Skip to main content
Log in

Dynamic model of Malware propagation based on tripartite graph and spread influence

  • Original paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

The large-scale use of the Internet brings the problem of the rapid spread of computer malware over the network. Aiming at the relationship between malware, propagation paths and users in network propagation, this paper proposes a perception propagation model of computer malware based on a tripartite graph. First of all, aiming at the driving and influence of malware, propagation paths and users’ association in the network, this paper introduces a malware propagation tree structure, constructs two bipartite graphs of malware–propagation paths and propagation paths–users, and takes the paths as a bridge to form a tripartite graph of malware, propagation paths and users. Second, aiming at the complexity of the driving factors of malware in the process of propagation and the multiplicity of influence, by introducing a Cross-iteration Scoring mechanism of tripartite graph and influencing quantification algorithm, a method to measure the influence of malware propagation is proposed. At the same time, it uses multiple linear regression to uniformly quantify the impact. Finally, considering the polymorphism in the process of computer malware propagation, time slicing and infection state refinement are introduced. Based on the traditional propagation model, the infection state is divided into the normal infection state and the high infection state, and the tripartite iterative algorithm and the influence power method are comprehensively considered. A novel propagation dynamic model of malware is proposed. Experiments show that the model can not only discover the spread situation of malware in the network, but also explore the relationship between malware, propagation paths and users and their influence on the spread situation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Kuznetsov, A., Kavun, S., Smirnov, O., Babenko, V., Nakisko, O., Kuznetsova, K.: Malware correlation monitoring in computer networks of promising smart grids. In: 2019 IEEE 6th International Conference on Energy Smart Systems (ESS), Kyiv, Ukraine. 347-352 (2019)

  2. Ahvanooey, M. T., Li, Q., Rabbani, M., Rajput, A. R.: A survey on smartphones security: software vulnerabilities, malware, and attacks. arXiv:2001.09406 (2020)

  3. Richardson, R., Director, C.: Csi computer crime and security survey. Comput. Secur. Inst. 1, 1–30 (2008)

    Google Scholar 

  4. Ren, J., Yang, X., Zhu, Q., Yang, L.X., Zhang, C.: A novel computer virus model and its dynamics. Nonlinear Anal.: Real World Appl. 13(1), 376–384 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  5. Wang, X., Ni, W., Zheng, K., Liu, R.P., Niu, X.: Virus propagation modeling and convergence analysis in large-scale networks. IEEE Trans. Inf. Forensics Secur. 11(10), 2241–2254 (2016)

    Article  Google Scholar 

  6. Liu, W., Zhong, S.: Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method. Appl. Math. Model. 63, 491–507 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  7. Zhang, C.: Global behavior of a computer virus propagation model on multilayer networks. Secur. Commun. Netw. 2018(1), 1–9 (2018)

    Article  MathSciNet  Google Scholar 

  8. Guri, M., Puzis, R., Choo, K.K.R., Rubinshtein, S., Kedma, G., Elovici, Y.: Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145, 102405 (2019)

    Article  Google Scholar 

  9. Zhong, W., Gu, F.: A multi-level deep learning system for malware detection. Expert Syst. Appl. 133, 151–162 (2019)

    Article  Google Scholar 

  10. Yang, L.X., Yang, X.: The impact of nonlinear infection rate on the spread of computer virus. Nonlinear Dyn. 82(1–2), 85–95 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  11. Yao, Y., Fu, Q., Yang, W., Wang, Y., Sheng, C.: An epidemic model of computer worms with time delay and variable infection rate. Secur. Commun. Netw. 2018, 11 (2018)

    Article  Google Scholar 

  12. Guillén, J.H., del Rey, A.M.: Modeling malware propagation using a carrier compartment. Commun. Nonlinear Sci. Numer. Simul. 56, 217–226 (2018)

    Article  MathSciNet  Google Scholar 

  13. Shen, F., Del Vecchio, J., Mohaisen, A., Ko, S.Y., Ziarek, L.: Android malware detection using complexflows. IEEE Trans. Mobile Comput. 18(6), 1231–1245 (2018)

    Article  Google Scholar 

  14. Signes-Pont, M.T., Cortes-Castillo, A., Mora-Mora, H., Szymanski, J.: Modelling the malware propagation in mobile computer devices. Comput. Secur. 79, 80–93 (2018)

    Article  Google Scholar 

  15. Batista, F.K., Martin del Rey, A., Queiruga-Dios, A.: A new individual-based model to simulate Malware propagation in wireless sensor networks. Mathematics 8(3), 410 (2020)

