Study of a malware propagation model in computer networks

Document Type : Persian Original Article

Authors

1 Department of Mathematics, Faculty of Basic Science, University of Bojnord, Bojnord, Iran.

2 Department of Computer Sciences, Faculty of Basic Sciences, University of Bojnord, Bojnord, Iran.

Abstract

In this paper, we present a generalized mathematical model of propagation of malware objects in computer networks which is based on the epidemic modeling of the virus in biological phenomena. In this model, we partition the network computers into five groups; Vulnerable population, Exposed population, Infectious population, Quarantined population, Recovered population. Furthermore, we can model the changes in the status of computers at a malware attack by an ordinary differential equations theory based on the general performance of anti- malware software. A nonlinear differential equation system is proposed for this model, then stability and instability of the network (in a malware attack) are investigated by qualitative theories. In addition, we show that in which conditions the network has a normal function or a potential disruption when a malware attack occurs. Also, our theoretical results are validated by the aid of numerical simulations which are based on real data of an anti-malware software in a multi-worm attack.

Keywords


P. Jia, J. Liu, Y. Fang, L. Liu, and L. Liu, “Modeling and analyzing malware propagation in social networks with heterogeneous infection rates,” Phys. Stat. Mech. Its Appl., vol. 507, pp. 240–254, Oct. 2018.
B. K. Mishra, “Mathematical Model on Attack of Worm and Virus in Computer Network,” Int. J. Future Gener. Commun. Netw., vol. 9, no. 6, pp. 245–254, Jun. 2016.
M. Javidi and N. Nyamorady, “Stability analysis of a novel VEISV propagation model of computer worm attacks,” World Journal of Modelling and Simulation., vol. 10, no. 3, p. 12, 2014.
B. K. Mishra and N. Keshri, “Mathematical model on the transmission of worms in wireless sensor network,” Appl. Math. Model., vol. 37, no. 6, pp. 4103–4111, Mar. 2013.
C. H. Nwokoye and I. I. Umeh, “The SEIQR–V Model: On a More Accurate Analytical Characterization of Malicious Threat Defense,” Int. J. Inf. Technol. Comput. Sci., vol. 9, no. 12, pp. 28–37, Dec. 2017.
J. O. Kephart and S. R. White, “directed-graph epidemiological models of computer viruses,” in IEEE Computer Society Symposium on Research in Security and Privacy , Oakland, CA, USA, 1991, p. 32.
A. M. del Rey, “Mathematical modeling of the propagation of malware: a review: Mathematical modeling of the propagation of malware: a review,” Secur. Commun. Netw., vol. 8, no. 15, pp. 2561–2579, Oct. 2015.
H. Zhou, Y. Wen, and H. Zhao, “Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms,” in Sixth International Conference on Networking (ICN’07), Sainte-Luce, Martinique, France, 2007, pp. 65–65.
G. Li and Z. Jin, “Global stability of a SEIR epidemic model with infectious force in latent, infected and immune period,” Chaos Solitons Fract., vol. 25, no. 5, pp. 1177–1184, Sep. 2005.
Y. Jin, W. Wang, and S. Xiao, “An SIRS model with a nonlinear incidence rate,” Chaos Solitons Fract., vol. 34, no. 5, pp. 1482–1497, Dec. 2007.
Y. Yao, L. Guo, H. Guo, G. Yu, F. Gao, and X. Tong, “Pulse quarantine strategy of internet worm propagation: Modeling and analysis,” Comput. Electr. Eng., vol. 38, no. 5, pp. 1047–1061, Sep. 2012.
O. A. Toutonji, S.-M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Appl. Math. Model., vol. 36, no. 6, pp. 2751–2761, Jun. 2012.
B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Appl. Math. Model., vol. 34, no. 3, pp. 710–715, Mar. 2010.
W. Liu and S. Zhong, “Web malware spread modelling and optimal control strategies,” Sci. Rep.., vol. 7, no. 1, p. 42308, Sep. 2017.
J. Ali, M. Saeed, M. Rafiq, and S. Iqbal, “Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Padé approximation scheme,” Adv. Differ. Equ., vol. 2018, no. 1, p. 214, Dec. 2018.
D. Acarali, M. Rajarajan, N. Komninos, and B. B. Zarpelão, “Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks,” Secur. Commun. Netw., vol. 2019, pp. 1–13, Feb. 2019.