Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach
| UDC.coleccion | Investigación | es_ES |
| UDC.departamento | Enxeñaría Industrial | es_ES |
| UDC.endPage | 24 | es_ES |
| UDC.grupoInv | Ciencia e Técnica Cibernética (CTC) | es_ES |
| UDC.issue | 2 | es_ES |
| UDC.journalTitle | Mathematics | es_ES |
| UDC.startPage | 1 | es_ES |
| UDC.volume | 12 | es_ES |
| dc.contributor.author | Casado Vara, Roberto | |
| dc.contributor.author | Severt-Silva, Marcos | |
| dc.contributor.author | Díaz-Longueira, Antonio | |
| dc.contributor.author | Martin del Rey, Ángel | |
| dc.contributor.author | Calvo-Rolle, José Luis | |
| dc.date.accessioned | 2024-04-25T12:34:34Z | |
| dc.date.available | 2024-04-25T12:34:34Z | |
| dc.date.issued | 2024-01-12 | |
| dc.description.abstract | [Abstract] With the progress and evolution of the IoT, which has resulted in a rise in both the number of devices and their applications, there is a growing number of malware attacks with higher complexity. Countering the spread of malware in IoT networks is a vital aspect of cybersecurity, where mathematical modeling has proven to be a potent tool. In this study, we suggest an approach to enhance IoT security by installing security updates on IoT nodes. The proposed method employs a physically informed neural network to estimate parameters related to malware propagation. A numerical case study is conducted to evaluate the effectiveness of the mitigation strategy, and novel metrics are presented to test its efficacy. The findings suggest that the mitigation tactic involving the selection of nodes based on network characteristics is more effective than random node selection. | es_ES |
| dc.identifier.citation | Casado-Vara, R.; Severt, M.; Díaz-Longueira, A.; Rey, Á.M.d.; Calvo-Rolle, J.L. Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach. Mathematics 2024, 12, 250. https://doi.org/10.3390/math12020250 | es_ES |
| dc.identifier.doi | https://doi.org/10.3390/math12020250 | |
| dc.identifier.issn | 2227-7390 | |
| dc.identifier.uri | http://hdl.handle.net/2183/36352 | |
| dc.language.iso | eng | es_ES |
| dc.publisher | MDPI | es_ES |
| dc.relation.uri | https://doi.org/10.3390/math12020250 | es_ES |
| dc.rights | Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). | es_ES |
| dc.rights.accessRights | open access | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by/3.0/es/ | * |
| dc.subject | Malware propagation | es_ES |
| dc.subject | Individual-based SIR model | es_ES |
| dc.subject | PINN | es_ES |
| dc.subject | Inverse problem | es_ES |
| dc.subject | Malware mitigation | es_ES |
| dc.subject | IoT networks | es_ES |
| dc.title | Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach | es_ES |
| dc.type | journal article | es_ES |
| dspace.entity.type | Publication | |
| relation.isAuthorOfPublication | 2fdbaa46-5d36-406c-bce3-8ae6aa50c3a6 | |
| relation.isAuthorOfPublication | 89839e9c-9a8a-4d27-beb7-476cfab8965e | |
| relation.isAuthorOfPublication.latestForDiscovery | 2fdbaa46-5d36-406c-bce3-8ae6aa50c3a6 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Casado-Vara_Roberto_2024_Dynamic_Malware_Mitigation_Strategies_for_IoT_Networks.pdf
- Size:
- 1.71 MB
- Format:
- Adobe Portable Document Format
- Description:

