Skip to main content

A clustered-LPSEIRS malware propagation model in complex networks

Abstract

In this paper, we present a new malware propagation model that integrates epidemic spread, clustering, and link prediction techniques, tailored for complex network networks. Our model is based on the clustered-link prediction-susceptible-exposed-infected-recovered (clustered-LPSEIRS) epidemic model, which simulates malware dissemination within the network. Our findings reveal a significant decrease in the rate of malware spread compared to the traditional SEIR model, with this enhancement in containment attributed to the integration of clustering and link prediction methods. We also compute the basic reproduction ratio (\(R_{0}\)) for our model, providing insights into the potential ramifications of malware within the network. By examining parameter variations, we enhance our understanding of the model's behavior under diverse scenarios. Additionally, we assess the influence of clustering and link prediction on mitigating malware spread, emphasizing its effectiveness in diminishing the overall impact.

Introduction

The rapid advancement of the internet and artificial intelligence has ushered in a new era of technological transformation. A significant consequence of the widespread use of the internet is the emergence of cybercrime, where malicious actors exploit technology to commit various illegal activities. Malware, harmful software designed to compromise computer systems, is a primary tool used in cybercrime. It is encompassing several types of malicious software. Common types of malware include viruses, worms, Trojan horses, rootkits, and ransomware. These malicious programs exploit vulnerabilities in computer systems to cause harm, such as damaging files, stealing sensitive data, or gaining unauthorized access (Aslan and Samet 2020).

Complex networks can be classified into two main categories: homogeneous and heterogeneous networks. Within heterogeneous networks, scale-free networks with non-uniform degree distributions are particularly significant. These networks exhibit unique characteristics, such as high clustering coefficients, power-law degree distributions, and relatively short average path lengths(Hofstad 2024). The Internet is an example of a scale-free network. The vertices are the network nodes and the edges show the connection between the nodes (Boccaletti et al. 2006). Due to the dynamic nature of complex networks and the unique behavior of individual nodes, diffusion phenomena often occur within these networks. Malware propagation modeling is also applied to prevent the spread of malware in complex networks.

Mathematical modeling uses mathematical language and concepts to represent and analyze a system. It serves as a complementary tool to theory and experimentation in scientific research (Wang et al. 2023). In the context of malware propagation and network patching, mathematical modeling offers a practical approach to understanding the underlying mechanisms and optimizing patching strategies. Testing malware spread and patching devices on a large scale can be impractical. Mathematical modeling provides a virtual environment for experimentation. Also, by analyzing the mathematical equations that describe malware propagation, researchers can gain insights into how malware spreads and interacts with network components (Wang et al. 2023). The general process of mathematical modeling involves the following steps (Rey 2015).

Step 1: Clearly define the problem to be addressed.

Step 2: Identify the key factors and variables that impact the studied phenomenon.

Step 3: Express the relationships between these factors using mathematical equations.

Step 4: Create a computational representation of the model and simulate its behavior.

Step 5: Analyze the results obtained from the simulation.

The epidemic model (Rey 2015) is one type of mathematical model. In epidemic disease modeling, the population is divided into groups. Based on the node's behavior, entering and leaving the groups is considered. Population groups are susceptible(S), exposed(E), infected(I), recovered(R), quarantined(Q), and vaccinated(V). Epidemic models can help researchers understand the dynamics of malware outbreaks and evaluate the effectiveness of various control measures, such as vaccination, quarantine, and social distancing.

Clustering has been employed as an analytical technique to group unlabeled data and extract meaningful information. In addition, clustering is a widely recognized topology management method, particularly in wireless sensor networks, where it is used to group nodes for efficient management or task execution, such as resource management in a distributed manner. The nodes within each cluster are highly similar in terms of their characteristics, while the degree of similarity between clusters is typically the lowest. The primary goal of clustering is to assign labels to objects that indicate the membership of each node in a cluster. While clustering is frequently employed to enhance energy efficiency, it can also address other quality-related objectives. In this paper, we focused on leveraging clustering to mitigate malware propagation.

Since the process of propagation in the network is done through the communication of nodes, edges are considered the main elements of spreading malware in the network. Therefore, by predicting the links that will be formed in the future and preventing the spread of malware through those links, we can reduce the spread of malware in the network.

This paper presents a novel approach to modeling the spread of malware in complex networks, utilizing the SEIRS epidemic disease model, clustering, and link prediction method. The model consists of multiple clusters. Each cluster follows the SEIR epidemic model. The optimal number of clusters is determined by leveraging the characteristic values of the Laplace matrix. In addition to network clustering, we employ the PA link prediction algorithm to forecast future links on the network. The infection rate of the susceptible node is combined with the probability of forming a link for each node, and in this way, the infection in the cluster network is reduced. The SEIRS model is employed in this process due to its simplicity and comprehensiveness.

The remaining sections of the paper are organized as follows: in  "Related work" section provides a thorough review of the existing literature and related works that discuss malware spreading models in complex networks. In  "The proposed model" section, a detailed description of the proposed model is provided, and its main components and mechanisms are described. In  "Dynamical analysis of the model" section is dedicated to the analysis of the model's dynamics. The equilibrium points and the basic reproduction number are calculated, which helps to understand the spread of malware in the network. In "Numerical simulations" section, practical results obtained through simulation are presented. This section examines the results and consequences of model implementation in different scenarios. Lastly, in  "Conclusions" section, the results and findings are summarized, and the discussion ends with the potential avenues for future research and improvement in this area.

Related work

Since malware can cause significant damage in a network, researchers have proposed numerous models to assess and quantify the extent of malware damage in various networks. In the context of malware propagation, the internet network, characterized by its scale-free and heterogeneous nature, is particularly relevant. A heterogeneous network can be represented as a graph, where nodes represent objects and edges represent their connections. In modeling the spread of malware with epidemic models, the network is divided into groups based on their characteristics., like the degree of node, centrality, and membership in the community is divided. McKendrick (1927), presented the fundamental model. In his model, the population is divided into three groups: susceptible, infected, and recovered. In subsequent models, additional groups were incorporated into the population, enabling a more nuanced investigation of the diffusion phenomenon. Some of them include Exposed (E), Vaccinated (V), and Quarantined (Q) groups. The exposed group represents the nodes that have been exposed to the infection but the infection is still hidden in them, the vaccinated group includes the nodes that are immunized to the infection, and the quarantine group includes the infected nodes that are quarantined to prevent the spread of the pollution.

