Modeling and controlling spatiotemporal malware propagation in mobile Internet of Things

被引:0
|
作者
Cao, Huiying [1 ]
Peng, Da-Tian [2 ]
Yu, Dengxiu [3 ]
机构
[1] Northwestern Polytech Univ, Sch Mech Engn, Xian 710072, Peoples R China
[2] Northwestern Polytech Univ, Sch Cybersecur, Xian 710072, Peoples R China
[3] Northwestern Polytech Univ, Sch Artificial Intelligence Opt & Elect iOPEN, Xian 710072, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware propagation; Cybersecurity; Mobile Internet of Things; Temporal multilayer networks; Optimal control; MULTIPLEX NETWORKS; IMPACT; VIRUS; CENTRALITY; SPREAD;
D O I
10.1016/j.apm.2025.116042
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The mobility of devices in mobile Internet of Things (IoT) enables dynamic interactions, facilitating the spatiotemporal malware propagation. However, few studies have focused on accurately modeling and effectively controlling this form of malware propagation. To address this issue, we propose a theoretical framework that integrates patch-malware spreading dynamics with optimal patch allocation policy. First, we establish a novel temporal multilayer network comprising a central node, a patch dissemination layer, and a malware propagation layer. The hybrid patching process is implemented by the integration of the central node and the patch dissemination layer. In the malware propagation layer, the mobility of IoT devices is modeled as a diffusion process across multiple areas. Next, we design a dynamic spreading model to capture the evolution of malware propagation and analytically derive the invasion threshold. The threshold indicates that malware propagation is significantly influenced by both the patching process and the topological structure of mobile IoT. Furthermore, considering the central host's capacity and patch effectiveness, we develop an optimization algorithm to determine the optimal patch allocation policy under resource constraints. This algorithm significantly outperforms traditional centrality- based methods in malware mitigation. Finally, we analyze the impact of device mobility, the connectivity of the patch dissemination layer, the device distribution, the central node's capacity, and the patch effectiveness on malware propagation. Our study provides a theoretical foundation for predicting and controlling malware spreading in mobile IoT.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks
    Dou, Jie
    Xie, Gang
    Tian, Zhiyi
    Cui, Lei
    Yu, Shui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (02) : 2438 - 2452
  • [22] Controlling moving object in the internet of things
    Gao, Kun
    Wang, Qin
    Xi, Lifeng
    International Journal of Advancements in Computing Technology, 2012, 4 (05) : 83 - 90
  • [23] Internet of Things for Irrigation Monitoring and Controlling
    Muley, R. J.
    Bhonge, V. N.
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 165 - 174
  • [24] Mathematical modeling of the propagation of malware: a review
    Martin del Rey, Angel
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) : 2561 - 2579
  • [25] Detection, Traceability, and Propagation of Mobile Malware Threats
    Chen, Long
    Xia, Chunhe
    Lei, Shengwei
    Wang, Tianbo
    IEEE ACCESS, 2021, 9 : 14576 - 14598
  • [26] Modelling the malware propagation in mobile computer devices
    Teresa Signes-Pont, Maria
    Cortes-Castillo, Antonio
    Mora-Mora, Higinio
    Szymanski, Julian
    COMPUTERS & SECURITY, 2018, 79 : 80 - 93
  • [27] Detection, Traceability, and Propagation of Mobile Malware Threats
    Chen, Long
    Xia, Chunhe
    Lei, Shengwei
    Wang, Tianbo
    IEEE Access, 2021, 9 : 14576 - 14598
  • [28] Methods of computer modeling of electromagnetic field propagation in urban scenarios for Internet of Things
    Kliuchka, Anatolii
    Hartansky, Rene
    Halgos, Jan
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2023, 74 (05): : 422 - 433
  • [29] A Distributed Patching Scheme for Controlling Mobile Malware Infection
    Sobhani, Alireza
    Keshavarz-Haddad, Alireza
    2015 23RD IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2015, : 187 - 192
  • [30] Generative adversarial network to detect unseen Internet of Things malware
    Moti, Zahra
    Hashemi, Sattar
    Karimipour, Hadis
    Dehghantanha, Ali
    Jahromi, Amir Namavar
    Abdi, Lida
    Alavi, Fatemeh
    AD HOC NETWORKS, 2021, 122