2019
DOI: 10.1109/tifs.2019.2898817
|View full text |Cite
|
Sign up to set email alerts
|

Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
55
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 78 publications
(55 citation statements)
references
References 37 publications
0
55
0
Order By: Relevance
“…Game-theoretic models are natural frameworks to capture the multistage interaction between attackers and defenders. Recently, game theory has been applied to different sets of security problems, e.g., Stackelberg and signaling games for deception and proactive defenses [21,6,22,23,24,16,25,26,27], network games for cyber-physical security [28,29,30,31,32,33,34,35,36,37], dynamic games for adaptive defense [38,39,40,41,3,42,43,44,45,46], and mechanism design theory for security [47,48,49,50,51,52,53,54,55].…”
Section: Literaturementioning
confidence: 99%
“…Game-theoretic models are natural frameworks to capture the multistage interaction between attackers and defenders. Recently, game theory has been applied to different sets of security problems, e.g., Stackelberg and signaling games for deception and proactive defenses [21,6,22,23,24,16,25,26,27], network games for cyber-physical security [28,29,30,31,32,33,34,35,36,37], dynamic games for adaptive defense [38,39,40,41,3,42,43,44,45,46], and mechanism design theory for security [47,48,49,50,51,52,53,54,55].…”
Section: Literaturementioning
confidence: 99%
“…The collection of real-time data and information dissemination rely on the connectivity of the network, which is vital in allowing the IoBT network to unleash its full potential [ 8 ]. However, most of the connections within the IoBT are wireless in nature [ 9 , 10 , 11 ]. Attackers can selectively destroy specific channels and data packets, causing communication links in IoBT networks to be removed [ 1 , 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…Farooq et al also proposed a cognitive connectivity framework, which can cognitively adapt to the changes in the network to interconnect spatially dispersed smart devices thus making it possible to remotely deploy mobile Internet of Things [ 3 ]. In order to model and analyze malware infection in wireless IoT networks, Farooq and Zhu proposed a variation of the mean field population process model based on a customized state space that allows us to analyze the formation of botnets in wireless IoT networks and helps in making corresponding network defense decisions [ 9 ]. Most of the aforementioned studies are carried out from the perspective of network security design, and there is no research to analyze the robustness of the Internet of Battlefield Things under the optimal attack strategy from the opponent (namely, the ability of the network to maintain connectivity in the worst case).…”
Section: Introductionmentioning
confidence: 99%
“…As such, users are aware of the attack only when an existing infection is identified [1]. This necessitates the development of exclusive models for such wireless IoT networks which can capture the spatial distribution of the devices and the dynamic processes of malware infiltration, control command propagation, and device patching by the defender [5].…”
Section: Introductionmentioning
confidence: 99%
“…remaining free memory of each node and m i is the initially available memory, Hence, the probability of abandoning node τ depends on the size of the malware packet installed on the infected node by the botmaster and the fraction of the remaining free memory of the infected node (bot) during propagation. The processing of malware packet and the abandon probability rate can be mathematically expressed in equation(4)and(5) respectively below:…”
mentioning
confidence: 99%