Shen et al. (2019a) proposed the HSEIR-V model, which is based on epidemic disease dynamics and incorporates four groups: susceptible, infected, recovered, and out-of-network systems. The model analyzes the stability, equilibrium points, and basic reproduction ratio of WSNs (Wireless Sensor Networks). The system can exit the network in two ways: through malware infection or without malware infection. The authors also introduced a parameter to account for the heterogeneity of the network, which is influenced by communication connections.

Yadav and Kumar (2022) introduced a model that incorporates quarantined and vaccination states into the malware propagation process, taking into account the role of quarantine and vaccination in preventing the spread of malware.

Shen et al. (2019b) introduced the Susceptible-insidious-infectious-recovered-Dysfunctional (SNIRD) model. Their model simulates the behavior of wireless sensor networks with heterogeneous sensor nodes. The model considers the communication connectivity between nodes and incorporates the characteristics of malware and dysfunctional sensor nodes. In the SNIRD model, malware only infects nodes in the infectious state (I), while nodes in the dysfunctional state (D) are physically damaged or intentionally destroyed by the resident malware. Shen et al. compared their model with traditional SIS and SIR models, demonstrating that their SNIRD model can effectively reduce the spread of malware.

Lahrouz et al. (2020) proposed the SIRI model, a mathematical framework for understanding the propagation of epidemics in heterogeneous networks. Their study focused on the impact of network topology and model parameters on the epidemic threshold, which is a critical point at which the spread of an epidemic becomes self-sustaining. The authors also explored the concept of temporary immunity, where individuals who have recovered from an infection may still be susceptible to re-infection, particularly in heterogeneous networks where individuals may transition from an improved state to an infected state.

Chen et al. (2022), considering the potential spread of malware through infrastructure-based (INF) communication links and device-to-device (D2D) connections in heterogeneous networks, introduced the SIRD model to investigate the dynamic nature of propagation through these connections. The results of analysis and simulation showed that the mobility and utilization of both INF and D2D connections significantly contribute to malware propagation in networks. They demonstrated that increasing security awareness among users and improving the recovery rate can considerably reduce the extent and intensity of malware spread.

In another paper, Shen et al. (2020) proposed a novel heterogeneous and mobile model, referred to as the VCQPS (vulnerable, compromised, quarantined, patched, scrapped) model, which takes into account the heterogeneity and mobility of wireless sensor network nodes. By comparing their model with the SIS and SIR models, they demonstrated a significant reduction in the spread of malware. The authors also explored the dynamics of malware propagation in heterogeneous wireless sensor networks, highlighting the importance of considering these factors in modeling the spread of malware. The results of this study can provide valuable insights for network managers, helping them make informed decisions to mitigate the impact of malware propagation in WSNs.

Zhu and Huang (2020) proposed a cluster-based model for Wireless Sensor Networks (WSNs), which classified nodes into two categories: cluster head nodes and ordinary nodes. They treated recovered nodes as part of the entire network. The primary focus of their model was to investigate the data transmission characteristics between different nodes in WSNs. The authors incorporated real-world parameters of WSNs, including the communication radius between nodes, node density, and node death rate, to develop a more accurate network representation. Through theoretical analysis and numerical simulations, they demonstrated a significant correlation between the communication radius, node density, node death rate, and the dynamics of malware propagation in WSNs.

Roberto et al. (2021) introduced a simplified model with two interconnected cluster networks. They analyzed this model to determine the critical parameters that must be regulated to prevent the emergence of new attacks. The authors demonstrated that when a virus or malware is known, the most effective strategy to prevent its spread is to introduce antidote nodes containing programs capable of disseminating throughout the network and protecting other nodes. They considered conversion rates from susceptible to antidote and infected to antidote for susceptible and infected nodes, respectively. Numerical results showed that having at least one device equipped with an antidote program is sufficient to prevent the spread of viruses and malware, ensuring a disease-free equilibrium point is always achieved.

Most existing research on modeling malware spread in networks has focused on single-cluster or two-cluster models, neglecting the impact of clustering on the spread of malware. In this paper, we investigate the effect of clustering on the spread of malware in networks and demonstrate how predicting future links can reduce the spread in clustered networks.

The proposed model

When the malware infiltrates the network, it infects vulnerable nodes. If the susceptible node is placed in front of the infected node, it will be infected. In this way, the spread of malware will occur in the network. The proposed model consists of the following steps.

Step 1: The link prediction process is performed on the network.

Step 2: Obtain the optimal number of clusters (c).

Step 3: The network is divided into c clusters.

Step 4: The LPSEIR epidemic disease model is obtained for each cluster according to the new network.

Figure 1 shows the architecture of the proposed model.

Fig. 1
figure 1

General architecture of the proposed model based on clustering and link prediction

Clustering method

Clustering is the process of dividing data into groups, or clusters, such that data points within a cluster are more similar to each other than to data points in other clusters. In network analysis, clustering often aims to divide a network into k subgraphs, or communities. Spectral clustering is a nonlinear method for clustering data represented as a graph. This algorithm involves the following steps (Forouzandeh et al. 2023):

Step 1: Construct the similarity matrix: A similarity matrix is created to represent the pairwise relationships between data points. Each element in the matrix indicates the similarity or dissimilarity between two data points.

Step 2: Compute the Laplacian matrix: The Laplacian matrix is a transformation of the similarity matrix that captures the graph's structure. It is often calculated as the difference between the degree matrix and the similarity matrix.

$$ L = D - A $$
(1)

where \(A\) represents the adjacency matrix and \(D\) is the degree matrix as Eq. 2.

$$ d_{i} = \mathop \sum \limits_{{j|\left( {i,j} \right) \in E}} w_{ij} $$
(2)

Step 3: Find the eigenvectors: The \(k \) largest eigenvectors of the Laplacian matrix are computed. These eigenvectors represent the low-dimensional embedding of the data points.

Step 4: Cluster the eigenvectors: The embedded data points are clustered using a traditional clustering algorithm like k-means. The number of clusters, \(k\), is specified beforehand.

