全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

An Analytical Model Modifications and Adaptations for Malware Spread and Containment in Communication Networks

DOI: 10.4236/oalib.1110174, PP. 1-16

Subject Areas: Computer and Network Security

Keywords: Epidemic, Containment, Malware, Production Number, and Analytic

Full-Text   Cite this paper   Add to My Lib

Abstract

Due to the escalating wave of malware in communication networks, continuous/discrete differential equations have been used in traditional analytical models to better understand the patterns of malware spread. Networks for local area networks, networks for metropolitan areas, and broad area networks were all utilized in this study. In particular, we developed the vulnerable-latent-contagious-recovery-inoculation (VLCR-I) model as well as built its computational equivalents in MathLab simulator. From the mathematical results, the VLCR-I model predicted increases in the latent (L), contagious (C), and inoculated (I) compartments and a decrease in the vulnerable (V) compartment. With the initial set of data, where V nodes are 100 and L is 2, this is accurate. A decrease in the aforementioned compartments was observed when the V and L nodes were increased to 1050 and 2500, respectively. At V = 100 and L = 2, there were increases in the L, C, I, and R compartments for the second set of data. There was a decrease in these nodes due to the addition of 1050 V, 2500 L, and 25 L nodes.

Cite this paper

Onyesolu, M. O. and Ugwunna, C. O. (2023). An Analytical Model Modifications and Adaptations for Malware Spread and Containment in Communication Networks. Open Access Library Journal, 10, e174. doi: http://dx.doi.org/10.4236/oalib.1110174.

References

[1]  CrowdStrike (2020) 2020 Global Threat Report. https://www.newcastle.edu.au/__data/assets/pdf_file/0006/616875/2020_Global-Threat-Report.pdf
[2]  Lu, X.F., Zhou, X., Jiang, F.S., Yi, S.W. and Sha, J. (2018) ASSCA: API Based Sequence and Statistics Features Combined Malware Detection Architecture. Procedia Computer Science, 129, 248-256. https://doi.org/10.1016/j.procs.2018.03.072
[3]  Nwokoye, C.H., Umeugoji, C. and Umeh, I. (2020) Evaluating Degrees of Differential Infections on Sensor Networks’ Features Using the SEjIjR-V Epidemic Model. Egyptian Computer Science Journal, 44, 86-97. http://ecsjournal.org/Archive/Volume44/Issue3/6.pdf
[4]  Mishra, B.K. and Saini, D.K. (2007) SEIRS Epidemic Model with Delay for Transmission of Malicious Objects in Computer Network. Applied Mathematics and Computation, 188, 1476-1482. https://doi.org/10.1016/j.amc.2006.11.012
[5]  Mishra, B.K. and Keshri, N. (2013) Mathematical Model on the Transmission of Worms in Wireless Sensor Network. Applied Mathematical Modelling, 37, 4103-4111. https://doi.org/10.1016/j.apm.2012.09.025
[6]  Kermack, W.O. and McKendrick, A.G. (1991) Contributions to the Mathematical Theory of Epidemics—I. 1927. Bulletin of Mathematical Biology, 53, 33-55.
[7]  Wang, L., Chen, J. and Marathe, M. (2018) TDEFSI: Theory-Guided Deep Learning-Based Epidemic Forecasting with Synthetic Information. ACM Transactions on Spatial Algorithms and Systems, 6, 1-39. https://doi.org/10.1145/3380971
[8]  Kermack, W.O. and McKendrick, A.G. (1927) A Contribution to the Mathematical Theory of Epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 115, 700-721. https://doi.org/10.1098/rspa.1927.0118
[9]  Mishra, B.K. and Singh, A.K. (2012) SIjRS E-Epidemic Model with Multiple Groups of Infection in Computer Network. International Journal of Nonlinear Science, 13, 357-362.
[10]  Mishra, B.K. and Pandey, S.K. (2011) Dynamic Model of Worms with Vertical Transmission in Computer Network. Applied Mathematics and Computation, 217, 8438–8446. https://doi.org/10.1016/j.amc.2011.03.041
[11]  Mishra, B.K. and Jha, N. (2010) SEIQRS Model for the Transmission of Malicious Objects in Computer Network. Applied Mathematical Modelling, 34, 710-715. https://doi.org/10.1016/j.apm.2009.06.011
[12]  Nwokoye, C. and Umeh, I. (2018) Analytic-Agent Cyber Dynamical Systems Analysis and Design Method for Modeling Spatio-Temporal Factors of Malware Propagation in Wireless Sensor Networks. MethodsX, 5, 1373-1398. https://doi.org/10.1016/j.mex.2018.10.005
[13]  Wagner, H.M. (1989) Principles of Operational Research with Application in Management Decision. Prentice Hall, Hoboke.
[14]  Haldar, K. and Mishra, B.K. (2014) A Mathematical Model for a Distributed Attack on Targeted Resources in a Computer Network. Communications in Nonlinear Science and Numerical Simulation, 19, 3149-3160. https://doi.org/10.1016/j.cnsns.2014.01.028
[15]  Mishra, B.K. and Tyagi, I. (2014) Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model. International Journal of Information Technology and Computer Science, 6, 12-19. https://doi.org/10.5815/ijitcs.2014.03.02
[16]  Heesterbeek, J.A.P. and Dietz, K. (1996) The Concept of Ro in Epidemic Theory. Statistica Neerlandica, 50, 89-110. https://doi.org/10.1111/j.1467-9574.1996.tb01482.x
[17]  Tang, S. and Mark, B.L. (2009) Analysis of Virus Spread in Wireless Sensor Networks: An Epidemic Model. 2009 7th International Workshop on Design of Reliable Communication Networks, Washington DC, 25-28 October 2009, 86-91. https://doi.org/10.1109/DRCN.2009.5340022

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413