi
    Masupe, Shedden
    Gasennelwe-Jeffrey, Mandu
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 144 - 149
  • [7] MODELLING MALWARE PROPAGATION ON THE INTERNET OF THINGS USING AN AGENT-BASED APPROACH ON COMPLEX NETWORKS
    Mwangi, Karanja
    Masupe, Shedden
    Jeffrey, Mandu
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2020, 6 (01): : 26 - 40
  • [8] Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach
    Tayseer Jafar, Mousa
    Yang, Lu-Xing
    Li, Gang
    Zhu, Qingyi
    Gan, Chenquan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9682 - 9697
  • [9] POSTER: Analyzing Endpoints in the Internet of Things Malware
    Choi, Jinchun
    Anwar, Afsah
    Alasmary, Hisham
    Spaulding, Jeffrey
    Nyang, DaeHun
    Mohaisen, Aziz
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 288 - 289
  • [10] Detecting Internet of Things Malware on Evidence Generation
    Han, YoonSeok
    Seo, HyungBin
    Yoon, MyungKeun
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (22): : 36950 - 36964