A large spectral gap in the Laplacian matrix suggests a clear separation between clusters in the network. the eigenvectors associated with the smaller eigenvalues represent distinct and well-separated clusters (Li et al. 2021). This feature was utilized to identify the optimal number of clusters for the network.

Link prediction method

Link prediction is a process of predicting the presence or absence of links between nodes in a network. Based on the network structure, it is possible to predict whether two currently unconnected nodes will be connected in the future or not connected. In Fig. 2, graph G= (V, E) is given. C is the neighbor of D, and D is the neighbor of B. Consequently, there exists a possibility of a future link between B and C. A is also a 3-hop neighbor of B, which predicts the potential for a future link between B and A.

Fig. 2
figure 2

The representation of link prediction

Link prediction approaches can be categorized into several groups, as shown in Fig. 3 (Kumar et al. 2020). We will now discuss some similarity-based approaches in more detail.

Fig. 3
figure 3

Classification of link prediction approaches (Kumar et al. 2020)

The simplest link prediction approach is similarity-based methods, which have lower computational complexity (Daud et al. 2020; Yuan et al. 2015). In the proposed model, we employ this approach to predict potential links.

Similarity-based approaches work based on the similarity between two nodes that currently do not have a link between them in the graph structure. The similarity ranking between two nodes is determined based on their neighboring nodes or the degree of nodes. Then, the rankings are sorted in descending order, and the top-ranked entry is considered as a predicted link (Yuan et al. 2015). In the proposed model, we will use preferential attachment similarity for link prediction due to the lower complexity of the similarity measure. This criterion is taken from the rule of preferential attachment in the growth of scale-free networks. If we take the probability of connecting node x with other nodes, the preferential attachment nodes x and y will be in the form of Eq. 3 (Kumar et al. 2020).

$$ S\left( {xy} \right) = k_{x} \times k_{y} $$
(3)

The preferential attachment mechanism based on node degrees only, without considering the neighbors, is a simplified model with less computational complexity. However, it may not perform well on many networks (Kumar et al. 2020; Lü and Zhou 2011).

The link prediction steps are (Rafiee et al. 2020):

Step 1: Calculate the degree of each node.

Step 2: Dividing the network edges into two sets, test, and train, so that 10% of the edges are in the test set and the remaining 90% are in the train set.

Step 3: We calculate the similarity measure based on the similarity measure PA for all edges that don't exist in the train graph. These edges are the union of the test set and the edges that do not exist in the network graph.

Step 4: Sorting the similarity measure obtained in the previous step in descending order.

Step 5: Insert the most similar edge to the train set.

Step 6: Calculate AUC and Precision.

Algorithm 1 presents a pseudocode implementation of the link prediction algorithm. Figure 4 presents an example of a network graph, along with visual representations of the graph at various stages of the algorithm's execution. Figure 4a depicts the main network graph. Figure 4b represents the graph of non-observed edges, which is essentially the complement of the network graph. Together, Fig. 4a and b form a complete graph containing all possible edges between the network's nodes. Step 2 introduces the test and train graphs, derived from the network graph. Figure 4c shows a portion of the network edges as the training graph, while Fig. 4d depicts the remaining edges as the test graph. In step 3, the similarity measure is calculated for both the non-observed edges (Fig. 4b) and the test edges (Fig. 4d). This involves combining the edges from these two graphs.

Fig. 4
figure 4

A display of the network graph and the selection of the test and train graph

Algorithm 1
figure a

Link Prediction Algorithm.

Equation 4 was used to calculate the AUC measure (Rafiee et al. 2020).

$$ AUC = \frac{{n_{1} + 0.5n_{2} }}{n} $$
(4)

where \(n\) is the total number of comparisons. \(n_{1}\) is the number of times that the score of the link selected from the test set is more than the other links. \(n_{2}\) is the number of times that both links have the same score. If the AUC is greater than 0.5, the algorithm's performance is acceptable.

Precision is another effective tool for validating link prediction, which is used in this paper. Precision is the percentage of correctly predicted links and is calculated as Eq. 5.

$$ Precision = \frac{P}{T} $$
(5)

where P is the number of correctly predicted links and T is the total number of predicted links. A correctly predicted link is a link that belongs to both the prediction set and the test set.

Model description

The SEIR model is such that all the nodes of each cluster are divided into four categories: susceptible (S), exposed (E), infected (I), and recovered (R). A node with vulnerability is considered a susceptible node. when the susceptible node is placed in front of the infected node, it moves to the exposed state. After a certain incubation period, the malware becomes active and an exposed node becomes an infected node. When the infected node is detected and security mechanisms are applied, the node goes to the recovered state. This node may still be vulnerable, and it is placed in the susceptible state again. The infection of each cluster affects the other cluster. Due to the heterogeneity of the network, the nodes follow a power law distribution \( P\left( k \right) \sim k ^{ - r} (2 < r \le 3 \;\;k = 1 \ldots \Delta\) where \(P\left( k \right)\) stands for the probability of selecting a node with degree \( k r\) is an indicator and \(\Delta\) is the maximum node degree of the network. \(P\left( k \right) = 0\) for all \( k > \Delta\). Figure 5 shows the relationship between groups in the clustered network, and Table 1 shows the symbols and their descriptions. The states of the model are as follows:

Fig. 5
figure 5

State transition diagram of the clustered-LPSEIRS model

Table 1 Table of symbols and descriptions

Susceptible (\(S_{i}^{k} \left( t \right)\)): The number of susceptible nodes of cluster \(i \) with degree \(k\) at time \(t\).

Exposed (\(E_{i}^{k} \left( t \right)\)): The number of exposed nodes of cluster \(i \) with degree \(k\) at time \(t\).

Infected (\(I_{i}^{k} \left( t \right)\)): The number of infected nodes of cluster \(i \) with degree \(k\) at time \(t\).

Recovered (\(R_{i}^{k} \left( t \right)\)): The number of recovered nodes of cluster \(i \) with degree \(k\) at time \(t\).

The \(L \) parameter is determined by the link prediction algorithm, which we have used in our proposed model. Specifically, the value of \(L\) is based on the preferential attachment similarity criterion.

$$ L = \frac{1}{{Average\left( {PA} \right)}} $$
(6)

The links created in the future can increase the degree of some nodes, making them more likely to be classified as important within the network. with security measures, we can effectively secure them and reduce malware propagation. securing process leads to a decrease in the density of susceptible nodes. We consider the degree of density reduction to be proportional to the reverse of the average preference attachment in the similarity measure of the link prediction method.

