Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malwar...Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost.展开更多
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se...The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.展开更多
基金National Natural Science Foundation of China(No.61772018)Zhejiang Provincial Natural Science Foundation of China(No.LZ22F020002)。
文摘Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost.
文摘The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets.