Abstract
Currently, zero-day malware is a major problem as long as these specimens are a serious cyber threat. Most of the efforts are focused on designing efficient algorithms and methodologies to detect this type of malware; unfortunately models to simulate its behavior are not well studied. The main goal of this work is to introduce a new individual-based model to simulate zero-day malware propagation. It is a compartmental model where susceptible, infectious and attacked devices are considered. Its dynamics is governed by means of a cellular automaton whose local functions rule the transitions between the states. The propagation is briefly analyzed considering different initial conditions and network topologies (complete networks, random networks, scale-free networks and small-world networks), and interesting conclusions are derived.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fu, X., Small, M., Chen, G.: Propagation Dynamics on Complex Networks. Wiley, Hoboken (2014)
Hernández Guillén, J.D., Martín del Rey, A.: Modeling malware propagation using a carrier compartment. Commun. Nonlinear Sci. Numer. Simul. 56, 217–226 (2018)
Hosseini, S., Azgomi, M.A., Torkaman, A.R.: Agent-based simulation of the dynamics of malware propagation in scale-free networks. Simulation 92, 709–722 (2016)
Hosseini, S., Azgomi, M.A.: A model for malware propagation in scale-free networks based on rumor spreading process. Comput. Netw. 108, 97–107 (2017)
Hosseini, S., Azgomi, M.A.: The dynamics of a SEIRS-QV malware propagation model in heterogeneous networks. Phys. A 512, 803–817 (2018)
Hu, P., Ding, L., Hadzibeganovic, T.: Individual-based optimal weight adaptation for heterogeneous epidemic spreading networks. Commun. Nonlinear Sci. Numer. Simul. 63, 339–355 (2018)
Jackson, J.T., Creese, S.: Virus propagation in heterogeneous bluetooth networks with human behaviors. IEEE Trans. Dependable Secur. Comput. 9, 930–943 (2012)
Karyotis, V., Khouzani, M.H.R.: Malware Diffusion Models for Modern Complex Networks. Morgan Kaufmann-Elsevier, Cambridge (2016)
Karyotis, V., Papavassiliou, S.: Macroscopic malware propagation dynamics for complex networks with churm. IEEE Commun. Lett. 19, 577–580 (2015)
Kim, J.-Y., Bu, S.-J., Cho, S.-B.: Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inform. Sci. 460, 83–102 (2018)
Kim, T., Kang, B., Rho, M., Sezer, S., Im, E.G.: A multimodal deep learning method for Android malware detection using various features. IEEE Trans. Inf. Forensic Secur. 14, 773–788 (2019)
Liu, W., Zhong, S.: A novel dynamic model for web malware spreading over scale-free networks. Phys. A 505, 848–863 (2018)
Martín del Rey, A.: Mathematical modeling of the propagation of malware: a review. Secur. Commun. Netw. 8, 2561–2579 (2015)
Martín del Rey, A., Rodríguez Sánchez, G.: A discrete mathematical model to simulate malware spreading. Int. J. Mod. Phys. C 23, 1–16 (2012). Article number 1250064
Rudd, E.M., Rozsa, A., Günter, M., Boult, T.E.: A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions. IEEE Commun. Surv. Tutor. 19, 1145–1172 (2017)
Sarkar, P.: A brief history of cellular automata. ACM Comput. Surv. 32, 80–107 (2000)
Thomson, B., Morris-King, J.: An agent-based modeling framework for cybersecurity in mobile tactical networks. J. Def. Model. Simulat. 15, 204–218 (2018)
Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 72, 212–233 (2018)
Winkler, I., Treu Gomes, A.: Advanced Persistent Security. A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies. Syngress-Elsevier, Cambridge (2017)
Acknowledgements
This research has been partially supported by Ministerio de Ciencia, Innovación y Universidades (MCIU, Spain), Agencia Estatal de Investigación (AEI, Spain), and Fondo Europeo de Desarrollo Regional (FEDER, UE) under project with reference TIN2017-84844-C2-2-R (MAGERAN) and the project with reference SA054G18 supported by Consejería de Educación (Junta de Castilla y León, Spain).
A. Bustos Tabernero thanks Ministerio de Educación y Formación Profesional (Spain) for his departmental collaboration grant in the Department of Applied Mathematics (University of Salamanca, Spain).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Martín del Rey, A., Queiruga Dios, A., Hernández, G., Bustos Tabernero, A. (2020). Modeling the Spread of Malware on Complex Networks. In: Herrera-Viedma, E., Vale, Z., Nielsen, P., Martin Del Rey, A., Casado Vara , R. (eds) Distributed Computing and Artificial Intelligence, 16th International Conference, Special Sessions. DCAI 2019. Advances in Intelligent Systems and Computing, vol 1004. Springer, Cham. https://doi.org/10.1007/978-3-030-23946-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-23946-6_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23945-9
Online ISBN: 978-3-030-23946-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)