Optimal control analysis of malware propagation in cloud environments

被引:5
作者
Tian, Liang [1 ,2 ]
Shang, Fengjun [1 ,2 ]
Gan, Chenquan [3 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Educ Commiss, Key Lab Comp Network & Commun Technol, Chongqing, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
关键词
cloud environment; virtual machine; malware; propagation model; optimal control; COMPUTER VIRUS; NETWORKS; DYNAMICS;
D O I
10.3934/mbe.2023649
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing has become a widespread technology that delivers a broad range of services across various industries globally. One of the crucial features of cloud infrastructure is virtual machine (VM) migration, which plays a pivotal role in resource allocation flexibility and reducing energy consumption, but it also provides convenience for the fast propagation of malware. To tackle the challenge of curtailing the proliferation of malware in the cloud, this paper proposes an effective strategy based on optimal dynamic immunization using a controlled dynamical model. The objective of the research is to identify the most efficient way of dynamically immunizing the cloud to minimize the spread of malware. To achieve this, we define the control strategy and loss and give the corresponding optimal control problem. The optimal control analysis of the controlled dynamical model is examined theoretically and experimentally. Finally, the theoretical and experimental results both demonstrate that the optimal strategy can minimize the incidence of infections at a reasonable loss.
引用
收藏
页码:14502 / 14517
页数:16
相关论文
共 50 条
  • [31] A method for malware propagation in industrial critical infrastructures
    Martin del Rey, A.
    Hernandez Encinas, A.
    Martin Vaquero, J.
    Queiruga Dios, A.
    Rodriguez Sanchez, G.
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2016, 23 (03) : 255 - 268
  • [32] Modeling Malware Propagation in Smartphone Social Networks
    Peng, Sancheng
    Wang, Guojun
    Yu, Shui
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 196 - 201
  • [33] Smartphone Malware and Its Propagation Modeling: A Survey
    Peng, Sancheng
    Yu, Shui
    Yang, Aimin
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 925 - 941
  • [34] Optimal Quarantining of Wireless Malware Through Reception Gain Control
    Khouzani, M. H. R.
    Altman, Eitan
    Sarkar, Saswati
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2012, 57 (01) : 49 - 61
  • [35] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [36] Optimal control of a stochastic rumour propagation in online social networks
    Myilsamy, Kalaiselvi
    Senthil Kumar, Muthukrishnan
    Satheesh Kumar, Athira
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2023, 34 (12):
  • [37] Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments
    Landman, Tom
    Nissim, Nir
    NEURAL NETWORKS, 2021, 144 : 648 - 685
  • [38] Optimal Control to Limit the Propagation Effect of a Virus Outbreak on a Network
    Di Giamberardino, Paolo
    Iacoviello, Daniela
    ICINCO: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS, VOL 1, 2019, : 455 - 462
  • [39] Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud
    Nissim, Nir
    Lahav, Omri
    Cohen, Aviad
    Elovici, Yuval
    Rokach, Lior
    COMPUTERS & SECURITY, 2019, 87
  • [40] Malware Development on Mobile Environments
    Papaleo, Gianluca
    Cambiaso, Enrico
    Patti, Luca
    Aiello, Maurizio
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 270 - 275