{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:17:29Z","timestamp":1775002649116,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the rapid advancement of Internet of Things networks and its significant cybersecurity challenges, the proposal of models capable of studying malware propagation within these structures has become highly relevant. This paper aims to formulate and implement an SEIRS-NIMFA model to analyze the dissemination of malware infections with a latency period. To accomplish this, we mathematically articulated an SEIRS epidemiological model using an individual-based approach and implemented it using Python. In addition, this paper examines how varying the network size and density, the initially infected device, and several model parameters influence the propagation dynamics. Moreover, to address the Markov chain approach\u2019s high temporal and spatial complexity, we use the n-intertwined mean-field approximation method. Our findings demonstrate that our proposal can effectively aid decision-making in implementing security measures in real-world situations. Finally, our proposal and its implementation are open to further enhancements, broadening their potential applications.<\/jats:p>","DOI":"10.1186\/s42400-024-00310-z","type":"journal-article","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T04:35:43Z","timestamp":1736138143000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks"],"prefix":"10.1186","volume":"8","author":[{"given":"Laura","family":"Quiroga-S\u00e1nchez","sequence":"first","affiliation":[]},{"given":"Germ\u00e1n A.","family":"Montoya","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Lozano-Garzon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,6]]},"reference":[{"key":"310_CR1","doi-asserted-by":"publisher","unstructured":"Abusitta A, Carvalho G, Wahab OA, Halabi T, Fung B, Mamoori SA (2023) Deep learning-enabled anomaly detection for iot systems. Internet of Things 21. https:\/\/doi.org\/10.1016\/j.iot.2022.100656","DOI":"10.1016\/j.iot.2022.100656"},{"key":"310_CR2","doi-asserted-by":"crossref","unstructured":"Alshaer M, Cotae P (2020) On identifying the critical nodes and vulnerable edges for increasing network security. In: 2018 St.Lawrence Section Meeting. ASEE Conferences, Ithaca, NY https:\/\/peer.asee.org\/33947","DOI":"10.18260\/1-2-00.620-33947"},{"key":"310_CR3","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y (2017) Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), Vancouver, BC, pp. 1093\u20131110. USENIX Association"},{"key":"310_CR4","doi-asserted-by":"publisher","unstructured":"Bonaccorsi S, Turri S (2020) Deterministic and Stochastic Mean-Field SIRS Models on Heterogeneous Networks. In: Atay FM, Kurasov PB, Mugnolo D (eds.) Discrete and Continuous Models in the Theory of Networks, vol. 281, pp. 67\u201389. Birkh\u00e4user Cham, Gewerbestrasse 11, 6330 Cham, Switzerland. https:\/\/doi.org\/10.1007\/978-3-030-44097-8","DOI":"10.1007\/978-3-030-44097-8"},{"key":"310_CR5","doi-asserted-by":"publisher","unstructured":"Fl\u00f3rez J, Montoya GA, Lozano-Garz\u00f3n C (2023) An epidemiological sis malware spreading model based on markov chains for iot networks. In: Yang XS, Sherratt RS, Dey N, Joshi A (eds.) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol. 693. