Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks
The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them t...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2019-09, Vol.14 (9), p.2412-2426 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2426 |
---|---|
container_issue | 9 |
container_start_page | 2412 |
container_title | IEEE transactions on information forensics and security |
container_volume | 14 |
creator | Farooq, Muhammad Junaid Quanyan Zhu |
description | The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint. |
doi_str_mv | 10.1109/TIFS.2019.2898817 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_8638982</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8638982</ieee_id><sourcerecordid>2237669596</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</originalsourceid><addsrcrecordid>eNo9kMFOAjEURRujiYh-gHHTxC0zTttpaZeIoiSgCzEsm9JpSXGYYlti-HuHDGH1XnLPfck7ANyjIkeoEE-L6eQrxwUSOeaCczS8AD1EKctYgdHleUfkGtzEuCmKskSM98By7itTu2Y9gKNG1Yfo4gCqpoJzl9xaJecb6C18OTRq6zR89qkxCU582HaZa-DSBVObGOHUL-CHSX8-_MRbcGVVHc3dafbB9-R1MX7PZp9v0_FolmlCRcow15xZS7XQJSWsZGJYtf8gwrldcaKIqRQ3VlPMNF5ZXlUKlYa0aLWimlnSB4_d3V3wv3sTk9z4fWg_iRJjMmRMUMFaCnWUDj7GYKzcBbdV4SBRIY_-5NGfPPqTJ39t56HrOGPMmeeMtDkm_x-MbAI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2237669596</pqid></control><display><type>article</type><title>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</title><source>IEEE Electronic Library (IEL)</source><creator>Farooq, Muhammad Junaid ; Quanyan Zhu</creator><creatorcontrib>Farooq, Muhammad Junaid ; Quanyan Zhu</creatorcontrib><description>The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2019.2898817</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Analytical models ; Botnet ; Communication ; Communication system security ; device-to-device communication ; distributed denial of service ; Electronic devices ; Infiltration ; Internet of Things ; Malware ; Mathematical models ; Network topologies ; Optimization ; Patching ; population processes ; Sociology ; Statistics ; Wireless communication ; Wireless communications ; Wireless networks</subject><ispartof>IEEE transactions on information forensics and security, 2019-09, Vol.14 (9), p.2412-2426</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</citedby><cites>FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</cites><orcidid>0000-0003-0618-9345</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8638982$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8638982$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Farooq, Muhammad Junaid</creatorcontrib><creatorcontrib>Quanyan Zhu</creatorcontrib><title>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.</description><subject>Analytical models</subject><subject>Botnet</subject><subject>Communication</subject><subject>Communication system security</subject><subject>device-to-device communication</subject><subject>distributed denial of service</subject><subject>Electronic devices</subject><subject>Infiltration</subject><subject>Internet of Things</subject><subject>Malware</subject><subject>Mathematical models</subject><subject>Network topologies</subject><subject>Optimization</subject><subject>Patching</subject><subject>population processes</subject><subject>Sociology</subject><subject>Statistics</subject><subject>Wireless communication</subject><subject>Wireless communications</subject><subject>Wireless networks</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMFOAjEURRujiYh-gHHTxC0zTttpaZeIoiSgCzEsm9JpSXGYYlti-HuHDGH1XnLPfck7ANyjIkeoEE-L6eQrxwUSOeaCczS8AD1EKctYgdHleUfkGtzEuCmKskSM98By7itTu2Y9gKNG1Yfo4gCqpoJzl9xaJecb6C18OTRq6zR89qkxCU582HaZa-DSBVObGOHUL-CHSX8-_MRbcGVVHc3dafbB9-R1MX7PZp9v0_FolmlCRcow15xZS7XQJSWsZGJYtf8gwrldcaKIqRQ3VlPMNF5ZXlUKlYa0aLWimlnSB4_d3V3wv3sTk9z4fWg_iRJjMmRMUMFaCnWUDj7GYKzcBbdV4SBRIY_-5NGfPPqTJ39t56HrOGPMmeeMtDkm_x-MbAI</recordid><startdate>20190901</startdate><enddate>20190901</enddate><creator>Farooq, Muhammad Junaid</creator><creator>Quanyan Zhu</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-0618-9345</orcidid></search><sort><creationdate>20190901</creationdate><title>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</title><author>Farooq, Muhammad Junaid ; Quanyan Zhu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-28c86ff5c9c45364697d1101388fb83a3eda8efc526c2bf8dda14e3536db5c6f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Analytical models</topic><topic>Botnet</topic><topic>Communication</topic><topic>Communication system security</topic><topic>device-to-device communication</topic><topic>distributed denial of service</topic><topic>Electronic devices</topic><topic>Infiltration</topic><topic>Internet of Things</topic><topic>Malware</topic><topic>Mathematical models</topic><topic>Network topologies</topic><topic>Optimization</topic><topic>Patching</topic><topic>population processes</topic><topic>Sociology</topic><topic>Statistics</topic><topic>Wireless communication</topic><topic>Wireless communications</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Farooq, Muhammad Junaid</creatorcontrib><creatorcontrib>Quanyan Zhu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Farooq, Muhammad Junaid</au><au>Quanyan Zhu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-09-01</date><risdate>2019</risdate><volume>14</volume><issue>9</issue><spage>2412</spage><epage>2426</epage><pages>2412-2426</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The Internet of Things (IoT) relies heavily on wireless communication devices that are able to discover and interact with other wireless devices in their vicinity. The communication flexibility coupled with software vulnerabilities in devices, due to low cost and short time-to-market, exposes them to a high risk of malware infiltration. Malware may infect a large number of network devices using device-to-device (D2D) communication resulting in the formation of a botnet, i.e., a network of infected devices controlled by a common malware. A botmaster may exploit it to launch a network-wide attack sabotaging infrastructure and facilities, or for malicious purposes such as collecting ransom. In this paper, we propose an analytical model to study the D2D propagation of malware in wireless IoT networks. Leveraging tools from dynamic population processes and point process theory, we capture malware infiltration and coordination process over a network topology. The analysis of mean-field equilibrium in the population is used to construct and solve an optimization problem for the network defender to prevent botnet formation by patching devices while causing minimum overhead to network operation. The developed analytical model serves as a basis for assisting the planning, design, and defense of such networks from a defender's standpoint.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2019.2898817</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-0618-9345</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2019-09, Vol.14 (9), p.2412-2426 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_8638982 |
source | IEEE Electronic Library (IEL) |
subjects | Analytical models Botnet Communication Communication system security device-to-device communication distributed denial of service Electronic devices Infiltration Internet of Things Malware Mathematical models Network topologies Optimization Patching population processes Sociology Statistics Wireless communication Wireless communications Wireless networks |
title | Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T14%3A10%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Modeling,%20Analysis,%20and%20Mitigation%20of%20Dynamic%20Botnet%20Formation%20in%20Wireless%20IoT%20Networks&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Farooq,%20Muhammad%20Junaid&rft.date=2019-09-01&rft.volume=14&rft.issue=9&rft.spage=2412&rft.epage=2426&rft.pages=2412-2426&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2019.2898817&rft_dat=%3Cproquest_RIE%3E2237669596%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2237669596&rft_id=info:pmid/&rft_ieee_id=8638982&rfr_iscdi=true |