At the beginning of the modeling process, one of the challenges we encounter is defining the assumptions. In the presented model, the assumptions are as follows:

  1. 1.

    The network is heterogeneous, with N nodes which are divided into c clusters, and for each cluster, we have:

    $$ S_{i}^{k} \left( t \right) + E_{i}^{k} \left( t \right) + I_{i}^{k} \left( t \right) + R_{i}^{k} \left( t \right) = N_{i} $$
    (7)

    where \({\text{w}}\sum\nolimits_{i = 1}^{c} {N_{i} } { } = N\) and N is the number of nodes in the network.

  2. 2.

    Initially, the modeling assumes that 10% of the nodes within a cluster are infected, while the remaining 90% are susceptible.

  3. 3.

    The number of births occurring within the cluster is balanced by the number of deaths (\({\Lambda } = \mu\)).

  4. 4.

    The same leaving rate (μ) for each node is considered.

Model formulation

In this section, a mathematical model is developed to investigate the dynamics of network diffusion based on epidemic diseases, clustering, and link prediction. Transferring between states is possible for each cluster separately. In addition, it is possible to transfer malware from one cluster to another cluster. When a susceptible node encounters an infected node, either within its cluster or another, it becomes infected. This results in a decrease in the density of susceptible nodes within that cluster and a corresponding increase in the density of exposed nodes. The transition between the states can be shown in the following differential equations.

$$ \begin{aligned} \frac{{dS_{i}^{k} \left( t \right)}}{dt} & = {\Lambda } - \frac{L}{c}\beta_{i} S_{i}^{k} \left( t \right)\theta_{i}^{k} \left( t \right) - \mu S_{i}^{k} \left( t \right) + \alpha_{i} R_{i}^{k} \left( t \right) - \mathop \sum \limits_{j|j \ne i,j \in C} \rho_{ji} \theta_{j}^{k} \left( t \right)S_{i}^{k} \left( t \right) \\ \frac{{dE_{i}^{k} \left( t \right)}}{dt} & = \frac{L}{c}\beta_{i} \theta_{i}^{k} \left( t \right)S_{i}^{k} \left( t \right) - \mu E_{i}^{k} \left( t \right) - \delta_{i} E_{i}^{k} \left( t \right) + \mathop \sum \limits_{j|j \ne i,j \in C} \rho_{ji} \theta_{j}^{k} \left( t \right)S_{i}^{k} \left( t \right) \\ \frac{{dI_{i}^{k} \left( t \right)}}{dt} & = \delta_{i} E_{i}^{k} \left( t \right) - \mu I_{i}^{k} \left( t \right) - \gamma_{i} I_{i}^{k} \left( t \right) \\ \frac{{dR_{i}^{k} \left( t \right)}}{dt} & = \gamma_{i} I_{i}^{k} \left( t \right) - \mu R_{i}^{k} \left( t \right) - \alpha_{i} R_{i}^{k} \left( t \right) \\ \end{aligned} $$
(8)

\(\theta_{i}^{k} \left( t \right)\) is the probability of the neighboring node being infected with degree k in \(C_{i}\), which can be written as the following equation:

$$ \theta_{i}^{k} \left( t \right) = \frac{1}{{\left\langle {k_{i} } \right\rangle }}\mathop \sum \limits_{{k = m_{i} }}^{{y_{i} }} kP\left( k \right)I_{i}^{k} \left( t \right) $$
(9)

The average degree of \(C_{i} \) is equal to:

$$ \left\langle {k_{i} } \right\rangle = \mathop \sum \limits_{k}\, j p\left( j \right) $$
(10)

On the other hand, \(p\left( k \right) = k^{ - \upsilon }\) is equal to the probability of connecting a network node to k other nodes, ν is the power of power distribution, \(m_{i} \) is the minimum degree of \(C_{i} \) and \(y_{i}\) is the maximum degree of \(C_{i}\).

One of the important issues in modeling is the estimation of model parameters. This issue will be time-consuming and expensive when there are many estimated parameters. To solve this problem, researchers have proposed different methods. One method is the Monte Carlo, which we have used in parameter estimation (Severt et al. 2023).

Dynamical analysis of the model

In this section, to investigate the dynamics of the proposed model, we calculate the equilibrium points of the system and the basic reproduction ratio.

Equilibrium points

In this section, the equilibrium points of the model are determined.

Malware-free equilibrium points are states where the disease is no longer present in the population, signifying the complete elimination of infection from the network. Malware-free equilibrium points are critical in comprehending the network dynamics and evaluating the efficacy of control measures in preventing and eradicating malware propagation. There are three equilibrium points:

  • Initial Malware-Free Equilibrium: Initially, when all nodes are susceptible, the network reaches a malware-free equilibrium. In this state, no nodes are infected, and the network is entirely free of malware. Equation 11 represents the initial malware-free equilibrium for each cluster.

    $$ EQ_{i} = \left( {N_{i}, 0,0,0} \right) i = 1 .. c $$
    (11)
  • Endemic Malware-Free Equilibrium: At the end of the malware epidemic, when all nodes have recovered and the network has been completely cleared of infection, the malware-free equilibrium is reached. In this state, no nodes remain infected, and the network is restored to a malware-free state. For each cluster, This point is as follows.

    $$ EQ_{i} = \left( {0,0,0,N_{i} } \right) \;\;\;\; i = 1 \ldots c $$
    (12)

    The initial or endemic equilibrium point for the network is when all clusters are at the initial or endemic equilibrium point.

