Simulated network for 2000 devices.
<div><p>The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by stu...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , , |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1852020319947063296 |
|---|---|
| author | Yousef AbuHour (17536686) |
| author2 | Sadeq Damrah (21376624) Mahmoud H. DarAssi (18880675) Zuhur Alqahtani (17459774) Areej Almuneef (17459771) |
| author2_role | author author author author |
| author_facet | Yousef AbuHour (17536686) Sadeq Damrah (21376624) Mahmoud H. DarAssi (18880675) Zuhur Alqahtani (17459774) Areej Almuneef (17459771) |
| author_role | author |
| dc.creator.none.fl_str_mv | Yousef AbuHour (17536686) Sadeq Damrah (21376624) Mahmoud H. DarAssi (18880675) Zuhur Alqahtani (17459774) Areej Almuneef (17459771) |
| dc.date.none.fl_str_mv | 2025-05-16T17:22:59Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0322391.g002 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/figure/Simulated_network_for_2000_devices_/29088331 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Biotechnology Infectious Diseases Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified providing practical solutions numerical simulations based xlink "> time approach severe concern military organizations mathematical analysis improve cybersecurity growing threat global stability cyberattack propagation also focus |
| dc.title.none.fl_str_mv | Simulated network for 2000 devices. |
| dc.type.none.fl_str_mv | Image Figure info:eu-repo/semantics/publishedVersion image |
| description | <div><p>The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by studying how malware spreads. In this study, we use a discrete-time approach to better model how cyberattacks spread across IoT networks. We also focus on the role of firewalls, developing a strategy to optimize their effectiveness in slowing down the spread of malware. Additionally, we analyze the reproduction number’s sensitivity and explore the proposed discrete system’s local and global stability. The model was simulated and analyzed using Python packages, providing practical solutions to improve cybersecurity in IoT networks. These insights are supported by numerical simulations based on real-world data.</p></div> |
| eu_rights_str_mv | openAccess |
| id | Manara_ccbeceaa721ddb4f0a3ffefaefa9a9cb |
| identifier_str_mv | 10.1371/journal.pone.0322391.g002 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/29088331 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Simulated network for 2000 devices.Yousef AbuHour (17536686)Sadeq Damrah (21376624)Mahmoud H. DarAssi (18880675)Zuhur Alqahtani (17459774)Areej Almuneef (17459771)BiotechnologyInfectious DiseasesBiological Sciences not elsewhere classifiedMathematical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedproviding practical solutionsnumerical simulations basedxlink ">time approachsevere concernmilitary organizationsmathematical analysisimprove cybersecuritygrowing threatglobal stabilitycyberattack propagationalso focus<div><p>The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by studying how malware spreads. In this study, we use a discrete-time approach to better model how cyberattacks spread across IoT networks. We also focus on the role of firewalls, developing a strategy to optimize their effectiveness in slowing down the spread of malware. Additionally, we analyze the reproduction number’s sensitivity and explore the proposed discrete system’s local and global stability. The model was simulated and analyzed using Python packages, providing practical solutions to improve cybersecurity in IoT networks. These insights are supported by numerical simulations based on real-world data.</p></div>2025-05-16T17:22:59ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0322391.g002https://figshare.com/articles/figure/Simulated_network_for_2000_devices_/29088331CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/290883312025-05-16T17:22:59Z |
| spellingShingle | Simulated network for 2000 devices. Yousef AbuHour (17536686) Biotechnology Infectious Diseases Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified providing practical solutions numerical simulations based xlink "> time approach severe concern military organizations mathematical analysis improve cybersecurity growing threat global stability cyberattack propagation also focus |
| status_str | publishedVersion |
| title | Simulated network for 2000 devices. |
| title_full | Simulated network for 2000 devices. |
| title_fullStr | Simulated network for 2000 devices. |
| title_full_unstemmed | Simulated network for 2000 devices. |
| title_short | Simulated network for 2000 devices. |
| title_sort | Simulated network for 2000 devices. |
| topic | Biotechnology Infectious Diseases Biological Sciences not elsewhere classified Mathematical Sciences not elsewhere classified Information Systems not elsewhere classified providing practical solutions numerical simulations based xlink "> time approach severe concern military organizations mathematical analysis improve cybersecurity growing threat global stability cyberattack propagation also focus |