Abstract
The large-scale use of the Internet brings the problem of the rapid spread of computer malware over the network. Aiming at the relationship between malware, propagation paths and users in network propagation, this paper proposes a perception propagation model of computer malware based on a tripartite graph. First of all, aiming at the driving and influence of malware, propagation paths and users’ association in the network, this paper introduces a malware propagation tree structure, constructs two bipartite graphs of malware–propagation paths and propagation paths–users, and takes the paths as a bridge to form a tripartite graph of malware, propagation paths and users. Second, aiming at the complexity of the driving factors of malware in the process of propagation and the multiplicity of influence, by introducing a Cross-iteration Scoring mechanism of tripartite graph and influencing quantification algorithm, a method to measure the influence of malware propagation is proposed. At the same time, it uses multiple linear regression to uniformly quantify the impact. Finally, considering the polymorphism in the process of computer malware propagation, time slicing and infection state refinement are introduced. Based on the traditional propagation model, the infection state is divided into the normal infection state and the high infection state, and the tripartite iterative algorithm and the influence power method are comprehensively considered. A novel propagation dynamic model of malware is proposed. Experiments show that the model can not only discover the spread situation of malware in the network, but also explore the relationship between malware, propagation paths and users and their influence on the spread situation.
Similar content being viewed by others
References
Kuznetsov, A., Kavun, S., Smirnov, O., Babenko, V., Nakisko, O., Kuznetsova, K.: Malware correlation monitoring in computer networks of promising smart grids. In: 2019 IEEE 6th International Conference on Energy Smart Systems (ESS), Kyiv, Ukraine. 347-352 (2019)
Ahvanooey, M. T., Li, Q., Rabbani, M., Rajput, A. R.: A survey on smartphones security: software vulnerabilities, malware, and attacks. arXiv:2001.09406 (2020)
Richardson, R., Director, C.: Csi computer crime and security survey. Comput. Secur. Inst. 1, 1–30 (2008)
Ren, J., Yang, X., Zhu, Q., Yang, L.X., Zhang, C.: A novel computer virus model and its dynamics. Nonlinear Anal.: Real World Appl. 13(1), 376–384 (2012)
Wang, X., Ni, W., Zheng, K., Liu, R.P., Niu, X.: Virus propagation modeling and convergence analysis in large-scale networks. IEEE Trans. Inf. Forensics Secur. 11(10), 2241–2254 (2016)
Liu, W., Zhong, S.: Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method. Appl. Math. Model. 63, 491–507 (2018)
Zhang, C.: Global behavior of a computer virus propagation model on multilayer networks. Secur. Commun. Netw. 2018(1), 1–9 (2018)
Guri, M., Puzis, R., Choo, K.K.R., Rubinshtein, S., Kedma, G., Elovici, Y.: Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145, 102405 (2019)
Zhong, W., Gu, F.: A multi-level deep learning system for malware detection. Expert Syst. Appl. 133, 151–162 (2019)
Yang, L.X., Yang, X.: The impact of nonlinear infection rate on the spread of computer virus. Nonlinear Dyn. 82(1–2), 85–95 (2015)
Yao, Y., Fu, Q., Yang, W., Wang, Y., Sheng, C.: An epidemic model of computer worms with time delay and variable infection rate. Secur. Commun. Netw. 2018, 11 (2018)
Guillén, J.H., del Rey, A.M.: Modeling malware propagation using a carrier compartment. Commun. Nonlinear Sci. Numer. Simul. 56, 217–226 (2018)
Shen, F., Del Vecchio, J., Mohaisen, A., Ko, S.Y., Ziarek, L.: Android malware detection using complexflows. IEEE Trans. Mobile Comput. 18(6), 1231–1245 (2018)
Signes-Pont, M.T., Cortes-Castillo, A., Mora-Mora, H., Szymanski, J.: Modelling the malware propagation in mobile computer devices. Comput. Secur. 79, 80–93 (2018)
