Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling

被引:23
作者
Mahboubi, Arash [1 ]
Camtepe, Seyit [2 ]
Ansari, Keyvan [3 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Port Macquarie, NSW 2444, Australia
[2] CSIRO Data61, Marsfield, NSW 2122, Australia
[3] Univ Sunshine Coast, Sch Sci Technol & Engn, Maroochydore, Qld 4556, Australia
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Botnet; Malware; Mathematical model; Servers; IP networks; Epidemics; Password; IoT malware; botnet; Mirai; propagation modeling; information-theoretic security; malware detection and mitigation; PROPAGATION; WORMS; DYNAMICS;
D O I
10.1109/ACCESS.2020.3044277
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) devices are being widely deployed and have been targeted and victimized by malware attacks. The mathematical modelling for an accurate prediction of malicious spreads of botnets across IoT networks is of great importance. Suppose the spread of IoT botnets can be predicted using mathematical models, the security community can then take the necessary steps to deter an outbreak of botnet attacks and minimize the damage caused by malware. This paper surveys mobile malware epidemiological models to understand the mechanisms and dynamics of malware spread for IoT botnets. We describe the characteristics of IoT botnets based on the Susceptible-Infection-Recovery-Susceptible and Susceptible-Exposed-Infection-Recovery-Susceptible epidemic models. These models extend the traditional SIR (Susceptible-Infection-Recovery) model by adding extra states and parameters specific to the epidemic spread of IoT botnets. We use mathematical modelling to simulate complex spreading processes of IoT botnets and interpret the influence of an epidemic on distributed denial of service attacks. We use MATLAB and R to illustrate the use of a stochastic IoT botnet transmission model in the identification and mitigation of challenges towards minimizing the impact of devastating IoT botnet epidemics.
引用
收藏
页码:228818 / 228830
页数:13
相关论文
共 42 条
  • [1] An overview of social engineering malware: Trends, tactics, and implications
    Abraham, Sherly
    Chengalur-Smith, InduShobha
    [J]. TECHNOLOGY IN SOCIETY, 2010, 32 (03) : 183 - 196
  • [2] Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
  • [3] Bao T, 2007, INT C COMP SUPP COOP, P42
  • [4] Botnets and Internet of Things Security
    Bertino, Elisa
    Islam, Nayeem
    [J]. COMPUTER, 2017, 50 (02) : 76 - 79
  • [5] The SEIRS model for infectious disease dynamics
    Bjornstad, Ottar N.
    Shea, Katriona
    Krzywinski, Martin
    Altman, Naomi
    [J]. NATURE METHODS, 2020, 17 (06) : 557 - 558
  • [6] On Modeling Malware Propagation in Generalized Social Networks
    Cheng, Shin-Ming
    Ao, Weng Chon
    Chen, Pin-Yu
    Chen, Kwang-Cheng
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) : 25 - 27
  • [7] DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
    De Donno, Michele
    Dragoni, Nicola
    Giaretta, Alberto
    Spognardi, Angelo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Modeling and Restraining Mobile Virus Propagation
    Gao, Chao
    Liu, Jiming
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (03) : 529 - 541
  • [9] Gao T, 2011, PROCEEDINGS OF THE ASME/JSME 8TH THERMAL ENGINEERING JOINT CONFERENCE 2011, VOL 2, P1
  • [10] Saddle-Point Strategies in Malware Attack
    Khouzani, M. H. R.
    Sarkar, Saswati
    Altman, Eitan
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (01) : 31 - 43