Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2025 May 16;20(5):e0322391.
doi: 10.1371/journal.pone.0322391. eCollection 2025.

Mathematical analysis of the dynamics of cyberattack propagation in IoT networks

Affiliations

Mathematical analysis of the dynamics of cyberattack propagation in IoT networks

Yousef AbuHour et al. PLoS One. .

Abstract

The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by studying how malware spreads. In this study, we use a discrete-time approach to better model how cyberattacks spread across IoT networks. We also focus on the role of firewalls, developing a strategy to optimize their effectiveness in slowing down the spread of malware. Additionally, we analyze the reproduction number's sensitivity and explore the proposed discrete system's local and global stability. The model was simulated and analyzed using Python packages, providing practical solutions to improve cybersecurity in IoT networks. These insights are supported by numerical simulations based on real-world data.

PubMed Disclaimer

Conflict of interest statement

The authors have declared that no competing interests exist.

Figures

Fig 1
Fig 1. Illustration of model compartment links.
Fig 2
Fig 2. Simulated network for 2000 devices.
Fig 3
Fig 3. Simulated network for interactions between attackers and targets (330 devices).
Fig 4
Fig 4. Comparison of stochastic (Monte Carlo) and deterministic solutions for the dynamics of attackers and IoT devices.
Fig 5
Fig 5. The reproduction number of attacking population analysis.
Fig 6
Fig 6. The reproduction number RTarget of targeted population analysis.
Fig 7
Fig 7. PRCC elasticity analysis of R0Target.
Fig 8
Fig 8. PRCC of R0a analysis.
Fig 9
Fig 9. Sensitivity analysis of the reproduction number R0 to key parameters.
Fig 10
Fig 10. Sensitivity analysis of Ma (malicious attackers) to βa.
Fig 11
Fig 11. R0>1 compartment analysis when we have successful attack.
Fig 12
Fig 12. R0<1 compartment analysis when the cyberattack failed.
Fig 13
Fig 13. The proportion of compromised devices during a cyber IoT attack.
Fig 14
Fig 14. An optimal control strategy for firewall protection fp
Fig 15
Fig 15. Comparison of attacker and target populations with and without control strategy.

Similar articles

References

    1. Alashhab ZR, Anbar M, Singh MM, Hasbullah IH, Jain P, Al-Amiedy TA. Distributed Denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy. Appl Sci 2022;12(23):12441. 10.3390/app122312441 - DOI
    1. Ahmad A, Abu-Hour Y, DarAssi MH. Effects of computer networks’ viruses under the of removable devices. Int J Dyn Syst Differ Equ 2020;10(3):233–48. doi: 10.1504/IJDSDE.2020.107808 - DOI
    1. De Neira AB, Kantarci B, Nogueira M. Distributed denial of service attack prediction: challenges, open issues and opportunities. Comput Netw. 2023;222:109553. doi: 10.1016/j.comnet.2022.109553 - DOI
    1. Kumar V, Kumar V, Sinha D, Das AK. Simulation analysis of DDoS attack in IoT environment. In: 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019: Internet of Things and Connected Technologies. Springer; 2020. pp. 77–87.
    1. Machaka P, Ajayi O, Kahenga F, Bagula A, Kyamakya K. Modelling DDoS attacks in IoT networks using machine learning. In: International Conference on Emerging Technologies for Developing Countries. Springer; 2022. pp. 161–75.

LinkOut - more resources