Deriving Exact Mathematical Models of Malware Based on Random Propagation

Author:

Carnier Rodrigo Matos1ORCID,Li Yue2,Fujimoto Yasutaka2ORCID,Shikata Junji3

Affiliation:

1. Information Systems Architecture Research Division, National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda City, Tokyo 101-8430, Japan

2. Department of Electrical and Computer Engineering, Yokohama National University, 79-5 Tokiwadai, Hodogaya Ward, Yokohama 240-8501, Japan

3. Graduate School of Environment and Information Sciences, Yokohama National University, 79-5 Tokiwadai, Hodogaya Ward, Yokohama 240-8501, Japan

Abstract

The advent of the Internet of Things brought a new age of interconnected device functionality, ranging from personal devices and smart houses to industrial control systems. However, increased security risks have emerged in its wake, in particular self-replicating malware that exploits weak device security. Studies modeling malware epidemics aim to predict malware behavior in essential ways, usually assuming a number of simplifications, but they invariably simplify the single most important subdynamics of malware: random propagation. In our previous work, we derived and presented the first exact mathematical model of random propagation, defined as the subdynamics of propagation of a malware model. The propagation dynamics were derived for the SIS model in discrete form. In this work, we generalize the methodology of derivation and extend it to any Markov chain model of malware based on random propagation. We also propose a second method of derivation based on modifying the simplest form of the model and adjusting it for more complex models. We validated the two methodologies on three malware models, using simulations to confirm the exactness of the propagation dynamics. Stochastic errors of less than 0.2% were found in all simulations. In comparison, the standard nonlinear model of propagation (present in ∼95% of studies) has an average error of 5% and a maximum of 9.88% against simulations. Moreover, our model has a low mathematical trade-off of only two additional operations, being a proper substitute to the standard literature model whenever the dynamical equations are solved numerically.

Funder

Ministry of Internal Affairs and Communications

Publisher

MDPI AG

Reference32 articles.

1. and Evans, D. (2024, January 30). The Internet of Things—How the Next Evolution of the Internet Is Changing Everything. Available online: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf.

2. DDoS in the IoT: Mirai and Other Botnets;Kolias;Computer,2017

3. Botnets and Internet of Things Security;Bertino;Computer,2017

4. Herzberg, D.B., and Zeifman, I. (2024, January 30). Breaking Down Mirai: An IoT DDoS Botnet Analysis. Available online: https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html.

5. Behavioral detection of malware: From a survey towards an established taxonomy;Jacob;J. Comput. Virol.,2008

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3