Analysis and Optimal Control of Propagation Model for Malware in Multi-Cloud Environments with Impact of Brownian Motion Process
Abstract
:1. Introduction
2. Deterministic MMCE Model
- (1)
- All of the involved transmission rates are positive.
- (2)
- New servers are added to the dynamic network in every possible network state.
- (3)
- The virus can only propagate across infected servers.
- (4)
- Susceptible servers have the ability to transition from one state to the protected one without going through further phases.
- (5)
- Without first going through the tracing state, isolated servers are unable to transition to the semi-protected state.
- (6)
- Traced servers have the ability to enter the protective state instantly.
- (7)
- There is a constant rate of disconnection for every server on the network.
2.1. Existence and Uniqueness
- Using the Lipschitz condition for , we obtain
- Setting , we obtain
- is obtained by taking the limit of inequality (10) as and applying the constraint . This means that . In a similar manner, the following inequalities are obtained:
- Hence, , as . System (1)’s existence is thus established.
- Uniqueness. Let and be the solution sets to the model (1) s.t.
- Then, using , we obtain
- So, . At last, one obtains , that is, . In the same way, we can obtain
2.2. Equilibrium Points and Stability Analysis
2.3. Analyzing Optimal Control
3. Stochastic MMCE Model
3.1. Existence and Uniqueness of Positive Solution
- , the coefficients given in Equation (19) are defined and locally Lipschitzian. So, there lies a local unique solution
- of the problem over . In order to determine the solution’s global nature, we must demonstrate that almost surely (a.s.). Assume that we have a sufficiently large, non-negative number , and that all initial approximations of the state variables are given within . For every non-negative integer , let the time required to reach completion be given as
3.2. Extinction
3.3. Optimal Control Analysis
4. Results and Conclusions
4.1. Results Analysis
4.2. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zhu, X.; Wang, J.; Guo, H.; Zhu, D.; Yang, L.T.; Liu, L. Fault-Tolerant Scheduling for Real-Time Scientific Workflows with Elastic Resource Provisioning in Virtualized Clouds. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 3501–3517. [Google Scholar] [CrossRef]
- Pluzhnik, E.; Nikulchev, E. Virtual laboratories in cloud infrastructure of educational institutions. In Proceedings of the 2nd International Conference on Emission Electronics (ICEE), Saint-Petersburg, Russia, 30 June–4 July 2014; pp. 1–3. [Google Scholar]
- Ali, M.; Khan, S.U.; Vasilakos, A.V. Security in cloud computing: Opportunities and challenges. Inform. Sci. 2015, 305, 357–383. [Google Scholar] [CrossRef]
- Ezhilchelvan, P.D.; Mitrani, I. Evaluating the probability of malicious coresidency in public clouds. IEEE Trans. Cloud Comput. 2015, 5, 420–427. [Google Scholar] [CrossRef]
- Jansen, P.W.A. Cloud hooks: Security and privacy issues in cloud computing. In Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS), Kauai, HI, USA, 4–7 January 2011; pp. 1–10. [Google Scholar]
- Merabet, H.E.; Hajraoui, A. A survey of malware detection techniques based on machine learning. Int. J. Adv. Comput. Sci. Appl. 2019, 10. [Google Scholar] [CrossRef]
- Lu, K.; Cheng, J.; Yan, A. Malware detection based on the feature selection of a correlation information decision matrix. Mathematics 2023, 11, 961. [Google Scholar] [CrossRef]
- Zhu, Q.; Liu, Y.; Luo, X.; Cheng, K. A malware propagation model considering conformity psychology in social networks. Axioms 2022, 11, 632. [Google Scholar] [CrossRef]
- Ye, X.; Xie, S.; Shen, S. SIR1R2: Characterizing malware propagation in wsns with second immunization. IEEE Access 2021, 9, 82083–82093. [Google Scholar] [CrossRef]
- Dong, N.P.; Long, H.V.; Son, N.T.K. The dynamical behaviors of fractional-order SE1E2IQR epidemic model for malware propagation on wireless sensor network. Commun. Nonlinear Sci. Numer. Simul. 2022, 111, 106428. [Google Scholar] [CrossRef]
- Al-Tuwairqi, S.M.; Bahashwan, W.S. The impact of quarantine strategies on malware dynamics in a network with heterogeneous immunity. Math. Model. Anal. 2022, 27, 282–302. [Google Scholar] [CrossRef]
- Martin del Rey, A.; Hernandez, G.; Bustos Tabernero, A.; Queiruga Dios, A. Advanced malware propagation on random complex networks. Neurocomputing 2021, 423, 689–696. [Google Scholar] [CrossRef]
- Piqueira, J.R.C.; Cabrera, M.A.; Batistela, C.M. Malware propagation in clustered computer networks. Phys. A Stat. Mech. Appl. 2021, 573, 125958. [Google Scholar] [CrossRef]
- Omar, O.A.; Elbarkouky, R.A.; Ahmed, H.M. Fractional stochastic models for COVID-19: Case study of Egypt. Results Phys. 2021, 23, 104018. [Google Scholar] [CrossRef] [PubMed]
