Analysis of malware propagation behavior in Social Internet of Things

被引:8
|
作者
Al Kindi, Asma [1 ]
Al Abri, Dawood [1 ,2 ]
Al Maashri, Ahmed [1 ]
Bait-Shiginah, Fahad [1 ]
机构
[1] Sultan Qaboos Univ, Dept Elect & Comp Engn, Muscat, Oman
[2] Sultan Qaboos Univ, Dept Elect & Comp Engn, POB 33, Al Khoud 123, Oman
关键词
epidemic models; malware; malware countermeasure; social Internet of Things; MODEL; NETWORKS;
D O I
10.1002/dac.4102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Social Internet of Things (SIoT) is an evolution of the Internet of Things, where objects interact socially with each other in the sense that they can independently establish new relationships, offer, or discover services, in order to accomplish their tasks with minimum involvement of the user. This additional convenience comes at the expense of higher risk of speeding up malware propagation through the dynamically created relationships. Because of the undesirable effects of malware (eg, disruption of device operation), it is essential to understand their spreading behavior in order to minimize their negative impacts. In this paper, we analyze malware propagation behavior in SIoT and investigate different parameters that influence spreading of malware. Toward that end, a simulator has been developed to simulate the spreading process of malware in SIoT. Many propagation scenarios were analyzed using the proposed simulator. Simulation results show that adding more relationships in the SIoT or increasing the number of owned objects per user has increased malware spreading rate. For example, the time to infect all objects is faster by 45% when objects communicate through four relationships compared with the case when objects communicate through only two relationships in SIoT. We also investigated ways to restrict the malware spreading. Results show that preventing objects from establishing dynamic social relationship slows down the infection by 40% compared with the next best scenario (ie, blocking co-location relationships), which means more time for vendors to patch up their products.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Malware Propagation in Online Social Networks
    Faghani, Mohammad Reza
    Saidi, Hossein
    2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 8 - +
  • [22] Malware Detection Framework Based on Iterative Neighborhood Component Analysis for Internet of Medical Things
    Smmarwar, Santosh K.
    Gupta, Govind P.
    Kumar, Sanjay
    BIOMEDICAL ENGINEERING SCIENCE AND TECHNOLOGY, ICBEST 2023, 2024, 2003 : 98 - 106
  • [23] Analysis of internet of things malware using image texture features and machine learning techniques
    Evanson, Mwangi Karanja
    Shedden, Masupe
    Jeffrey, Mandu Gasennelwe
    INTERNET OF THINGS, 2020, 9
  • [24] Traffic Analysis Using Decentralized Social Internet Of Things
    Mostafi, Sifatul
    Khan, Farzana
    Antar, Kamrul Islam
    Chaki, Dipankar
    Chakrabarty, Amitabha
    2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 328 - 333
  • [25] Malware Diffusion Behavior Analysis in the Internet and its Immune Protection Strategies
    Xiao, Renbin
    Gong, Xiaoguang
    Yu, Tongyang
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [26] Generative adversarial network to detect unseen Internet of Things malware
    Moti, Zahra
    Hashemi, Sattar
    Karimipour, Hadis
    Dehghantanha, Ali
    Jahromi, Amir Namavar
    Abdi, Lida
    Alavi, Fatemeh
    AD HOC NETWORKS, 2021, 122
  • [27] Challenge Paper: Towards Open Datasets for Internet of Things Malware
    Karanja, Evanson Mwangi
    Masupe, Shedden
    Gasennelwe-Jeffrey, Mandu
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2018, 10 (02):
  • [28] FIViz: Forensics Investigation through Visualization for Malware in Internet of Things
    Ahmad, Israr
    Shah, Munam Ali
    Khattak, Hasan Ali
    Ameer, Zoobia
    Khan, Murad
    Han, Kijun
    SUSTAINABILITY, 2020, 12 (18)
  • [29] Malware Propagation Analysis in Message-Recallable Online Social Networks
    Chen, Yijin
    Mao, Yuming
    Leng, Supeng
    Wei, Yunkai
    Chiang, Yuchen
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1366 - 1371
  • [30] Understanding Internet of Things malware by analyzing endpoints in their static artifacts
    Choi, Jinchun
    Anwar, Afsah
    Alabduljabbar, Abdulrahman
    Alasmary, Hisham
    Spaulding, Jeffrey
    Wang, An
    Chen, Songqing
    Nyang, DaeHun
    Awad, Amro
    Mohaisen, David
    COMPUTER NETWORKS, 2022, 206