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-99-3243-6_53","DOI":"10.1007\/978-981-99-3243-6_53"},{"key":"310_CR6","doi-asserted-by":"crossref","unstructured":"Galv\u00e1n M (2024) A NIMFA Epidemiological Model for Analyzing Malware Behavior in IoT Networks. Accepted paper in 9th International Congress on Information and Communication Technology","DOI":"10.1007\/978-981-97-5441-0_28"},{"key":"310_CR7","doi-asserted-by":"publisher","unstructured":"Groves-Kirkby N, Wakeman E, Patel S, Hinch R, Poot T, Pearson J, Fraser C (2023) Large-scale calibration and simulation of covid-19 epidemiologic scenarios to support healthcare planning. Epidemics 42. https:\/\/doi.org\/10.1016\/j.epidem.2022.100662","DOI":"10.1016\/j.epidem.2022.100662"},{"key":"310_CR8","doi-asserted-by":"publisher","unstructured":"Haghrah AA, Ghaemi S, Badamchizadeh MA (2022) Fuzzy-sird model: Forecasting covid-19 death tolls considering governments intervention. Artificial Intelligence in Medicine 134. https:\/\/doi.org\/10.1016\/j.artmed.2022.102422","DOI":"10.1016\/j.artmed.2022.102422"},{"key":"310_CR9","doi-asserted-by":"publisher","unstructured":"Kumari P, Jain AK (2023) A comprehensive study of ddos attacks over iot network and their countermeasures. Computers and Security 127. https:\/\/doi.org\/10.1016\/j.cose.2023.103096","DOI":"10.1016\/j.cose.2023.103096"},{"key":"310_CR10","unstructured":"Lueth KL, Hasan M, Sinha S, Annaswamy S, Wegner P, Bruegge F, Kulezak M (2022) Market Insights for the Internet of Things: State of IoT \u2013 Spring 2022. IoT Analytics https:\/\/iot-analytics.com\/product\/state-of-iot-spring-2022\/"},{"key":"310_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044277","author":"A Mahboubi","year":"2020","unstructured":"Mahboubi A, Camtepe S, Ansari K (2020) Stochastic modeling of iot botnet spread: A short survey on mobile malware spread modeling. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2020.3044277","journal-title":"IEEE Access"},{"key":"310_CR12","doi-asserted-by":"publisher","first-page":"5415724","DOI":"10.1155\/2021\/5415724","volume":"2021","author":"I Mart\u00ednez","year":"2021","unstructured":"Mart\u00ednez I, Flori\u00e1n A, D\u00edaz-L\u00f3pez D, Nespoli P, G\u00f3mez F (2021) Malseirs: Forecasting malware spread based on compartmental models in epidemiology. Complexity 2021:5415724. https:\/\/doi.org\/10.1155\/2021\/5415724","journal-title":"Complexity"},{"key":"310_CR13","doi-asserted-by":"publisher","unstructured":"Pekar A, Mocnej J, Seah WKG, Zolotova, I (2020) Application domain-based overview of iot network traffic characteristics. ACM Computing Surveys 53(4) https:\/\/doi.org\/10.1145\/3399669","DOI":"10.1145\/3399669"},{"key":"310_CR14","unstructured":"Quiroga-S\u00e1nchez L (2024) SEIRS-NIMFA Model for Infectious Disease Dynamics. Accessed: May 20, https:\/\/github.com\/Lauraquiroga\/SEIRSModel"},{"key":"310_CR15","unstructured":"SonicWall: Mid-year update: 2022 SonicWall Cyber Threat Report. https:\/\/www.sonicwall.com\/medialibrary\/en\/white-paper\/mid-year-2022-cyber-threat-report.pdf. (2022-MidYearThreatReport-JK-6641) (2022)"},{"key":"310_CR16","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s00607-011-0155-y","volume":"93","author":"P Van Mieghem","year":"2011","unstructured":"Van Mieghem P (2011) The n-intertwined sis epidemic network model. Computing 93:147\u2013169. https:\/\/doi.org\/10.1007\/s00607-011-0155-y","journal-title":"Computing"},{"key":"310_CR17","doi-asserted-by":"publisher","unstructured":"Zhu X, Huang J (2023) Spreadrank: A novel approach for identifying influential spreaders in complex networks. Entropy 25(4) https:\/\/doi.org\/10.3390\/e25040637 . Cited by: 3; All Open Access, Gold Open Access, Green Open Access","DOI":"10.3390\/e25040637"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00310-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00310-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00310-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T05:03:41Z","timestamp":1736139821000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00310-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["310"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00310-z","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,6]]},"assertion":[{"value":"23 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have not competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}