- Ahmed, A.M.S.; Ahmed, H.M.; Nofal, T.A.; Darwish, A.; Omar, O.A.M. Hilfer-Katugampola fractional epidemic model for malware propagation with optimal control. Ain Shams Eng. J. 2024, 15, 102945. [Google Scholar] [CrossRef]
- Omar, O.A.M.; Alnafisah, Y.; Elbarkouky, R.A.; Ahmed, H.M. COVID-19 deterministic and stochastic modelling with optimized daily vaccinations in Saudi Arabia. Results Phys. 2021, 28, 104629. [Google Scholar] [CrossRef] [PubMed]
- Jafar, M.T.; Yang, L.-X.; Li, G.; Zhu, Q.; Gan, C. Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach. IEEE Trans. Inf. Forensics Secur. 2024, 19, 9682–9697. [Google Scholar] [CrossRef]
- Jafar, M.T.; Yang, L.X.; Li, G.; Zhu, Q.; Gan, C.; Yang, X. Malware containment with immediate response in IoT networks: An optimal control approach. Comput. Commun. 2024, 228, 107951. [Google Scholar] [CrossRef]
- Abazari, F.; Analoui, M.; Takabi, H. Dynamical propagation model of malware for cloud computing security. Comput. Secur. 2016, 58, 139–148. [Google Scholar] [CrossRef]
- Gan, C.; Feng, Q.; Zhang, X.; Zhang, Z.; Zhu, Q. Effect of anti-malware software on infectious nodes in cloud environment. IEEE Access 2020, 8, 20325–20333. [Google Scholar] [CrossRef]
- Ndaïrou, F.; Area, I.; Nieto, J.J.; Torres, D.F.M. Mathematical modeling of COVID-19 transmission dynamics with a case study of Wuhan. Chaos Solit. Fract. 2020, 135, 10846. [Google Scholar] [CrossRef]
- Mao, X.; Marion, G.; Renshaw, E. Environmental Brownian noise suppresses explosions in population dynamics. Stoch. Process. Appl. 2002, 97, 95–110. [Google Scholar] [CrossRef]
- May, R. Stability and Complexity in Model Ecosystems; Princeton University: Princeton, NJ, USA, 1973. [Google Scholar]
- Li, R.; Guo, X. Dynamics of a stochastic SEIR epidemic model with vertical transmission and standard incidence. Mathematics 2024, 12, 359. [Google Scholar] [CrossRef]
Rates | Description |
---|---|
Entering Rate of Susceptible Servers | |
Entering Rate of Infected Academic and Educational Servers | |
Entering Rate of Infected Healthcare Servers | |
Entering Rate of Infected Financial Services Servers | |
Entering Rate of Infected Media Servers | |
Entering Rate of Isolated Academic and Educational Servers | |
Entering Rate of Isolated Healthcare Servers | |
Entering Rate of Isolated Financial Services Servers | |
Entering Rate of Isolated Media Servers | |
Entering Rate of Traced Servers | |
Entering Rate of Semi-protected Servers | |
Entering Rate of Protected Servers | |
Infection Rate of Academic and Educational Servers | |
Infection Rate of Healthcare Servers | |
Infection Rate of Financial Services Servers | |
Infection Rate of Media Servers | |
Reinstalling System Rate of Infected Academic and Educational Servers | |
Reinstalling Rate of Healthcare Servers | |
Reinstalling Rate of Financial Services Servers | |
Reinstalling Rate of Media Servers | |
Isolation Rate of Infected Academic and Educational Servers | |
Isolation Rate of Infected Healthcare Servers | |
Isolation Rate of Infected Financial Services Servers | |
Isolation Rate of Infected Media Servers | |
Tracing Rate of Isolated Academic and Educational Servers | |
Tracing Rate of Isolated Healthcare Servers | |
Tracing Rate of Isolated Financial Services Servers | |
Tracing Rate of Isolated Media Servers | |
Transmission Rate from Traced into Semi-protected Servers | |
Transmission Rate from Traced into Protected Servers | |
Transmission Rate from Semi-protected into Protected Servers | |
Antivirus Expiry Rate | |
Antivirus Installing Rate | |
d | Removal Rate of the Cloud Environment |
Stochastic Diffusion Coefficient |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Omar, O.A.M.; Ahmed, H.M.; Nofal, T.A.; Darwish, A.; Ahmed, A.M.S. Analysis and Optimal Control of Propagation Model for Malware in Multi-Cloud Environments with Impact of Brownian Motion Process. Math. Comput. Appl. 2025, 30, 8. https://doi.org/10.3390/mca30010008
Omar OAM, Ahmed HM, Nofal TA, Darwish A, Ahmed AMS. Analysis and Optimal Control of Propagation Model for Malware in Multi-Cloud Environments with Impact of Brownian Motion Process. Mathematical and Computational Applications. 2025; 30(1):8. https://doi.org/10.3390/mca30010008
Chicago/Turabian StyleOmar, Othman A. M., Hamdy M. Ahmed, Taher A. Nofal, Adel Darwish, and A. M. Sayed Ahmed. 2025. "Analysis and Optimal Control of Propagation Model for Malware in Multi-Cloud Environments with Impact of Brownian Motion Process" Mathematical and Computational Applications 30, no. 1: 8. https://doi.org/10.3390/mca30010008
APA StyleOmar, O. A. M., Ahmed, H. M., Nofal, T. A., Darwish, A., & Ahmed, A. M. S. (2025). Analysis and Optimal Control of Propagation Model for Malware in Multi-Cloud Environments with Impact of Brownian Motion Process. Mathematical and Computational Applications, 30(1), 8. https://doi.org/10.3390/mca30010008