Simulated network for 2000 devices.

<div><p>The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by stu...

Full description

Saved in:
Bibliographic Details
Main Author: Yousef AbuHour (17536686) (author)
Other Authors: Sadeq Damrah (21376624) (author), Mahmoud H. DarAssi (18880675) (author), Zuhur Alqahtani (17459774) (author), Areej Almuneef (17459771) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1852020319947063296
author Yousef AbuHour (17536686)
author2 Sadeq Damrah (21376624)
Mahmoud H. DarAssi (18880675)
Zuhur Alqahtani (17459774)
Areej Almuneef (17459771)
author2_role author
author
author
author
author_facet Yousef AbuHour (17536686)
Sadeq Damrah (21376624)
Mahmoud H. DarAssi (18880675)
Zuhur Alqahtani (17459774)
Areej Almuneef (17459771)
author_role author
dc.creator.none.fl_str_mv Yousef AbuHour (17536686)
Sadeq Damrah (21376624)
Mahmoud H. DarAssi (18880675)
Zuhur Alqahtani (17459774)
Areej Almuneef (17459771)
dc.date.none.fl_str_mv 2025-05-16T17:22:59Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0322391.g002
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/Simulated_network_for_2000_devices_/29088331
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Biotechnology
Infectious Diseases
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
providing practical solutions
numerical simulations based
xlink ">
time approach
severe concern
military organizations
mathematical analysis
improve cybersecurity
growing threat
global stability
cyberattack propagation
also focus
dc.title.none.fl_str_mv Simulated network for 2000 devices.
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <div><p>The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by studying how malware spreads. In this study, we use a discrete-time approach to better model how cyberattacks spread across IoT networks. We also focus on the role of firewalls, developing a strategy to optimize their effectiveness in slowing down the spread of malware. Additionally, we analyze the reproduction number’s sensitivity and explore the proposed discrete system’s local and global stability. The model was simulated and analyzed using Python packages, providing practical solutions to improve cybersecurity in IoT networks. These insights are supported by numerical simulations based on real-world data.</p></div>
eu_rights_str_mv openAccess
id Manara_ccbeceaa721ddb4f0a3ffefaefa9a9cb
identifier_str_mv 10.1371/journal.pone.0322391.g002
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/29088331
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Simulated network for 2000 devices.Yousef AbuHour (17536686)Sadeq Damrah (21376624)Mahmoud H. DarAssi (18880675)Zuhur Alqahtani (17459774)Areej Almuneef (17459771)BiotechnologyInfectious DiseasesBiological Sciences not elsewhere classifiedMathematical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedproviding practical solutionsnumerical simulations basedxlink ">time approachsevere concernmilitary organizationsmathematical analysisimprove cybersecuritygrowing threatglobal stabilitycyberattack propagationalso focus<div><p>The growing threat of cyberattacks is a severe concern to governments, military organizations, and industries, especially with the increasing use of Internet of Things (IoT) devices. To tackle this issue, researchers are working on ways to predict and prevent these attacks by studying how malware spreads. In this study, we use a discrete-time approach to better model how cyberattacks spread across IoT networks. We also focus on the role of firewalls, developing a strategy to optimize their effectiveness in slowing down the spread of malware. Additionally, we analyze the reproduction number’s sensitivity and explore the proposed discrete system’s local and global stability. The model was simulated and analyzed using Python packages, providing practical solutions to improve cybersecurity in IoT networks. These insights are supported by numerical simulations based on real-world data.</p></div>2025-05-16T17:22:59ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0322391.g002https://figshare.com/articles/figure/Simulated_network_for_2000_devices_/29088331CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/290883312025-05-16T17:22:59Z
spellingShingle Simulated network for 2000 devices.
Yousef AbuHour (17536686)
Biotechnology
Infectious Diseases
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
providing practical solutions
numerical simulations based
xlink ">
time approach
severe concern
military organizations
mathematical analysis
improve cybersecurity
growing threat
global stability
cyberattack propagation
also focus
status_str publishedVersion
title Simulated network for 2000 devices.
title_full Simulated network for 2000 devices.
title_fullStr Simulated network for 2000 devices.
title_full_unstemmed Simulated network for 2000 devices.
title_short Simulated network for 2000 devices.
title_sort Simulated network for 2000 devices.
topic Biotechnology
Infectious Diseases
Biological Sciences not elsewhere classified
Mathematical Sciences not elsewhere classified
Information Systems not elsewhere classified
providing practical solutions
numerical simulations based
xlink ">
time approach
severe concern
military organizations
mathematical analysis
improve cybersecurity
growing threat
global stability
cyberattack propagation
also focus