Font Size: a A A

Research On Malware Propagation And Control With Individual Heterogeneity

Posted on:2022-01-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:Q YanFull Text:PDF
GTID:1488306722454584Subject:Complex system modeling and simulation
Abstract/Summary:PDF Full Text Request
With the rapidly development of information technology and Internet technology,Internet has gradually penetrated into all corners of people's lives and bringing many conveniences to people's work,study,social interaction,and entertainment.However,network security problems are emerging one after another.Among them,malicious software has become one of the most serious security threats to the Internet due to its strong spreading ability and strong concealment.In recent years,the popularization of the Internet of Things technology has made the spread of malware more changeable,and the network security situation has become more and more severe.Seriously,it will not only cause huge losses to the national economy,but also may even threaten people's lives.Therefore,studying the law of malware propagation and proposing effective defense measures have become one of the most important topics in the field of network security research.The spread and defense of malware are closely related to users.For this reason,this article systematically analyzes the influence of the heterogeneity of these three aspects on the law of malware spread and defense measures based on the three perspectives of user psychology,behavior and cognition.On the basis of considering the heterogeneity of users,we establish dynamical model of malware and study the propagation of malware in depth,and we present the low-cost and high-efficiency malware control strategy accordingly.The detailed contents of our research are given below:(1)Considering the influence of the psychological heterogeneity of online computer game players on the spread of Trojans,A new dynamic model describing the spread of Trojan horses via online game accelerators is proposed.Through the theoretical analysis of the model,the propagation threshold of the Trojan and the stability condition of the model are obtained.Based on the optimal control theory,the time-varying control problem of the Trojan spreading via the online game accelerators is solved.And the results show that due to the existence of impulsive users,real-time alarms can quickly and effectively reduce the spread of Trojan horses.(2)Considering the influence of the behavioral heterogeneity of Internet of Things device users on the ability to spread malware,a malware spreading model based on the Internet of Things is proposed.By analyzing the dynamics of the model,the spread threshold of malware is obtained.Based on the optimal control theory,the existence of the optimal solution is proved and the optimal solution is given.The research results show that the security awareness and behavior of Internet of Things device users have an important impact on the final scale of infection,and personalized defense measures for infected devices can effectively curb the spread of malware.(3)Considering the influence of user's cognition and behavior heterogeneity on their cybersecurity awareness,send cybersecurity science knowledge to target users through email media and conduct a questionnaire survey.The relationship between factors such as the number of emails sent,the identity of the email sender and the background of the target user and the construction of network security awareness are analyzed.The research results show that the number of emails sent and the professional background of users have a significant impact on the construction of users' security awareness.Based on real user data,the aforementioned two models were simulated.The results show that network security education for users can effectively reduce the final spread of malicious software.Compared with other situations,an email sent by the administrator will achieve the best defense effect.
Keywords/Search Tags:Network security, Malware, Transmission dynamics, User heterogeneity, equilibrium, Optimal control
PDF Full Text Request
Related items