Quantitative model for dynamic propagation and countermeasure of malicious cyber attack on the mobile wireless network

A. Falaye, Etuk Stella Oluyemi, Seun Ale, M. Abdullahi, Ugwu Cosmas Uchenna, Femi Awogbemi
{"title":"Quantitative model for dynamic propagation and countermeasure of malicious cyber attack on the mobile wireless network","authors":"A. Falaye, Etuk Stella Oluyemi, Seun Ale, M. Abdullahi, Ugwu Cosmas Uchenna, Femi Awogbemi","doi":"10.1109/INTELLISYS.2017.8324266","DOIUrl":null,"url":null,"abstract":"One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopy Perturbation Method (HPM). The simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple. From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, privacy inversion and running of scam can be curtailed to a significant level.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"647 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Intelligent Systems Conference (IntelliSys)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTELLISYS.2017.8324266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopy Perturbation Method (HPM). The simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple. From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, privacy inversion and running of scam can be curtailed to a significant level.
移动无线网络中恶意网络攻击动态传播的定量模型及对策
全球网络和数据安全顾问关注的一个主要问题是,传染性恶意网络攻击(恶意软件)能够在攻击爆发后几天内侵入所有网络终端,造成从身份盗窃、金融欺诈到对关键国家资产的系统性数字攻击等严重破坏。众所周知,当易受攻击的移动设备与受感染的节点通信时,它就会被感染。本文研究了移动无线网络中脆弱终端、受感染终端和恢复终端的行为动态,以及反病毒安全签名作为对策的有效性和缺乏反病毒更新的效果。求解稳定性时,我们发现它的特征值为负值,这意味着平衡点处于稳定状态。我们用同伦摄动法(HPM)分析微分方程。在数学工具平台maple上进行了仿真,以评估不同对策方案的后果。从我们的结果中我们发现,如果我们的移动设备上的安全补丁被修复,并且设备上有定期的防病毒更新,那么金融欺诈,隐私倒置和诈骗的运行可以在很大程度上减少。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信