Modeling and controlling spatiotemporal malware propagation in mobile Internet of Things

被引:0
|
作者
Cao, Huiying [1 ]
Peng, Da-Tian [2 ]
Yu, Dengxiu [3 ]
机构
[1] Northwestern Polytech Univ, Sch Mech Engn, Xian 710072, Peoples R China
[2] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[3] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware propagation; Cybersecurity; Mobile Internet of Things; Temporal multilayer networks; Optimal control; MULTIPLEX NETWORKS; IMPACT; VIRUS; CENTRALITY; SPREAD;
D O I
10.1016/j.apm.2025.116042
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The mobility of devices in mobile Internet of Things (IoT) enables dynamic interactions, facilitating the spatiotemporal malware propagation. However, few studies have focused on accurately modeling and effectively controlling this form of malware propagation. To address this issue, we propose a theoretical framework that integrates patch-malware spreading dynamics with optimal patch allocation policy. First, we establish a novel temporal multilayer network comprising a central node, a patch dissemination layer, and a malware propagation layer. The hybrid patching process is implemented by the integration of the central node and the patch dissemination layer. In the malware propagation layer, the mobility of IoT devices is modeled as a diffusion process across multiple areas. Next, we design a dynamic spreading model to capture the evolution of malware propagation and analytically derive the invasion threshold. The threshold indicates that malware propagation is significantly influenced by both the patching process and the topological structure of mobile IoT. Furthermore, considering the central host's capacity and patch effectiveness, we develop an optimization algorithm to determine the optimal patch allocation policy under resource constraints. This algorithm significantly outperforms traditional centrality- based methods in malware mitigation. Finally, we analyze the impact of device mobility, the connectivity of the patch dissemination layer, the device distribution, the central node's capacity, and the patch effectiveness on malware propagation. Our study provides a theoretical foundation for predicting and controlling malware spreading in mobile IoT.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Mobile Energy Transfer in Internet of Things
    Zhang, Qingqing
    Wang, Gang
    Chen, Jie
    Giannakis, Georgios B.
    Liu, Qingwen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 9012 - 9019
  • [42] User Modeling for the Internet of Things
    Kummerfeld, Bob
    Kay, Judy
    PROCEEDINGS OF THE 25TH CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION (UMAP'17), 2017, : 367 - 368
  • [43] Modeling malware propagation using a carrier compartment
    Hernandez Guillen, J. D.
    Martin del Rey, A.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2018, 56 : 217 - 226
  • [44] On Modeling Malware Propagation in Generalized Social Networks
    Cheng, Shin-Ming
    Ao, Weng Chon
    Chen, Pin-Yu
    Chen, Kwang-Cheng
    IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) : 25 - 27
  • [45] Modeling Malware Propagation in Smartphone Social Networks
    Peng, Sancheng
    Wang, Guojun
    Yu, Shui
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 196 - 201
  • [46] Smartphone Malware and Its Propagation Modeling: A Survey
    Peng, Sancheng
    Yu, Shui
    Yang, Aimin
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 925 - 941
  • [47] Spatiotemporal user profile mining algorithm in Internet of things
    Yu H.
    Fang Z.
    Ma C.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2020, 26 (09): : 2429 - 2444
  • [48] A New Susceptible-Infected Model of Malware Propagation in the Internet
    Gu, Yiran
    Song, Yurong
    Jiang, Guoping
    Wang, Suoping
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2771 - +
  • [49] MalCon: A blockchain-based malware containment framework for Internet of Things
    Lekssays, Ahmed
    Carminati, Barbara
    Ferrari, Elena
    COMPUTER NETWORKS, 2023, 233
  • [50] An opcode-based technique for polymorphic Internet of Things malware detection
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (06):