Batista, F.K., Martin del Rey, A., Queiruga-Dios, A.: A new individual-based model to simulate Malware propagation in wireless sensor networks. Mathematics 8(3), 410 (2020)
Al Kindi, A., Al Abri, D., Al Maashri, A., Bait-Shiginah, F.: Analysis of malware propagation behavior in social internet of things. Int. J. Commun. Syst. 32(15), e4102 (2019)
Altan, A., Karasu, S.: The effect of kernel values in support vector machine to forecasting performance of financial time series and cognitive decision making. J. Cogn. Syst. 4(1), 17–21 (2019)
Karasu, S., Altan, A., Saraş, Z., Hacğlu, R.: Estimation of wind speed by using regression learners with different filtering methods. In: 1st International Conference on Energy Systems Engineering, Karabuk, Turkey(2017)
Tafazzoli, T., Sadeghiyan, B.: A four-step method for investigating network worm propagation. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE. pp. 1–7 (2019)
Luo, W., Tay, W.P., Leng, M.: Identifying infection sources and regions in large networks. IEEE Trans. Signal Process. 61(11), 2850–2865 (2013)
Nian, F., Hu, C., Yao, S., Wang, L., Wang, X.: An immunization based on node activity. Chaos, Solitons and Fractals. 107, 228–233 (2018)
Gao, C., Liu, J., Zhong, N.: Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowl. Inf. Syst. 27(2), 253–279 (2011)
Ellis, D.R., Aiken, J.G., Attwood, K.S., Tenaglia, S.D.: A behavioral approach to worm detection. In: Proceedings of the 2004 ACM workshop on Rapid malcode. ACM. pp. 43–53 (2004)
Gan, C.: Modeling and analysis of the effect of network eigenvalue on viral spread. Nonlinear Dyn. 84(3), 1727–1733 (2016)
Condon, E., Cukier, M. Using approximate bayesian computation to empirically test email malware propagation models relevant to common intervention actions. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). IEEE. pp. 287-297 (2016)
Masood, Z., Samar, R., Raja, M.A.Z.: Design of a mathematical model for the stuxnet virus in a network of critical control infrastructure. Comput. Secur. 87, 101565 (2019)
Jia, P., Wang, C., Zhang, G., Ma, J.: A rumor spreading model based on two propagation channels in social networks. Phys. A: Stat. Mech. Appl. 524, 342–353 (2019)
Tafazzoli, T., Sadeghiyan, B.: Worm infectious probability distribution with back-to-origin model. IET Commun. 11(13), 2101–2109 (2017)
Zou, C.C., Gong, W., Towsley, D., Gao, L.: The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw. (TON) 13(5), 961–974 (2005)
Jia, P., Liu, J., Fang, Y., Liu, L., Liu, L.: Modeling and analyzing malware propagation in social networks with heterogeneous infection rates. Phys. A: Stat. Mech. Appl. 507, 240–254 (2018)
Sellke, S.H., Shroff, N.B., Bagchi, S.: Modeling and automated containment of worms. IEEE Trans. Dependable Secure Comput. 5(2), 71–86 (2008)
Wen, S., Zhou, W., Zhang, J., Xiang, Y., Zhou, W., Jia, W., Zou, C.C.: Modeling and analysis on the propagation dynamics of modern email malware. IEEE Trans. Dependable Secure Comput. 11(4), 361–374 (2013)
Xiao, X., Fu, P., Li, Q., Hu, G., Jiang, Y.: Modeling and validation of sms worm propagation over social networks. J. Comput. Sci. 21, 132–139 (2017)
Acknowledgements
This paper is partially supported by the National Natural Science Foundation of China (Grant No.61772098); Chongqing Graduate Education Teaching Reform Project(Grant No.yjg183081); Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No.kjon201800641); Doctoral Top Talents Program of CQUPT, China (Grant No. BYJS2017004); and Chongqing Research Program of Application Foundation and Advanced Technology (cstc2019jcyj-msxmX0588).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, T., Liu, Y., Wu, X. et al. Dynamic model of Malware propagation based on tripartite graph and spread influence. Nonlinear Dyn 101, 2671–2686 (2020). https://doi.org/10.1007/s11071-020-05935-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-020-05935-6