Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks

The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2019-09, Vol.14 (9), p.2412-2426
Hauptverfasser: Farooq, Muhammad Junaid, Quanyan Zhu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2426
container_issue 9
container_start_page 2412
container_title IEEE transactions on information forensics and security
container_volume 14
creator Farooq, Muhammad Junaid
Quanyan Zhu
description The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.
doi_str_mv 10.1109/TIFS.2019.2898817
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8638982</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8638982</ieee_id><sourcerecordid>2237669596</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</originalsourceid><addsrcrecordid>eNo9kMFOAjEURRujiYh-gHHTxC0zTttpaZeIoiSgCzEsm9JpSXGYYlti-HuHDGH1XnLPfck7ANyjIkeoEE-L6eQrxwUSOeaCczS8AD1EKctYgdHleUfkGtzEuCmKskSM98By7itTu2Y9gKNG1Yfo4gCqpoJzl9xaJecb6C18OTRq6zR89qkxCU582HaZa-DSBVObGOHUL-CHSX8-_MRbcGVVHc3dafbB9-R1MX7PZp9v0_FolmlCRcow15xZS7XQJSWsZGJYtf8gwrldcaKIqRQ3VlPMNF5ZXlUKlYa0aLWimlnSB4_d3V3wv3sTk9z4fWg_iRJjMmRMUMFaCnWUDj7GYKzcBbdV4SBRIY_-5NGfPPqTJ39t56HrOGPMmeeMtDkm_x-MbAI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2237669596</pqid></control><display><type>article</type><title>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Farooq, Muhammad Junaid ; Quanyan Zhu</creator><creatorcontrib>Farooq, Muhammad Junaid ; Quanyan Zhu</creatorcontrib><description>The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2019.2898817</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Analytical models ; Botnet ; Communication ; Communication system security ; device-to-device communication ; distributed denial of service ; Electronic devices ; Infiltration ; Internet of Things ; Malware ; Mathematical models ; Network topologies ; Optimization ; Patching ; population processes ; Sociology ; Statistics ; Wireless communication ; Wireless communications ; Wireless networks</subject><ispartof>IEEE transactions on information forensics and security, 2019-09, Vol.14 (9), p.2412-2426</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</citedby><cites>FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</cites><orcidid>0000-0003-0618-9345</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8638982$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8638982$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Farooq, Muhammad Junaid</creatorcontrib><creatorcontrib>Quanyan Zhu</creatorcontrib><title>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.</description><subject>Analytical models</subject><subject>Botnet</subject><subject>Communication</subject><subject>Communication system security</subject><subject>device-to-device communication</subject><subject>distributed denial of service</subject><subject>Electronic devices</subject><subject>Infiltration</subject><subject>Internet of Things</subject><subject>Malware</subject><subject>Mathematical models</subject><subject>Network topologies</subject><subject>Optimization</subject><subject>Patching</subject><subject>population processes</subject><subject>Sociology</subject><subject>Statistics</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFOAjEURRujiYh-gHHTxC0zTttpaZeIoiSgCzEsm9JpSXGYYlti-HuHDGH1XnLPfck7ANyjIkeoEE-L6eQrxwUSOeaCczS8AD1EKctYgdHleUfkGtzEuCmKskSM98By7itTu2Y9gKNG1Yfo4gCqpoJzl9xaJecb6C18OTRq6zR89qkxCU582HaZa-DSBVObGOHUL-CHSX8-_MRbcGVVHc3dafbB9-R1MX7PZp9v0_FolmlCRcow15xZS7XQJSWsZGJYtf8gwrldcaKIqRQ3VlPMNF5ZXlUKlYa0aLWimlnSB4_d3V3wv3sTk9z4fWg_iRJjMmRMUMFaCnWUDj7GYKzcBbdV4SBRIY_-5NGfPPqTJ39t56HrOGPMmeeMtDkm_x-MbAI</recordid><startdate>20190901</startdate><enddate>20190901</enddate><creator>Farooq, Muhammad Junaid</creator><creator>Quanyan Zhu</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-0618-9345</orcidid></search><sort><creationdate>20190901</creationdate><title>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</title><author>Farooq, Muhammad Junaid ; Quanyan Zhu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Analytical models</topic><topic>Botnet</topic><topic>Communication</topic><topic>Communication system security</topic><topic>device-to-device communication</topic><topic>distributed denial of service</topic><topic>Electronic devices</topic><topic>Infiltration</topic><topic>Internet of Things</topic><topic>Malware</topic><topic>Mathematical models</topic><topic>Network topologies</topic><topic>Optimization</topic><topic>Patching</topic><topic>population processes</topic><topic>Sociology</topic><topic>Statistics</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Farooq, Muhammad Junaid</creatorcontrib><creatorcontrib>Quanyan Zhu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Farooq, Muhammad Junaid</au><au>Quanyan Zhu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-09-01</date><risdate>2019</risdate><volume>14</volume><issue>9</issue><spage>2412</spage><epage>2426</epage><pages>2412-2426</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2019.2898817</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-0618-9345</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2019-09, Vol.14 (9), p.2412-2426
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_8638982
source IEEE Electronic Library (IEL)
subjects Analytical models
Botnet
Communication
Communication system security
device-to-device communication
distributed denial of service
Electronic devices
Infiltration
Internet of Things
Malware
Mathematical models
Network topologies
Optimization
Patching
population processes
Sociology
Statistics
Wireless communication
Wireless communications
Wireless networks
title Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T14%3A10%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Modeling,%20Analysis,%20and%20Mitigation%20of%20Dynamic%20Botnet%20Formation%20in%20Wireless%20IoT%20Networks&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Farooq,%20Muhammad%20Junaid&rft.date=2019-09-01&rft.volume=14&rft.issue=9&rft.spage=2412&rft.epage=2426&rft.pages=2412-2426&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2019.2898817&rft_dat=%3Cproquest_RIE%3E2237669596%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2237669596&rft_id=info:pmid/&rft_ieee_id=8638982&rfr_iscdi=true