  • Malware-free Equilibrium: An additional equilibrium point arises when the network is infected, but the system remains in a state of equilibrium. This point is calculated by setting Eq. 8 equal to zero and solving for the variables. Equation 13 represents this equilibrium point. Table 2 provides the values of specific symbols used in simplifying Eq. 13.

    $$ Q_{i} = \left( {S_{i}^{*}, E_{i}^{*}, I_{i}^{*}, R_{i}^{*} } \right) $$
    (13)
    $$ \begin{aligned} S_{1}^{*} & = \left( {\frac{{{\Lambda }\left( {\mu^{2} \left( {\alpha_{i} + \delta_{i} + \gamma_{i} } \right) + \mu \left( {\alpha_{i} \delta_{i} + \alpha_{i} \gamma_{i} + \delta_{i} \gamma_{i} } \right) + \mu^{3} + \alpha_{i} \delta_{i} \gamma_{i} } \right)}}{{\mu^{3} \left( {\alpha_{i} + \delta_{i} + \gamma_{i} + \frac{L}{c}\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j} } \right) + \mu^{4} + \mu^{2} f_{1} + \mu f_{2} }}} \right) \\ E_{1}^{*} & = \frac{{{\Lambda }\left( {L\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j} } \right)\left( {\alpha_{i} \gamma_{i} + \alpha_{i} \mu + \mu \gamma_{i} + \mu^{2} } \right)}}{{\mu^{3} \left( {\alpha_{i} + \delta_{i} + \gamma_{i} + \frac{L}{c}\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j} } \right) + \mu^{4} + \mu^{2} f_{1} + \mu f_{2} }} \\ I_{1}^{*} & = \frac{{{\Lambda }\delta_{1} \left( {\alpha_{i} + \mu } \right)\left( {\frac{L}{c}\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j} } \right)}}{{\mu^{3} \left( {\alpha_{i} + \delta_{i} + \gamma_{i} + \frac{L}{c}\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j} } \right) + \mu^{4} + \mu^{2} f_{1} + \mu f_{2} }} \\ R_{i}^{*} = & \frac{{{\Lambda }\delta_{i} \gamma_{i} \left( {\frac{L}{c}\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{21} \theta_{2} } \right)}}{{\mu^{3} \left( {\alpha_{i} + \delta_{i} + \gamma_{i} + \frac{L}{c}\beta_{i} \theta_{i} + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j} } \right) + \mu^{4} + \mu^{2} f_{1} + \mu f_{2} }}. \\ \end{aligned} $$
Table 2 Table of symbol and descriptions

The basic reproductive ratio

The basic reproduction number (\(R_{0}\)) is a threshold limit to determine the presence or absence of a malware epidemic in the network. This ratio is the number of secondary infections that result from a primary infection. If \(R_{0}\) > 1, there is a malware epidemic in the network. In this case, each infected node produces, on average, more than one new infection. It is caused the malware propagation across the network. If (\(R_{0}\) < 1), the spread of the malware will stop. In this state, each infected node produces, on average, fewer than one new infection, which will eliminate the malware epidemic on the network (Driessche 2017).

The basic reproduction ratio, R0, plays a significant role in assessing the severity and impact of the malware outbreak within a network. By understanding and estimating this value, it becomes possible to implement the appropriate control measures and preventive strategies to mitigate the spread of malware.

In calculating the basic reproduction ratio, the next-generation method is employed. This method is commonly used in mathematical epidemiology to estimate R₀ based on the underlying dynamics of the malware propagation within a network (Upadhyay and Iyengar 2013). In this way, \(R_{0}\) is the spectral radius of the matrix \(G\) and \(G = FV^{ - 1}\) (Guillén et al. 2017). The steps to obtain \( R_{0}\) according to the next-generation method are as follows.

Step 1: Find the infected groups.

Step 2: Obtaine the matrix F according to the transmission of infection rate in infected groups.

Step 3: Obtaine the matrix V according to the transmission between infected groups.

Step 4: Calculate the matrix \( FV^{ - 1}\).

Step 5: Calculate the spectral radius of the matrix \(FV^{ - 1}\) as \( R_{0}\).

In the presented model, we obtain \(the R_{0}\) value for each cluster. According to the steps of the next-generation method, the infected groups are \({\text{E}}_{{\text{i}}}^{{\text{k}}} \left( {\text{t}} \right) \) and \({\text{I}}_{{\text{i}}}^{{\text{k}}} \left( {\text{t}} \right)\) where \(i = 1..c\). The function \(f_{i}\) is written based on the infection rate within groups \({\text{E}}_{{\text{i}}}^{{\text{k}}} \left( {\text{t}} \right)\) and \({\text{I}}_{{\text{i}}}^{{\text{k}}} \left( {\text{t}} \right)\), while the function \(v _{i}\) is written based on the transmission rate between these groups.

$$ \begin{aligned} f_{i} \left( x \right) & = \left[ {\begin{array}{*{20}c} {\frac{L}{c}\beta_{i} S_{i}^{k} \left( t \right)\theta_{i}^{k} \left( t \right) + \mathop \sum \nolimits_{j = 1,j \ne i}^{c} \rho_{ji} \theta_{j}^{k} \left( t \right)S_{i}^{k} \left( t \right)} \\ 0 \\ \end{array} } \right] \\ v_{i} \left( x \right) & = \left[ {\begin{array}{*{20}c} {\left( {\mu + \delta_{i} } \right)E_{i}^{k} \left( t \right)} \\ { - \delta_{i} E_{i}^{k} \left( t \right) + \left( {\mu + \gamma_{i} } \right)I_{i}^{k} \left( t \right)} \\ \end{array} } \right] = \left[ {\begin{array}{*{20}c} {u_{1} E_{i}^{k} \left( t \right)} \\ { - \delta_{i} E_{i}^{k} \left( t \right) + u_{2} I_{i}^{k} \left( t \right)} \\ \end{array} } \right] \\ \end{aligned} $$
(14)

The Jacobian matrices of \(F_{i} \left( x \right) = \frac{{df_{i} \left( x \right)}}{dx}\) and \(V_{i} \left( x \right) = \frac{{dv_{i} \left( x \right)}}{dx}\) where \( x = \left( {E_{i} I_{i} } \right) ^{T}\) at the malware-free equilibrium \( EQ_{i} = \left( {N_{i} 00 0} \right),\;\;\;i = 1..c\) are

$$ F_{i} = \left[ {\begin{array}{*{20}c} 0 & {A_{ii} } \\ 0 & 0 \\ \end{array} } \right],\;\;\;\;V_{i} = \left[ {\begin{array}{*{20}c} {u_{1} } & 0 \\ { - \delta_{i} } & {u_{2} } \\ \end{array} } \right] $$
(15)

Some equivalent values for the notations are listed in Table 3. We have obtained \(R_{0\_i} = \rho \left( {F_{i} V_{i}^{ - 1} } \right)\) where \(i = 1..c\).

$$ R_{0\_i} = \frac{{L\beta_{i} *\delta_{i} }}{{c \left( {\mu + \delta_{i} } \right)*\left( {\mu + \gamma_{i} } \right)}}* \frac{{\left\langle {K_{i}^{2} } \right\rangle }}{{\left\langle {k_{i} } \right\rangle }}*\frac{{\Lambda }}{\mu } $$
(16)

where \(\left\langle {K_{i}^{2} } \right\rangle = \mathop \sum \limits_{k} k^{2} p_{i} \left( k \right)\) and \(p_{i} \left( k \right)\) is the degree distribution of cluster \(i\).

