Analysis of malware propagation behavior in Social Internet of Things

被引:8
|
作者
Al Kindi, Asma [1 ]
Al Abri, Dawood [1 ,2 ]
Al Maashri, Ahmed [1 ]
Bait-Shiginah, Fahad [1 ]
机构
[1] Sultan Qaboos Univ, Dept Elect & Comp Engn, Muscat, Oman
[2] Sultan Qaboos Univ, Dept Elect & Comp Engn, POB 33, Al Khoud 123, Oman
关键词
epidemic models; malware; malware countermeasure; social Internet of Things; MODEL; NETWORKS;
D O I
10.1002/dac.4102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Social Internet of Things (SIoT) is an evolution of the Internet of Things, where objects interact socially with each other in the sense that they can independently establish new relationships, offer, or discover services, in order to accomplish their tasks with minimum involvement of the user. This additional convenience comes at the expense of higher risk of speeding up malware propagation through the dynamically created relationships. Because of the undesirable effects of malware (eg, disruption of device operation), it is essential to understand their spreading behavior in order to minimize their negative impacts. In this paper, we analyze malware propagation behavior in SIoT and investigate different parameters that influence spreading of malware. Toward that end, a simulator has been developed to simulate the spreading process of malware in SIoT. Many propagation scenarios were analyzed using the proposed simulator. Simulation results show that adding more relationships in the SIoT or increasing the number of owned objects per user has increased malware spreading rate. For example, the time to infect all objects is faster by 45% when objects communicate through four relationships compared with the case when objects communicate through only two relationships in SIoT. We also investigated ways to restrict the malware spreading. Results show that preventing objects from establishing dynamic social relationship slows down the infection by 40% compared with the next best scenario (ie, blocking co-location relationships), which means more time for vendors to patch up their products.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Graph representation federated learning for malware detection in Internet of health things
    Amjath, Mohamed
    Henna, Shagufta
    Rathnayake, Upaka
    RESULTS IN ENGINEERING, 2025, 25
  • [42] An opcode-based technique for polymorphic Internet of Things malware detection
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (06):
  • [43] CNN-Based Malware Variants Detection Method for Internet of Things
    Li, Qi
    Mi, Jiaxin
    Li, Weishi
    Wang, Junfeng
    Cheng, Mingyu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (23) : 16946 - 16962
  • [44] MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things
    Lekssays, Ahmed
    Sirigu, Giorgia
    Carminati, Barbara
    Ferrari, Elena
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [45] Deep learning hybridization for improved malware detection in smart Internet of Things
    Almazroi, Abdulwahab Ali
    Ayub, Nasir
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [46] A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of Things
    Ahmad, Ijaz
    Wan, Zhong
    Ahmad, Ashfaq
    Ullah, Syed Sajid
    MATHEMATICS, 2024, 12 (10)
  • [47] Malware Detection for Internet of Things Using One-Class Classification
    Shi, Tongxin
    McCann, Roy A.
    Huang, Ying
    Wang, Wei
    Kong, Jun
    SENSORS, 2024, 24 (13)
  • [48] Enabling the Social Internet of Things and Social Cloud
    Zhang, Weishan
    Jin, Qun
    El Baz, Didier
    IEEE CLOUD COMPUTING, 2015, 2 (06): : 6 - 9
  • [49] Availability Evaluation of Industrial Internet of Things Under Malware Propagation: An Extended Reliability Block Diagram Approach Based on Stochastic Games
    Yu, Shoujian
    Jin, Ouwen
    Shen, Yizhou
    Wu, Guowen
    Yu, Shui
    Shen, Shigen
    IEEE TRANSACTIONS ON RELIABILITY, 2024,
  • [50] Machine Learning Methods for Detecting Internet-of-Things (IoT) Malware
    Yaokumah, Winfred
    Appati, Justice Kwame
    Kumah, Daniel
    INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2021, 15 (04)