To more accurately describe the dynamic behavior of malware propagation in the industrial internet, this paper constructs a delay malware propagation model with a variable isolation rate, based on the theory of dynamical systems and incorporating delay factors. This model dynamically adjusts the isolation rate with the change in the number of infected hosts, addressing the characteristic of a small number of infected nodes in the early stages of malware infection. By performing numerical analysis and simulation experiments, and combining theoretical derivation, the Hopf bifurcation threshold is obtained. The research results show that the presence of delay leads to the occurrence of Hopf bifurcation. When the delay is below the threshold, the system remains stable; when the delay exceeds the threshold, the system becomes unstable. This proves that the model can more accurately predict the dynamic process of malware propagation. The research conclusions provide a theoretical basis for the formulation of security protection strategies in the industrial internet.
WANGC, JIANGC X, WANGJ J,et al.Blockchain-aided network resource orchestration in intelligent Internet of Things[J].IEEE Internet of Things Journal,2023,10(7):6151-6163.
[2]
KUN X, WANGZ L, ZHOUZ A,et al.Design of industrial Internet of Things system based on machine learning and artificial intelligence technology[J]. Journal of Intelligent & Fuzzy Systems, 2021, 40(2): 2601-2611.
[3]
MENDONÇAR V, SILVAJ C, ROSAR L,et al.A lightweight intelligent intrusion detection system for industrial Internet of Things using deep learning algorithms[J].Expert Systems,2022,39(5):e12917.
[4]
KHANI A, KESHKM, PID C,et al.Enhancing IIoT networks protection: a robust security model for attack detection in Internet Industrial Control Systems[J].Ad Hoc Networks,2022,134:102930.
[5]
TRAUTMANL J.Industrial cyber vulnerabilities: lessons from stuxnet and the Internet of Things[J].SSRN Electronic Journal,2017,72:761-826.
[6]
BINDRAA. Securing the power grid: protecting smart grids and connected power systems from cyberattacks[J]. IEEE Power Electronics Magazine, 2017, 4(3): 20-27.
[7]
MAKRAKISG M, KOLIASC, KAMBOURAKISG, et al. Industrial and critical infrastructure security: technical analysis of real-life security incidents[J]. IEEE Access, 2021, 9: 165295-165325.
[8]
AKBARZADEHA.Dependency based risk analysis in Cyber-Physical Systems[D].Trondheim:Norwegian University of Science and Technology,2023:5-8.
[9]
FLÓREZJ, MONTOYAG A, LOZANO-GARZÓNC.An epidemiological SIS malware spreading model based on Markov chains for IoT networks[C]//Proceedings of Eighth International Congress on Information and Communication Technology.Singapore: Springer Nature Singapore, 2023:663-672.
[10]
JHUNB,JO M, KAHNGB.Simplicial SIS model in scale-free uniform hypergraph[J].Journal of Statistical Mechanics:Theory and Experiment,2019,12(12):123207.
[11]
DADLANIA, KUMARM S, KIMK,et al.Stability and immunization analysis of a malware spread model over scale-free networks[J].IEEE Communications Letters,2014,18(11):1907-1910.
[12]
DELREY A M, VARAR C, GONZÁLEZS R.A computational propagation model for malware based on the SIR classic model[J]. Neurocomputing,2022,484:161-171.
[13]
TAGHVAEIA, GEORGIOUT T, NORTONL,et al.Fractional SIR epidemiological models[J].Scientific Reports,2020,10:20882.
[14]
TAYNITSKIYV, GUBARE, ZHUQ Y.Optimal impulse control of bi-virus SIR epidemics with application to heterogeneous Internet of Things[C]//2017 Constructive Nonsmooth Analysis and Related Topics (Dedicated to the Memory of V.F.Demyanov).May 22-27,2017,St. Petersburg,Russia.IEEE,2017:1-4.
[15]
XIAOM, CHENS, ZHENGW X,et al.Tipping point prediction and mechanism analysis of malware spreading in cyber-physical systems[J]. Communications in Nonlinear Science and Numerical Simulation, 2023,122:107247.
[16]
DELREY A M, ENCINASA H, VAQUEROJ M,et al.A method for malware propagation in industrial critical infrastructures[J].Integrated Computer-Aided Engineering,2016,23(3):255-268.
[17]
MAHBOUBIA, CAMTEPES, MORARJIH.A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts[J].IEEE Access,2017,5:27740-27756.
[18]
YAOY, FUQ, YANGW,et al.An epidemic model of computer worms with time delay and variable infection rate[J].Security and Communication Networks,2018,2018:9756982.
[19]
YUZ H, GAOH X, WANGD,et al.SEI2RS malware propagation model considering two infection rates in cyber-physical systems[J].Physica A:Statistical Mechanics and its Applications,2022,597:127207.
[20]
YANGW, FUQ, YAOY.A malware propagation model with dual delay in the industrial control network[J].Complexity,2023,2023: 8823080.