Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks

作者: Muhammad Junaid Farooq , Quanyan Zhu

DOI: 10.1109/TIFS.2019.2898817

关键词:

摘要: The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other in their vicinity. flexibility coupled software vulnerabilities devices, due low cost short time-to-market, exposes them a high risk malware infiltration. Malware may infect large number network using device-to-device (D2D) resulting the formation botnet, i.e., infected controlled by common malware. A botmaster exploit it launch network-wide attack sabotaging infrastructure facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model study D2D propagation IoT networks. Leveraging tools from dynamic population processes point process theory, capture infiltration coordination over topology. analysis mean-field equilibrium is used construct solve optimization problem defender prevent botnet patching while causing minimum overhead operation. developed serves basis assisting planning, design, defense networks defender’s standpoint.

参考文章(38)
Theodore Reed, Joseph Geis, Sven Dietrich, None, SkyNET: a 3G-enabled mobile attack drone and stealth botmaster WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 4- 4 ,(2011)
Romualdo Pastor-Satorras, Claudio Castellano, Piet Van Mieghem, Alessandro Vespignani, Epidemic processes in complex networks Reviews of Modern Physics. ,vol. 87, pp. 925- 979 ,(2015) , 10.1103/REVMODPHYS.87.925
Cheng-yi Xia, Zhen Wang, Joaquin Sanz, Sandro Meloni, Yamir Moreno, Effects of delayed recovery and nonuniform transmission on the spreading of diseases in complex networks Physica A: Statistical Mechanics and its Applications. ,vol. 392, pp. 1577- 1585 ,(2013) , 10.1016/J.PHYSA.2012.11.043
Shigen Shen, Hongjie Li, Risheng Han, Athanasios V. Vasilakos, Yihan Wang, Qiying Cao, Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1962- 1973 ,(2014) , 10.1109/TIFS.2014.2359333
Karthik Channakeshava, Deepti Chafekar, Keith Bisset, V.S. Anil Kumar, Madhav Marathe, EpiNet: a simulation framework to study the spread of malware in wireless networks simulation tools and techniques for communications, networks and system. pp. 6- ,(2009) , 10.4108/ICST.SIMUTOOLS2009.5652
M. Haenggi, Outage, local throughput, and capacity of random wireless networks IEEE Transactions on Wireless Communications. ,vol. 8, pp. 4350- 4359 ,(2009) , 10.1109/TWC.2009.090105
Yamir Moreno, Maziar Nekovee, Amalio F. Pacheco, Dynamics of rumor spreading in complex networks. Physical Review E. ,vol. 69, pp. 066130- ,(2004) , 10.1103/PHYSREVE.69.066130
Qian Wang, Zesheng Chen, Chao Chen, On the Characteristics of the Worm Infection Family Tree IEEE Transactions on Information Forensics and Security. ,vol. 7, pp. 1614- 1627 ,(2012) , 10.1109/TIFS.2012.2204981
Matthew Knysz, Xin Hu, Yuanyuan Zeng, Kang G. Shin, Open WiFi networks: Lethal weapons for botnets? international conference on computer communications. pp. 2631- 2635 ,(2012) , 10.1109/INFCOM.2012.6195668
Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V. Krishnamurthy, Denial of Service Attacks in Wireless Networks: The Case of Jammers IEEE Communications Surveys and Tutorials. ,vol. 13, pp. 245- 257 ,(2011) , 10.1109/SURV.2011.041110.00022