期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Optimal Control of Heterogeneous-Susceptible-Exposed-Infectious-Recovered-Susceptible Malware Propagation Model in Heterogeneous Degree-Based Wireless Sensor Networks
1
作者 ZHANG Hong SHEN Shigen +2 位作者 WU Guowen CAO Qiying XU Hongyun 《Journal of Donghua University(English Edition)》 CAS 2022年第3期220-230,共11页
Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malwar... Heterogeneous wireless sensor networks(HWSNs)are vulnerable to malware propagation,because of their low configuration and weak defense mechanism.Therefore,an optimality system for HWSNs is developed to suppress malware propagation in this paper.Firstly,a heterogeneous-susceptible-exposed-infectious-recovered-susceptible(HSEIRS)model is proposed to describe the state dynamics of heterogeneous sensor nodes(HSNs)in HWSNs.Secondly,the existence of an optimal control problem with installing antivirus on HSNs to minimize the sum of the cumulative infection probabilities of HWSNs at a low cost based on the HSEIRS model is proved,and then an optimal control strategy for the problem is derived by the optimal control theory.Thirdly,the optimal control strategy based on the HSEIRS model is transformed into corresponding Hamiltonian by the Pontryagin’s minimum principle,and the corresponding optimality system is derived.Finally,the effectiveness of the optimality system is validated by the experimental simulations,and the results show that the infectious HSNs will fall to an extremely low level at a low cost. 展开更多
关键词 heterogeneous wireless sensor network(HWSN) malware propagation optimal control Pontryagin’s minimum principle
下载PDF
An Agent Based Model for Ransomware Detection and Mitigation in a Cloud System
2
作者 N’golo Konate Tenan Yeo 《Journal of Information Security》 2024年第4期419-432,共14页
The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud se... The increasing trend toward dematerialization and digitalization has prompted a surge in the adoption of IT service providers, offering cost-effective alternatives to traditional local services. Consequently, cloud services have become prevalent across various industries. While these services offer undeniable benefits, they face significant threats, particularly concerning the sensitivity of the data they handle. Many existing mathematical models struggle to accurately depict the complex scenarios of cloud systems. In response to this challenge, this paper proposes a behavioral model for ransomware propagation within such environments. In this model, each component of the environment is defined as an agent responsible for monitoring the propagation of malware. Given the distinct characteristics and criticality of these agents, the impact of malware can vary significantly. Scenario attacks are constructed based on real-world vulnerabilities documented in the Common Vulnerabilities and Exposures (CVEs) through the National Vulnerability Database. Defender actions are guided by an Intrusion Detection System (IDS) guideline. This research aims to provide a comprehensive framework for understanding and addressing ransomware threats in cloud systems. By leveraging an agent- based approach and real-world vulnerability data, our model offers valuable insights into detection and mitigation strategies for safeguarding sensitive cloud-based assets. 展开更多
关键词 Cloud Computing Information Security Multi-Agent System IAAS malware propagation
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部