Analysis of malware propagation behavior in Social Internet of Things

被引:8
|
作者
Al Kindi, Asma [1 ]
Al Abri, Dawood [1 ,2 ]
Al Maashri, Ahmed [1 ]
Bait-Shiginah, Fahad [1 ]
机构
[1] Sultan Qaboos Univ, Dept Elect & Comp Engn, Muscat, Oman
[2] Sultan Qaboos Univ, Dept Elect & Comp Engn, POB 33, Al Khoud 123, Oman
关键词
epidemic models; malware; malware countermeasure; social Internet of Things; MODEL; NETWORKS;
D O I
10.1002/dac.4102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Social Internet of Things (SIoT) is an evolution of the Internet of Things, where objects interact socially with each other in the sense that they can independently establish new relationships, offer, or discover services, in order to accomplish their tasks with minimum involvement of the user. This additional convenience comes at the expense of higher risk of speeding up malware propagation through the dynamically created relationships. Because of the undesirable effects of malware (eg, disruption of device operation), it is essential to understand their spreading behavior in order to minimize their negative impacts. In this paper, we analyze malware propagation behavior in SIoT and investigate different parameters that influence spreading of malware. Toward that end, a simulator has been developed to simulate the spreading process of malware in SIoT. Many propagation scenarios were analyzed using the proposed simulator. Simulation results show that adding more relationships in the SIoT or increasing the number of owned objects per user has increased malware spreading rate. For example, the time to infect all objects is faster by 45% when objects communicate through four relationships compared with the case when objects communicate through only two relationships in SIoT. We also investigated ways to restrict the malware spreading. Results show that preventing objects from establishing dynamic social relationship slows down the infection by 40% compared with the next best scenario (ie, blocking co-location relationships), which means more time for vendors to patch up their products.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things
    Li, Li
    Cui, Jufu
    Zhang, Rui
    Xia, Hui
    Cheng, Xiangguo
    IEEE ACCESS, 2020, 8 : 64184 - 64192
  • [2] Modeling and Analysis Botnet Propagation in Social Internet of Things
    Xia, Hui
    Li, Li
    Cheng, Xiangguo
    Cheng, Xiuzhen
    Qiu, Tie
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7470 - 7481
  • [3] Modeling and controlling spatiotemporal malware propagation in mobile Internet of Things
    Cao, Huiying
    Peng, Da-Tian
    Yu, Dengxiu
    APPLIED MATHEMATICAL MODELLING, 2025, 144
  • [4] Fractional Optimal Control for Malware Propagation in Internet of Underwater Things
    Liu, Guiyun
    Tan, Zhihao
    Liang, Zhongwei
    Chen, Hanjie
    Zhong, Xiaojing
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11632 - 11651
  • [5] Social and Ethical Behavior in the Internet of Things
    Berman, Francine
    Cerf, Vinton G.
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 6 - 7
  • [6] Formal Specification for Internet of Things Malware
    Karanja, Evanson Mwangi
    Masupe, Shedden
    Gasennelwe-Jeffrey, Mandu
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 144 - 149
  • [7] Analysis and Forensics for Behavior Characteristics of Malware in Internet
    Ren Ping
    Liu Wu
    Sun Donghong
    Wu Jian-Ping
    Liu Ke
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [8] Analysis and Forensics for Behavior Characteristics of Malware in Internet
    Liu Wu
    Ren Ping
    Liu Ke
    Li Xing
    Wu Jian-ping
    Liu Ke
    2016 IEEE INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2016, : 545 - 549
  • [9] MODELLING MALWARE PROPAGATION ON THE INTERNET OF THINGS USING AN AGENT-BASED APPROACH ON COMPLEX NETWORKS
    Mwangi, Karanja
    Masupe, Shedden
    Jeffrey, Mandu
    JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2020, 6 (01): : 26 - 40
  • [10] Minimizing Malware Propagation in Internet of Things Networks: An Optimal Control Using Feedback Loop Approach
    Tayseer Jafar, Mousa
    Yang, Lu-Xing
    Li, Gang
    Zhu, Qingyi
    Gan, Chenquan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9682 - 9697