A Malware Propagation Model Considering Conformity Psychology in Social Networks

被引:1
|
作者
Zhu, Qingyi [1 ]
Liu, Yuhang [2 ]
Luo, Xuhang [2 ]
Cheng, Kefei [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Comp Network & Commun Technol, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
malware propagation; conformity psychology; stability analysis; numerical simulation; sensitivity analysis; WORM PROPAGATION; EPIDEMIC MODEL; STABILITY; DYNAMICS; SPREAD;
D O I
10.3390/axioms11110632
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
At present, malware is still a major security threat to computer networks. However, only a fraction of users with some security consciousness take security measures to protect computers on their own initiative, and others who know the current situation through social networks usually follow suit. This phenomenon is referred to as conformity psychology. It is obvious that more users will take countermeasures to prevent computers from being infected if the malware spreads to a certain extent. This paper proposes a deterministic nonlinear SEIQR propagation model to investigate the impact of conformity psychology on malware propagation. Both the local and global stabilities of malware-free equilibrium are proven while the existence and local stability of endemic equilibrium is proven by using the central manifold theory. Additionally, some numerical examples and simulation experiments based on two network datasets are performed to verify the theoretical analysis results. Finally, the sensitivity analysis of system parameters is carried out.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Malware Propagation in Online Social Networks
    Faghani, Mohammad Reza
    Saidi, Hossein
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 8 - +
  • [2] Considering Quarantine in the SIRA Malware Propagation Model
    Piqueira, Jose Roberto C.
    Batistela, Cristiane M.
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019
  • [3] On Modeling Malware Propagation in Generalized Social Networks
    Cheng, Shin-Ming
    Ao, Weng Chon
    Chen, Pin-Yu
    Chen, Kwang-Cheng
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) : 25 - 27
  • [4] Online Social Networks: A Vehicle for Malware Propagation
    Ikhalia, Ehinome
    Arreymbi, Johnnes
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 95 - 101
  • [5] Modeling Malware Propagation in Smartphone Social Networks
    Peng, Sancheng
    Wang, Guojun
    Yu, Shui
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 196 - 201
  • [6] Dynamics analysis and control of positive-negative information propagation model considering individual conformity psychology
    Yan, Yutao
    Yu, Shuzhen
    Yu, Zhiyong
    Jiang, Haijun
    [J]. NONLINEAR DYNAMICS, 2024, 112 (18) : 16613 - 16638
  • [7] Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
    Xu, Changjin
    Liao, Maoxin
    Li, Peiluan
    [J]. DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2019, 2019
  • [8] A SCIRS Model for Malware Propagation in Wireless Networks
    Martin del Rey, Angel
    Hernandez Guillen, Jose Diamantino
    Rodriguez Sanchez, Gerardo
    [J]. INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16, 2017, 527 : 638 - 647
  • [9] A Malware Propagation Model Considering Software Diversity and Topology Dynamics
    Hosseini, Soodeh
    Azgomi, Mohammad Abdollahi
    Rahmani, Adel Torkaman
    [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 73 - 78
  • [10] Malware propagation model in wireless ad hoc networks
    School of Computer, Xidian University, Xi'an 710071, China
    [J]. Tien Tzu Hsueh Pao, 2007, SUPPL. 2 (79-82):