Skip to main content

Abstract

Usually statistical techniques are employed to analyze malware behavior mainly through machine learning-based methods. However it seems legitimate to wonder if some statistical methods could be useful as a complementary tool to malicious code propagation models. This work explores this possibility with a first (and simple) application of the use of survival analysis to the study of the simulations obtained from a compartmental and individual SI model whose dynamics is described by means of a cellular automaton. The results obtained are in line with what could reasonably be expected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abadía, J.J.P., Walther, C., Osman, A., Smarsly, K.: A systematic survey of internet of things frameworks for smart city applications. Sustain. Urban Areas 83, 103949 (2022). https://doi.org/10.1016/j.scs.2022.103949

    Article  Google Scholar 

  2. Dias, J.P., Restivo, A., Ferreira, H.S.: Designing and constructing internet-of-things systems: an overview of the ecosystem. Internet of Things 19, 100529 (2022). https://doi.org/10.1016/j.iot.2022.100529

    Article  Google Scholar 

  3. Kaplan, E.L., Meier, P.: Nonparametric estimation from incomplete observations. J. Am. Stat. Assoc. 53(282), 457–481 (1958)

    Article  MathSciNet  MATH  Google Scholar 

  4. Greenwood, M.: The natural duration of cancer. Reports on Public Health and Medical Subjects 33, 1–26. Her Majesty’s Stationery Office, London (1926)

    Google Scholar 

  5. Kim, M., Bae, J.: Modeling the flight departure delay using survival analysis in South Korea. J. Air Transp. Manag. 91, 101996 (2021). https://doi.org/10.1016/j.jairtraman.2020.101996

    Article  Google Scholar 

  6. Liu, X.Y., Zhao, J.R., Liu, R., Liu, K.: Event history analysis of the duration of online public opinions regarding major health emergencies. Front. Psychol. 13, 954559 (2022). https://doi.org/10.3389/fpsyg.2022.954559

    Article  Google Scholar 

  7. Mantel, N.: Evaluation of survival data and two new rank order statistics arising in its consideration. Cancer Chemother. Rep. 50, 163–170 (1966)

    Google Scholar 

  8. del Rey, A.M., Vara, R.C., González, S.R.: A computational propagation model for malware based on the SIR classic model. Neurocomputing 484, 161–171 (2022). https://doi.org/10.1016/j.neucom.2021.08.149

    Article  Google Scholar 

  9. Martín-Vaquero, J., Martín del Rey, A., Encinas, A.H., Hernández Guillén, J.D., Queiruga-Dios, A., Rodríguez Sánchez, G.: Higher-order nonstandard finite difference schemes for a MSEIR model for a malware propagation. J. Comput. Appl. Math. 317, 146–156 (2017). https://doi.org/10.1016/j.cam.2016.11.044

    Article  MathSciNet  MATH  Google Scholar 

  10. Nguyen, H.T., Vasconcellos, H.D., Keck, K., Reis, J.P., Lewis, C.E., Sidney, S., et al.: Multivariate longitudinal data for survival analysis of cardiovascular event prediction in young adults: insights from a comparative explainable study. BMC Med. Res. Methodol. 23(1), 23 (2023). https://doi.org/10.1186/s12874-023-01845-4

    Article  Google Scholar 

  11. Ojha, R.P., Srivastava, P.K., Sanyal, G., Gupta, N.: Improved model for the stability analysis of wireless sensor network against malware attacks. Wireless Pers. Commun. 116(3), 2525–2548 (2020). https://doi.org/10.1007/s11277-020-07809-x

    Article  Google Scholar 

  12. Rafiq, M., Macias-Diaz, J.E., Raza, A., Ahmed, N.: Design of a nonlinear model for the propagation of COVID-19 and its efficient nonstandard computational implementation. Appl. Math. Model. 89, 1835–1846 (2021). https://doi.org/10.1016/j.apm.2020.08.082

    Article  MathSciNet  MATH  Google Scholar 

  13. Shakya, R.K., Ayane, T.H., Diba, F.D., Mamoria, P.: SEIRS model with spatial correlation for analyzing dynamic of virus spreading in event-driven wireless sensor networks. Int. J. Syst. Assur. Eng. Manage. 13, 1–9 (2021). https://doi.org/10.1007/s13198-021-01336-z

  14. Shirvani, M.H., Masdari, M.: A survey study on trust-based security in Internet of Things: Challenges and issues. Internet of Things 21, 100640 (2023) 10.1016/j.iot.2022.100640

    Google Scholar 

  15. Wang, Y., Li, D., Dong, N.: Cellular automata malware propagation model for WSN based on multi-player evolutionary game. IET Networks 7(3), 129–135 (2018). https://doi.org/10.1049/iet-net.2017.0070

    Article  Google Scholar 

  16. Zhang, H., Upadhyay, R.K., Liu, G., Zhang, Z.: Hopf bifurcation and optimal control of a delayed malware propagation model on mobile wireless sensor networks. Results Phys. 41, 105926 (2022). https://doi.org/10.1016/j.rinp.2022.105926

    Article  Google Scholar 

Download references

Acknowledgement

This work has been supported by Fundación Memoria D. Samuel Solórzano Barruso (Universidad de Salamanca, Spain) under research grant FS/2-2022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Frutos-Bernal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Frutos-Bernal, E., Martín del Rey, A., Rodríguez-Rosa, M. (2023). On the Statistical Analysis of an Individual-Based SI Model for Malware Propagation on WSNs. In: García Bringas, P., et al. International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023). CISIS ICEUTE 2023 2023. Lecture Notes in Networks and Systems, vol 748. Springer, Cham. https://doi.org/10.1007/978-3-031-42519-6_18

Download citation

Publish with us

Policies and ethics