Analysis of malware propagation behavior in Social Internet of Things

被引:8
作者
Al Kindi, Asma [1 ]
Al Abri, Dawood [1 ,2 ]
Al Maashri, Ahmed [1 ]
Bait-Shiginah, Fahad [1 ]
机构
[1] Sultan Qaboos Univ, Dept Elect & Comp Engn, Muscat, Oman
[2] Sultan Qaboos Univ, Dept Elect & Comp Engn, POB 33, Al Khoud 123, Oman
关键词
epidemic models; malware; malware countermeasure; social Internet of Things; MODEL; NETWORKS;
D O I
10.1002/dac.4102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Social Internet of Things (SIoT) is an evolution of the Internet of Things, where objects interact socially with each other in the sense that they can independently establish new relationships, offer, or discover services, in order to accomplish their tasks with minimum involvement of the user. This additional convenience comes at the expense of higher risk of speeding up malware propagation through the dynamically created relationships. Because of the undesirable effects of malware (eg, disruption of device operation), it is essential to understand their spreading behavior in order to minimize their negative impacts. In this paper, we analyze malware propagation behavior in SIoT and investigate different parameters that influence spreading of malware. Toward that end, a simulator has been developed to simulate the spreading process of malware in SIoT. Many propagation scenarios were analyzed using the proposed simulator. Simulation results show that adding more relationships in the SIoT or increasing the number of owned objects per user has increased malware spreading rate. For example, the time to infect all objects is faster by 45% when objects communicate through four relationships compared with the case when objects communicate through only two relationships in SIoT. We also investigated ways to restrict the malware spreading. Results show that preventing objects from establishing dynamic social relationship slows down the infection by 40% compared with the next best scenario (ie, blocking co-location relationships), which means more time for vendors to patch up their products.
引用
收藏
页数:17
相关论文
共 23 条
[1]  
[Anonymous], 2013, PHD DISSERTATION, DOI DOI 10.1145/2501025.2501027
[2]  
[Anonymous], HUM MOB MOD DOWNL TL
[3]   From "Smart Objects" to "Social Objects": The Next Evolutionary Step of the Internet of Things [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (01) :97-105
[4]   The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo ;
Nitti, Michele .
COMPUTER NETWORKS, 2012, 56 (16) :3594-3608
[5]   On Modeling Malware Propagation in Generalized Social Networks [J].
Cheng, Shin-Ming ;
Ao, Weng Chon ;
Chen, Pin-Yu ;
Chen, Kwang-Cheng .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) :25-27
[6]  
Daley D., 2005, Epidemic modelling: an introduction
[7]  
Faghani MR., 2017, ARXIV170800969, V15, P1
[8]  
Gardner M.T., 2017, Proceedings of the 13th International Conference on the Design of Reliable Communication Networks (DRCN), P1
[9]  
Greenberg A, DEVILS IVY VULNERABI
[10]   The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks [J].
Hosseini, Soodeh ;
Azgomi, Mohammad Abdollahi .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 512 :803-817