Mathematical analysis of the dynamics of cyberattack propagation in IoT networks
- PMID: 40378094
- PMCID: PMC12083842
- DOI: 10.1371/journal.pone.0322391
Mathematical analysis of the dynamics of cyberattack propagation in IoT networks
Erratum in
-
Correction: Mathematical analysis of the dynamics of cyberattack propagation in IoT networks.PLoS One. 2025 Dec 22;20(12):e0339507. doi: 10.1371/journal.pone.0339507. eCollection 2025. PLoS One. 2025. PMID: 41428631 Free PMC article.
Abstract
The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by studying how malware spreads. In this study, we use a discrete-time approach to better model how cyberattacks spread across IoT networks. We also focus on the role of firewalls, developing a strategy to optimize their effectiveness in slowing down the spread of malware. Additionally, we analyze the reproduction number's sensitivity and explore the proposed discrete system's local and global stability. The model was simulated and analyzed using Python packages, providing practical solutions to improve cybersecurity in IoT networks. These insights are supported by numerical simulations based on real-world data.
Copyright: © 2025 AbuHour et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Conflict of interest statement
The authors have declared that no competing interests exist.
Figures
References
-
- Alashhab ZR, Anbar M, Singh MM, Hasbullah IH, Jain P, Al-Amiedy TA. Distributed Denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy. Appl Sci 2022;12(23):12441. 10.3390/app122312441 - DOI
-
- Ahmad A, Abu-Hour Y, DarAssi MH. Effects of computer networks’ viruses under the of removable devices. Int J Dyn Syst Differ Equ 2020;10(3):233–48. doi: 10.1504/IJDSDE.2020.107808 - DOI
-
- De Neira AB, Kantarci B, Nogueira M. Distributed denial of service attack prediction: challenges, open issues and opportunities. Comput Netw. 2023;222:109553. doi: 10.1016/j.comnet.2022.109553 - DOI
-
- Kumar V, Kumar V, Sinha D, Das AK. Simulation analysis of DDoS attack in IoT environment. In: 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019: Internet of Things and Connected Technologies. Springer; 2020. pp. 77–87.
-
- Machaka P, Ajayi O, Kahenga F, Bagula A, Kyamakya K. Modelling DDoS attacks in IoT networks using machine learning. In: International Conference on Emerging Technologies for Developing Countries. Springer; 2022. pp. 161–75.
MeSH terms
LinkOut - more resources
Full Text Sources