Table 3 Equivalent values for the used notations

In the case where the network is not clustered, the calculation of \(R_{0}\) is as follows.

$$ R_{0} = \frac{\beta *\delta }{{\left( {\mu + \delta } \right)*\left( {\mu + \gamma } \right)}}* \frac{{\left\langle {K^{2} } \right\rangle }}{\left\langle K \right\rangle }*\frac{{\Lambda }}{\mu } $$
(17)

The terms \(\frac{{\left\langle {K^{2} } \right\rangle }}{\left\langle K \right\rangle } \) and \(\frac{{\left\langle {K_{i}^{2} } \right\rangle }}{{\left\langle {k_{i} } \right\rangle }} \) show the effect of network or cluster topologies on the value of \(R_{0}\) and \(R_{0\_i}\).

Therefore, the epidemic threshold of the clustered-LPSEIRS model is (Piqueira et al. 2021):

$$ R_{0} = R_{0\_1} \;\;\;{\text{or}}\;\;\; \ldots \;\;\;{\text{or}}\;\;\;R_{0} = R_{0\_c} $$
(18)

Numerical simulations

In this section, the proposed model is analyzed. Our model is based on the SEIRS model, clustering, and link prediction method. It has been tested on a hypothetical Barabasi Albert (BA) and four real-world datasets: Soc-dolphins, ia-infect-dublin, bn-macaque-rhesus-brain-2, and eco-everglades.They are available at https://networkrepository.com. Their characteristics are summarized in Table 4.

Table 4 Network Characteristics

Numerical simulation in the BA

The hypothetical Barabasi Albert network is a type of scale-free network that has 1002 nodes and 4002 edges. Figure 6 is a view of this network. This picture is drawn in Gephi 0.10.2. The number of hypothetical network clusters is determined by analyzing the eigenvalues of the Laplacian matrix.

Fig. 6
figure 6

The hypothetical Barabasi-Albert network

Figures 7 and 8, indicate changing the node densities in the SEIRS model and the proposed model. Initially, the density of susceptible nodes decreases while the densities of exposed nodes rise. Over time, exposed nodes transition to the infected state, further increasing the density of infected nodes. Upon implementing security mechanisms, infected nodes enter the recovery phase, leading to a growth in the density of recovered nodes.

Fig. 7
figure 7

The diagram of the SEIRS model on the hypothetical BA

Fig. 8
figure 8

The density of nodes in the cluster-LPSEIRS model on the hypothetical BA

Figure 9 illustrates the spread of malware within a hypothetical BA network under three clustering scenarios: a single cluster, two clusters, and three clusters. The results indicate that clustering significantly reduces malware propagation in the hypothetical BA network.

Fig. 9
figure 9

Compare the infected groups in three models: SEIRS, two-cluster-SEIRS, and three-cluster-SEIRS on the hypothetical BA

Figure 10 compares the density of infected nodes in three scenarios: without clustering, clustering with the optimal number of clusters, and clustering with both the optimal number of clusters and the link prediction parameter. The results demonstrate that the clustered-LPSEIRS model outperforms the other models in mitigating malware propagation within the hypothetical network. Figure 11 further highlights the superiority of the clustered-LPSEIRS model, exhibiting a lower density of recovered nodes due to its reduced pollution compared to the other approaches.

Fig. 10
figure 10

Compare the infected groups in three models: SEIRS, clustered-SEIRS, and clustered-LPSEIRS on the hypothetical BA

Fig. 11
figure 11

Compare the recovered groups in three models: SEIRS, cluster-SEIRS, and cluster-LPSEIRS on the hypothetical BA

In the cluster-LPSEIRS model, a higher malware infection rate (\(\beta_{i}\)) leads to more rapid malware propagation within each cluster. Figure 12 visually demonstrates this trend, illustrating how the spread of malware in each cluster evolves in response to changes in the infection transmission rate and the values \({\upalpha }_{1} = 0 \cdot 009.{ } \alpha_{2} = 0 \cdot 005.{ } \alpha_{3} = 0 \cdot 005. \gamma_{1} = 0 \cdot 004. \gamma_{2} = 0 \cdot 003. \gamma_{3} = 0 \cdot 003.\rho_{12} = \rho_{21} = \rho_{32} = \rho_{23} = \rho_{13} = \rho_{31} = 0 \cdot 005 . \mu = 0 \cdot 001 . {\Lambda } = 0 \cdot 001. \delta_{1} = 0 \cdot 03 . \delta_{2} = 0 \cdot 02. \delta_{3} = 0 \cdot 01\). Figure 13 demonstrates the density of infected nodes by changing the recovery rate in each cluster. Here the remaining parameter values are: \({\upalpha }_{1} = 0 \cdot 009.{ } \alpha_{2} = 0 \cdot 005.{ } \alpha_{3} = 0 \cdot 005. \beta_{1} = 0 \cdot 09. \beta_{2} = 0 \cdot 08. \beta_{3} = 0 \cdot 07.\) \(\rho_{12} = \rho_{21} = \rho_{32} = \rho_{23} = \rho_{13} = \rho_{31} = 0 \cdot 005. \mu = 0 \cdot 001. {\Lambda } = 0 \cdot 001.\) \(\delta_{1} = 0 \cdot 03 . \delta_{2} = 0 \cdot 02. \delta_{3} = 0 \cdot 01\). It is observed that a higher recovery rate correlates with a slower spread of malware.

