Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks

被引:5
|
作者
Dou, Jie [1 ]
Xie, Gang [2 ,3 ]
Tian, Zhiyi [4 ]
Cui, Lei [5 ]
Yu, Shui [5 ]
机构
[1] Taiyuan Univ Technol, Coll Elect Informat & Opt Engn, Taiyuan 030024, Shanxi, Peoples R China
[2] Taiyuan Univ Technol, Coll Elect & Power Engn, Taiyuan 030024, Shanxi, Peoples R China
[3] Taiyuan Univ Sci & Technol, Shanxi Key Lab Adv Control & Equipment Intelligenc, Taiyuan 030024, Shanxi, Peoples R China
[4] Univ Technol Sydney, Sch Software, Sydney, NSW 2007, Australia
[5] Shandong Comp Sci Ctr, Natl Supercomp Ctr Jinan, Jinan 250000, Shandong, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 02期
关键词
Cellular automata (CA); human mobility; infection duration; malware spreading; wearable Internet of Things (IoT) device; WIRELESS SENSOR NETWORKS; INTERNET; SIMULATION; DYNAMICS; DEFENSE; THREATS; THINGS; PATCH;
D O I
10.1109/JIOT.2023.3295016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wearable Internet of Things (IoT) devices are easily compromised by malware due to their security vulnerabilities. The bots infected by malware may continue to infect healthy neighbor devices through wireless communication technology in mobile wearable IoT networks (WIoT). All bots form a botnet which eventually leads to a series of malicious attacks. Therefore, it is necessary to predict the dynamic malware propagation path between wearable devices, which can help provide target immunization measures on devices to prevent the formation of botnets. In this article, we capture the local interaction and spatial-temporal propagation behavior of malware utilizing the individual-based cellular automata (CA) model. First, taking into account the mobility of walking users carrying wearable devices in the actual WIoT, we present a human mobility model called Gauss-Markov truncated Levy walk (GM-TLW) to describe the movement patterns of mobile users. Second, based on the moving coordinates of all wearable devices obtained from the GM-TLW mobility model, we leverage the improved CA propagation model to study the time evolution of the number of bots and the spreading spatial distribution of malware. We compare our propagation model with the differential equation model and traditional CA model, and analyze the impact of various parameters on the dynamics of botnet formation using numerical simulations. Finally, detailed simulation results show that the GM-TLW model is more suitable for realistic human mobility scenarios. In addition, the proposed CA-based model is more precise than the differential equation model to modeling the malware propagation and provides a basis for defenders to adopt the optimal malware control strategies.
引用
收藏
页码:2438 / 2452
页数:15
相关论文
共 50 条
  • [1] Spatial-temporal modeling of malware propagation in networks
    Chen, ZS
    Ji, CY
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS, 2005, 16 (05): : 1291 - 1303
  • [2] An Approach for Spatial-temporal Traffic Modeling in Mobile Cellular Networks
    Wang, Shuo
    Zhang, Xing
    Zhang, Jiaxin
    Feng, Jian
    Wang, Wenbo
    Xin, Ke
    [J]. 2015 27TH INTERNATIONAL TELETRAFFIC CONGRESS ITC 27, 2015, : 203 - 209
  • [3] Modeling the propagation of mobile malware on complex networks
    Liu, Wanping
    Liu, Chao
    Yang, Zheng
    Liu, Xiaoyang
    Zhang, Yihao
    Wei, Zuxue
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2016, 37 : 249 - 264
  • [4] Modeling and Control of Malware Propagation in Wireless IoT Networks
    Yan, Qing
    Song, Lipeng
    Zhang, Chenlu
    Li, Jing
    Feng, Shanshan
    [J]. Security and Communication Networks, 2021, 2021
  • [5] Modeling and Control of Malware Propagation in Wireless IoT Networks
    Yan, Qing
    Song, Lipeng
    Zhang, Chenlu
    Li, Jing
    Feng, Shanshan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Spatial-temporal modeling of background radiation using mobile sensor networks
    Liu, Zheng
    Abbaszadeh, Shiva
    Sullivan, Clair Julia
    [J]. PLOS ONE, 2018, 13 (10):
  • [7] Modeling of Spatial-Temporal Associations on a Mobile Trajectory
    Ren, Xiang
    Xie, Rong
    Du, Juan
    He, Xiang-Yi
    [J]. ELECTRONICS, COMMUNICATIONS AND NETWORKS V, 2016, 382 : 251 - 262
  • [8] Modeling and Analyzing Malware Propagation Over Wireless Networks Based on Hypergraphs
    Chen, Jiaxing
    Sun, Shiwen
    Xia, Chengyi
    Shi, Dinghua
    Chen, Guanrong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06): : 3767 - 3778
  • [9] Dissemination of spatial-temporal information in mobile networks with hotspots
    Wolfson, O
    Xu, B
    Yin, HB
    [J]. DATABASES, INFORMATION SYSTEMS, AND PEER-TO-PEER COMPUTING, 2005, 3367 : 185 - 199
  • [10] Modeling and analyzing malware propagation in social networks with heterogeneous infection rates
    Jia, Peng
    Liu, Jiayong
    Fang, Yong
    Liu, Liang
    Liu, Luping
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 507 : 240 - 254