    Article  Google Scholar 

  16. Al Kindi, A., Al Abri, D., Al Maashri, A., Bait-Shiginah, F.: Analysis of malware propagation behavior in social internet of things. Int. J. Commun. Syst. 32(15), e4102 (2019)

    Article  Google Scholar 

  17. Altan, A., Karasu, S.: The effect of kernel values in support vector machine to forecasting performance of financial time series and cognitive decision making. J. Cogn. Syst. 4(1), 17–21 (2019)

    Google Scholar 

  18. Karasu, S., Altan, A., Saraş, Z., Hacğlu, R.: Estimation of wind speed by using regression learners with different filtering methods. In: 1st International Conference on Energy Systems Engineering, Karabuk, Turkey(2017)

  19. Tafazzoli, T., Sadeghiyan, B.: A four-step method for investigating network worm propagation. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE. pp. 1–7 (2019)

  20. Luo, W., Tay, W.P., Leng, M.: Identifying infection sources and regions in large networks. IEEE Trans. Signal Process. 61(11), 2850–2865 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  21. Nian, F., Hu, C., Yao, S., Wang, L., Wang, X.: An immunization based on node activity. Chaos, Solitons and Fractals. 107, 228–233 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  22. Gao, C., Liu, J., Zhong, N.: Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowl. Inf. Syst. 27(2), 253–279 (2011)

    Article  Google Scholar 

  23. Ellis, D.R., Aiken, J.G., Attwood, K.S., Tenaglia, S.D.: A behavioral approach to worm detection. In: Proceedings of the 2004 ACM workshop on Rapid malcode. ACM. pp. 43–53 (2004)

  24. Gan, C.: Modeling and analysis of the effect of network eigenvalue on viral spread. Nonlinear Dyn. 84(3), 1727–1733 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  25. Condon, E., Cukier, M. Using approximate bayesian computation to empirically test email malware propagation models relevant to common intervention actions. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). IEEE. pp. 287-297 (2016)

  26. Masood, Z., Samar, R., Raja, M.A.Z.: Design of a mathematical model for the stuxnet virus in a network of critical control infrastructure. Comput. Secur. 87, 101565 (2019)

    Article  Google Scholar 

  27. Jia, P., Wang, C., Zhang, G., Ma, J.: A rumor spreading model based on two propagation channels in social networks. Phys. A: Stat. Mech. Appl. 524, 342–353 (2019)

    Article  MathSciNet  Google Scholar 

  28. Tafazzoli, T., Sadeghiyan, B.: Worm infectious probability distribution with back-to-origin model. IET Commun. 11(13), 2101–2109 (2017)

    Article  Google Scholar 

  29. Zou, C.C., Gong, W., Towsley, D., Gao, L.: The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw. (TON) 13(5), 961–974 (2005)

    Article  Google Scholar 

  30. Jia, P., Liu, J., Fang, Y., Liu, L., Liu, L.: Modeling and analyzing malware propagation in social networks with heterogeneous infection rates. Phys. A: Stat. Mech. Appl. 507, 240–254 (2018)

    Article  Google Scholar 

  31. Sellke, S.H., Shroff, N.B., Bagchi, S.: Modeling and automated containment of worms. IEEE Trans. Dependable Secure Comput. 5(2), 71–86 (2008)

    Article  Google Scholar 

  32. Wen, S., Zhou, W., Zhang, J., Xiang, Y., Zhou, W., Jia, W., Zou, C.C.: Modeling and analysis on the propagation dynamics of modern email malware. IEEE Trans. Dependable Secure Comput. 11(4), 361–374 (2013)

    Article  Google Scholar 

  33. Xiao, X., Fu, P., Li, Q., Hu, G., Jiang, Y.: Modeling and validation of sms worm propagation over social networks. J. Comput. Sci. 21, 132–139 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This paper is partially supported by the National Natural Science Foundation of China (Grant No.61772098); Chongqing Graduate Education Teaching Reform Project(Grant No.yjg183081); Science and Technology Research Program of Chongqing Municipal Education Commission (Grant No.kjon201800641); Doctoral Top Talents Program of CQUPT, China (Grant No. BYJS2017004); and Chongqing Research Program of Application Foundation and Advanced Technology (cstc2019jcyj-msxmX0588).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tun Li.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, T., Liu, Y., Wu, X. et al. Dynamic model of Malware propagation based on tripartite graph and spread influence. Nonlinear Dyn 101, 2671–2686 (2020). https://doi.org/10.1007/s11071-020-05935-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-020-05935-6

Keywords

Navigation