Fig. 12
figure 12

The density of infected nodes in each cluster \(C_{i}\) that \(i = 1..3\) on the hypothetical BA with changing of \(\beta\)

Fig. 13
figure 13

The density of infected nodes in each cluster \(C_{i}\) that \(i = 1.. 3\) on the hypothetical BA with changing of \(\gamma\)

\(R_{0}\) values were calculated for various \(\beta\) values in both the one-cluster and proposed BA network models. Clustering significantly reduces \(R_{0}\). \(R_{0}\) is a critical threshold for determining whether a malware epidemic will occur. If \(R_{0} \) is less than 1, an epidemic is unlikely. However, if \( R_{0}\) exceeds 1, an epidemic is more probable. As shown in Table 5, without clustering and link prediction, a malware epidemic occurs for \(\beta\) values greater than 0.005. However, with clustering and link prediction, the epidemic onset is delayed. Figure 14 illustrates how \( R_{0}\) evolves as the infection rate (\(\beta\)) increases.

Table 5 Table of values \(R_{0}\) for SEIRS and cluster-LPSEIRS models on the hypothetical BA
Fig. 14
figure 14

Compare \(R_{0}\) in cluster-LPSEIRS and SEIRS on the hypothetical BA

Numerical simulation on the datasets

This section presents simulation results using real-world networks: soc-dolphins, ia-infect-dublin, bn-macaque-rhesus-brain-2, and eco-everglades. Figure 15 visualizes these networks as simulated in Gephi 0.10.2 and includes graphs representing the relationship between the number of clusters and the eigenvalues of the Laplacian matrix. The optimal number of clusters is determined by the first significant gap in the cluster-eigenvalue graph. Table 6 lists the optimal cluster numbers for each network, which were used in the network simulations.

Fig. 15
figure 15

Illustration of networks and depicting the relationship between eigenvalues and the number of clusters for each dataset

Table 6 Datasets and the optimal number of clusters

The simulations for the Soc-dolphins and ia-infect-dublin datasets were conducted using the optimal number of clusters determined in Table 6. Figure 16 compares the density of infected nodes in three models: SEIR, clustered-SEIRS, and clustered-LPSEIRS, using the Soc-dolphins dataset. Figure 17 presents a similar comparison for the ia-infect-dublin dataset. In both cases, the proposed model consistently outperforms the other models in controlling the spread of infection.

Fig. 16
figure 16

Comparison of the infected node density in three models: SEIRS, cluster-SEIRS, and cluster-LPSEIRS on the Soc-dolphins dataset

Fig. 17
figure 17

Comparison of the infected node density in three models: SEIRS, cluster-SEIRS, and cluster-LPSEIRS on the ia-infect-dublin dataset

Tables 7 and 8 present the basic reproduction number (\(R_{0}\)) values for the Soc-dolphins and ia-infect-dublin datasets as the pollution transfer rate increases in the SEIRS and cluster-LPSEIRS models. As expected, the cluster-LPSEIRS model consistently exhibits lower \(R_{0}\) values than the SEIR model. This indicates a reduced likelihood of a malware epidemic in the cluster-LPSEIRS model. Moreover, the proposed model experiences a delayed onset of malware epidemics compared to the SEIR model. Figures 18 and 19 visually represent these findings.

Table 7 Table of the values \(R_{0}\) for SEIRS and cluster-LPSEIRS models on the Soc-dolphins dataset
Table 8 Table of the values \(R_{0}\) for SEIRS and cluster-LPSEIRS models on the ia-infect-dublin dataset
Fig. 18
figure 18

Comparison of the values \(R_{0}\) in the SEIRS and cluster-LPSEIRS on the Soc-dolphins dataset

Fig. 19
figure 19

Comparison of the values \(R_{0}\) in SEIRS and cluster-LPSEIRS in the ia-infect-dublin dataset

Since the optimal number of clusters for the bn-macaque-rhesus_brain_2 and eco-everglades datasets is one, which limits the ability to assess the impact of clustering, we intentionally used three clusters in our simulations. This allowed us to evaluate how clustering affects the proposed model's performance even in networks with a single optimal cluster.

Figure 20 compares the density of infected nodes in the SEIRS, cluster-SEIRS, and cluster-LPSEIRS models using the bn-macaque-rhesus_brain_2 and eco-everglades datasets. The results demonstrate that the cluster-LPSEIRS model consistently outperforms the other models in mitigating the spread of malware within the network.

Fig. 20
figure 20

Comparison of the infected node density in three models: SEIRS, cluster-SEIRS, and cluster-LPSEIRS on the bn-macaque-rhesus_brain_2 and eco-everglades datasets

Tables 9 and 10 present the \(R_{0}\) values calculated for the SEIRS and clustered-SLPSEIRS models on the bn-macaque-rhesus_brain_2 and eco-everglades datasets as the malware transmission rate increases. These results are also visualized in Fig. 21. In both datasets, \(R_{0}\) increases with rising malware transmission rates, but this increase is slower in the proposed model compared to the SEIR model. This indicates a delayed onset of malware epidemics in the proposed model.

Table 9 Table of values \(R_{0}\) for SEIRS and cluster-LPSEIRS models on the bn-macaque-rhesus-brain-2 dataset
Table 10 Table of values \(R_{0}\) for SEIRS and cluster-LPSEIRS models on the eco-everglades dataset
Fig. 21
figure 21

Comparison of the values \(R_{0}\) in SEIRS and cluster-LPSEIRS in the bn-macaque-rhesus-brain-2 and eco-everglades datasets

Figure 22 analyzes the density of infected nodes in the cluster-SEIRS model across various datasets. The simulation was conducted with up to three clusters to assess the impact of clustering. The results indicate that increasing the number of clusters effectively reduces pollution within the network, emphasizing the efficacy of clustering in mitigating the spread of infection.

Fig. 22
figure 22

Comparison of the infected nodes density in cluster-SEIRS model with c = 1..3 cluster on the datasets

Conclusions

This paper investigates the dynamics of the LPSEIRS model in complex networks, incorporating clustering and link prediction. The network topology was generated using the Barabasi-Albert model with a power-law degree distribution. The optimal number of clusters was determined based on the Laplacian matrix eigenvalues.

