A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets

被引:0
作者
Hu, Jiamin [1 ]
Yang, Xiaofan [1 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing, Peoples R China
来源
PLOS ONE | 2024年 / 19卷 / 12期
基金
中国国家自然科学基金;
关键词
PROPAGATION; EPIDEMICS; NETWORKS;
D O I
10.1371/journal.pone.0301888
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Distributed denial of service (DDoS) is a type of cyberattack in which multiple compromised systems flood the bandwidth or resources of a single system, making the flooded system inaccessible to legitimate users. Since large-scale botnets based on the Internet of Things (IoT) have been hotbeds for launching DDoS attacks, it is crucial to defend against DDoS-capable IoT botnets effectively. In consideration of resource constraints and frequent state changes for IoT devices, they should be equipped with repair measures that are cost-effective and adaptive to mitigate the impact of DDoS attacks. From the mitigation perspective, we refer to the collection of repair costs at all times as a repair strategy. This paper is then devoted to studying the problem of developing a cost-effective and adaptive repair strategy (ARS). First, we establish an IoT botware propagation model that fully captures the state evolution of an IoT network under attack and defense interventions. On this basis, we model the ARS problem as a data-driven optimal control problem, aiming to realize both learning and prediction of propagation parameters based on network traffic data observed at multiple discrete time slots and control of IoT botware propagation to a desired infection level. By leveraging optimal control theory, we propose an iterative algorithm to solve the problem, numerically obtaining the learned time-varying parameters and a repair strategy. Finally, the performance of the learned parameters and the resulting strategy are examined through computer experiments.
引用
收藏
页数:23
相关论文
共 43 条
  • [1] An epidemic model for the investigation of multi-malware attack in wireless sensor network
    Awasthi, Shashank
    Srivastava, Pramod Kumar
    Kumar, Naresh
    Ojha, Rudra Pratap
    Pandey, Purnendu Shekhar
    Singh, Rajesh
    Gehlot, Anita
    Priyadarshi, Neeraj
    Jain, Rituraj
    Bakare, Yohannes Bekuma
    [J]. IET COMMUNICATIONS, 2023, 17 (11) : 1274 - 1287
  • [2] Modeling the impact of the habituation effect on information spreading processes with repeated contacts under an SI model
    Bartkw, Piotr
    Bortko, Kamil
    Jankowski, Jaroslaw
    Pazura, Patryk
    [J]. PLOS ONE, 2023, 18 (04):
  • [3] Basar T., 2012, Academic Press
  • [4] Bi J, 2022, 2022 IEEE INT C TRUS
  • [5] Bi J., 2022, IEEE Transactions on Industrial Informatics
  • [6] False Data Injection- and Propagation-Aware Game Theoretical Approach for Microgrids
    Bi, Jichao
    Luo, Fengji
    He, Shibo
    Liang, Gaoqi
    Meng, Wenchao
    Sun, Mingyang
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (05) : 3342 - 3353
  • [7] Exact Markov Chain of Random Propagation of Malware With Network-Level Mitigation
    Carnier, Rodrigo Matos
    Li, Yue
    Fujimoto, Yasutaka
    Shikata, Junji
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10933 - 10947
  • [8] Modeling and Analyzing Malware Propagation Over Wireless Networks Based on Hypergraphs
    Chen, Jiaxing
    Sun, Shiwen
    Xia, Chengyi
    Shi, Dinghua
    Chen, Guanrong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (06): : 3767 - 3778
  • [9] Enhancing Cyber-Physical Resiliency of Power Grids under IoT-Enabled Dynamic Botnet Attacks
    Chen, Juntao
    [J]. 2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,
  • [10] A computational propagation model for malware based on the SIR classic model
    del Rey, A. Martin
    Vara, R. Casado
    Gonzalez, S. Rodriguez
    [J]. NEUROCOMPUTING, 2022, 484 : 161 - 171