Han, Xie; Li, Yi-Hong; Feng, Li-Ping; Song, Li-Peng Influence of removable devices’ heterouse on the propagation of malware. (English) Zbl 1291.68030 Abstr. Appl. Anal. 2013, Article ID 296940, 6 p. (2013). Summary: The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. As a result, in this paper, we present a model incorporating the heterogeneous use of removable devices, obtained by dividing the using rate into local area’s rate, neighbour area’s rate and global area’s rate, and then getting the final rate by multiplying the corresponding area ratio. The model’s equilibria and their stability conditions are obtained mathematically and verified by deterministic and stochastic simulations. Simulation results also indicate that the heterogeneity in using rate significantly changes the prospective propagation course of malware. Additionally, the thresholds of removable devices’ using rate in neighbour area are given, which can guide us in designing effective countermalware method. Cited in 1 Document MSC: 68M10 Network design and communication in computer systems 68M11 Internet topics PDF BibTeX XML Cite \textit{X. Han} et al., Abstr. Appl. Anal. 2013, Article ID 296940, 6 p. (2013; Zbl 1291.68030) Full Text: DOI References: [1] Zou, C. C.; Towsley, D.; Gong, W., Modeling and simulation study of the propagation and defense of internet e-mail worms, IEEE Transactions on Dependable and Secure Computing, 4, 2, 106-118 (2007) [2] Li, Y.; Pan, J. X.; Jin, Z., Dynamic modeling and analysis of the email virus propagation, Discrete Dynamics in Nature and Society, 2012 (2012) · Zbl 1248.90033 [3] Mishra, B. K.; Pandey, S. K., Effect of anti-virus software on infectious nodes in computer network: a mathematical model, Physics Letters A, 376, 35, 2389-2393 (2012) [4] Song, L. P.; Jin, Z.; Sun, G. Q., Modeling and analyzing of botnet interactions, Physica A, 390, 2, 347-358 (2010) [5] Yang, L.; Yang, X.; Liu, J.; Zhu, Q.; Gan, C., Epidemics of computer viruses: a complex-network approach, Applied Mathematics and Computation, 219, 16, 8705-8717 (2013) · Zbl 1288.92025 [6] Symantec Security Response [7] Kaspersky Security Bulletin, Monthly Malware Statistics [8] Flame (malware) [9] Song, L. P.; Jin, Z.; Sun, G. Q.; Zhang, J.; Han, X., Influence of removable devices on computer worms: dynamic analysis and control strategies, Computers & Mathematics with Applications, 61, 7, 1823-1829 (2011) · Zbl 1219.37065 [10] Jin, C.; Wang, X. Y., Analysis and control stratagems of flash disk virus dynamic propagation model, Security and Communication Networks, 5, 2, 226-235 (2012) [11] Yang, L. X.; Yang, X., The spread of computer viruses under the influence of removable storage devices, Applied Mathematics and Computation, 219, 8, 3914-3922 (2012) · Zbl 1311.68039 [12] Zhu, Q.; Yang, X.; Ren, J., Modeling and analysis of the spread of computer virus, Communications in Nonlinear Science and Numerical Simulation, 17, 12, 5117-5124 (2012) · Zbl 1261.93012 [13] Peng, Z. Z.; Song, L. P.; Li, G. H.; Li, Y. H., Modeling and analyzing the spread of Flash Disk worms via multiple subnets · Zbl 1418.68013 [14] Murray, J. D., Mathematical Biology (2003), Berlin, Germany: Springer, Berlin, Germany · Zbl 1006.92002 [15] Anderson, R. M.; May, R. M.; Anderson, B., Infectious Diseases in Humans: Dynamics and Control (1991), New York, NY, USA: Oxford University Press, New York, NY, USA [16] Barbashin, E. A., Introduction to the Theory of Stability (1970), Groningen, Netherlands: Wolters-Noordhoff, Groningen, Netherlands · Zbl 0198.19703 [17] LaSalle, J. P.; Lefschetz, S., Stability by Liapunov’s Direct Method, with Applications (1961), New York, NY, USA: Academic Press, New York, NY, USA [18] Gillespie, D. T., Exact stochastic simulation of coupled chemical reactions, Journal of Physical Chemistry, 81, 25, 2340-2361 (1977) [19] Arnaud, D.; Nando de, F.; Neil, G., Sequential Monte Carlo Methods in Practice (2001), New York, NY, USA: Springer, New York, NY, USA · Zbl 0967.00022 This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.