The proposed model was analyzed mathematically to derive the basic reproduction ratio and equilibrium points. Simulations were conducted on both hypothetical Barabasi-Albert networks and real-world datasets. Three scenarios were considered: no clustering, clustering, and clustering with link prediction. The effects of varying malware transmission rates and recovery rates were examined.

By increasing the malware transmission rate, we calculated the basic reproduction number (\(R_{0}\)) and found that epidemics start more rapidly without clustering and link prediction. Simulation results demonstrate that c-cluster networks (c > 1) exhibit reduced malware spread compared to single-cluster networks. Moreover, \(R_{0}\) is lower in c-cluster networks.

Clustering significantly contributes to mitigating malware spread in networks. Additionally, combining clustering with link prediction further reduces the spread of malware. Comparative analysis of different clustering scenarios reveals that increasing the number of clusters leads to a decrease in malware propagation.

Availability of data and materials

No datasets were generated or analysed during the current study.

Code availability

No codes are associated with this article.

References

  • Aslan ÖA, Samet R (2020) A comprehensive review on malware detection approaches. IEEE Access 8:6249–6271

    Article  Google Scholar 

  • Boccaletti S et al (2006) Complex networks: Structure and dynamics. Phys Rep 424(4–5):175–308

    Article  MathSciNet  Google Scholar 

  • Chen B-R, Cheng S-M, Mwangi MB (2022) A mobility-based epidemic model for IoT malware spread. IEEE Access 10:107929–107941

    Article  Google Scholar 

  • Daud NN et al (2020) Applications of link prediction in social networks: a review. J Netw Comput Appl 166:102716

    Article  Google Scholar 

  • del Rey AM (2015) Mathematical modeling of the propagation of malware: a review. Secur Commun Netw 8(15):2561–2579

    Article  Google Scholar 

  • Forouzandeh S et al (2023) A new method for recommendation based on embedding spectral clustering in heterogeneous networks (RESCHet). Expert Syst Appl 231:120699

    Article  Google Scholar 

  • Guillén JH, Del Rey AM, Encinas LH (2017) Study of the stability of a SEIRS model for computer worm propagation. Phys A 479:411–421

    Article  MathSciNet  Google Scholar 

  • Kermack WO, McKendrick AG (1927) A contribution to the mathematical theory of epidemics. Proc R Soc Lond Ser A Contain Pap Math Phys Character 115(772):700–721

    Google Scholar 

  • Kumar A et al (2020) Link prediction techniques, applications, and performance: a survey. Phys A 553:124289

    Article  MathSciNet  Google Scholar 

  • Lahrouz A et al (2020) Global dynamics of an epidemic model with incomplete recovery in a complex network. J Franklin Inst 357(7):4414–4436

    Article  MathSciNet  Google Scholar 

  • Li T et al (2021) An integrated cluster detection, optimization, and interpretation approach for financial data. IEEE Trans Cybern 52(12):13848–13861

    Article  Google Scholar 

  • Lü L, Zhou T (2011) Link prediction in complex networks: a survey. Physica A 390(6):1150–1170

    Article  Google Scholar 

  • Piqueira JRC, Cabrera MA, Batistela CM (2021) Malware propagation in clustered computer networks. Phys A 573:125958

    Article  MathSciNet  Google Scholar 

  • Rafiee S, Salavati C, Abdollahpouri A (2020) CNDP: Link prediction based on common neighbors degree penalization. Phys A 539:122950

    Article  Google Scholar 

  • Severt M, Casado-Vara R, del Rey AM (2023) A Comparison of Monte Carlo-Based and PINN parameter estimation methods for malware identification in IoT networks. Technologies 11(5):133

    Article  Google Scholar 

  • Shen S et al (2019a) HSIRD: a model for characterizing dynamics of malware diffusion in heterogeneous WSNs. J Netw Comput Appl 146:102420

    Article  Google Scholar 

  • Shen S et al (2019b) SNIRD: Disclosing rules of malware spread in heterogeneous wireless sensor networks. IEEE Access 7:92881–92892

    Article  Google Scholar 

  • Shen S et al (2020) An epidemiology-based model for disclosing dynamics of malware propagation in heterogeneous and mobile WSNs. IEEE Access 8:43876–43887

    Article  Google Scholar 

  • Upadhyay RK, Iyengar SR (2013) Introduction to mathematical modeling and chaotic dynamics. CRC Press

    Book  Google Scholar 

  • Van den Driessche P (2017) Reproduction numbers of infectious disease models. Infect Dis Model 2(3):288–303

    Google Scholar 

  • Van Der Hofstad R (2024) Random graphs and complex networks, vol 54. Cambridge University Press

    Book  Google Scholar 

  • Wang X et al (2023) Modeling, critical threshold, and lowest-cost patching strategy of malware propagation in heterogeneous IoT networks. IEEE Trans Inf Forensics Secur 18:3531–3545

    Article  Google Scholar 

  • Yadav P, Keshri AK (2022) The dynamics of SEIQR-V malware propagation model in IoT networks. In: 2022 international conference on IoT and blockchain technology (ICIBT). IEEE

  • Yuan H et al (2015) A distributed link prediction algorithm based on clustering in dynamic social networks. In: 2015 IEEE international conference on systems, man, and cybernetics. IEEE

  • Zhu X et al (2020) Modeling and analysis of malware propagation for cluster-based wireless sensor networks. In: 2020 IEEE 6th international conference on dependability in sensor, cloud and big data systems and application (DependSys). IEEE

Download references

Funding

This research received no external funding.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization, E. Asadi and S.Hosseini; methodology, E. Asadi; software, E. Asadi; validation, S.Hosseini and E. Asadi; formal analysis, S.Hosseini and E. Asadi; investigation, S.Hosseini; resources, E. Asadi; data curation, S.Hosseini.; writing—original draft preparation, E. Asadi; writing—review and editing, S.Hosseini.; visualization, E. Asadi.; supervision, S.Hosseini.; project administration, S.Hosseini.

Corresponding author

Correspondence to Soodeh Hosseini.

Ethics declarations

Ethics approval and consent to participate

This article does not contain any studies with human participants performed by any of the authors.

Competing interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Asadi, E., Hosseini, S. A clustered-LPSEIRS malware propagation model in complex networks. Appl Netw Sci 9, 62 (2024). https://doi.org/10.1007/s41109-024-00672-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s41109-024-00672-w

Keywords