Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Malware containment with immediate response in IoT networks: : An optimal control approach

Published: 01 December 2024 Publication History

Abstract

The exponential growth of Internet of Things (IoT) devices has triggered a substantial increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 percent in such attacks, underscoring the urgent need for robust cybersecurity measures. When a cyber-attack breaches an IoT network, it initiates the dissemination of malware across the network. However, to counteract this threat, an immediate installation of a new patch becomes imperative. The time frame for developing and deploying the patch can vary significantly, contingent upon the specifics of the cyber-attack. This paper aims to address the challenge of pre-emptively mitigating cyber-attacks prior to the installation of a new patch. The main novelties of our work include: (1) A well-designed node-level model known as Susceptible, Infected High, Infected Low, Recover First, and Recover Complete ( SI H I L R F R C ). It categorizes the infected node states into infected high and infected low, according to the categorization of infection states for IoT devices, to accelerate containment strategies for malware propagation and improve mitigation of cyber-attacks targeting IoT networks by incorporating immediate response within a restricted environment. (2) Development of an optimal immediate response strategy (IRS) by modeling and analyzing the associated optimal control problem. This model aims to enhance the containment of malware propagation across IoT networks by swiftly responding to cyber threats. Finally, several numerical analyses were performed to fully illustrate the main findings. In addition, a dataset has been constructed for experimental purposes to simulate real-world scenarios within IoT networks, particularly in smart home environments.

References

[1]
AV-TEST - The Independent IT-Security Institute AVATLAS, AV-ATLAS - malware and PUA — portal.av-atlas.org, 2023, https://portal.av-atlas.org/malware. (Accessed 1 August 2023).
[2]
IoT threats in 2023 — securelist.com,, 2024, https://securelist.com/iot-threat-report-2023/110644/. (Accessed 10 June 2024).
[3]
Inc. Zscaler, New threat report finds a 400 attacks - industrial cybersecurity pulse — industrialcybersecuritypulse.com, 2024, https://www.industrialcybersecuritypulse.com/it-ot/new-threat-report-finds-a-400-increase-in-iot-and-ot-malware-attacks/. (Accessed 10 June 2024).
[4]
Chatzoglou Efstratios, Kambourakis Georgios, Kolias Constantinos, Your wap is at risk: a vulnerability analysis on wireless access point web-based management interfaces, Secur. Commun. Netw. 2022 (2022).
[5]
Ashraf Imran, Park Yongwan, Hur Soojung, Kim Sung Won, Alroobaea Roobaea, Zikria Yousaf Bin, Nosheen Summera, A survey on cyber security threats in IoT-enabled maritime industry, IEEE Trans. Intell. Transp. Syst. (2022).
[6]
Bernoulli Daniel, Essai d’une nouvelle analyse de la mortalité causée par la petite vérole, et des avantages de l’inoculation pour la prévenir, Hist. l’Acad. Roy. Sci.(Paris) avec Mem (1760) 1–45.
[7]
Chen Bo-Rui, Cheng Shin-Ming, Mwangi Maina Bernard, A mobility-based epidemic model for IoT malware spread, IEEE Access 10 (2022) 107929–107941.
[8]
Xia Hui, Li Li, Cheng Xiangguo, Liu Chao, Qiu Tie, A dynamic virus propagation model based on social attributes in city IoT, IEEE Internet Things J. 7 (9) (2020) 8036–8048.
[9]
Xia Hui, Li Li, Cheng Xiangguo, Cheng Xiuzhen, Qiu Tie, Modeling and analysis botnet propagation in social internet of things, IEEE Internet Things J. 7 (8) (2020) 7470–7481.
[10]
Yan Qing, Song Lipeng, Zhang Chenlu, Li Jing, Feng Shanshan, Modeling and control of malware propagation in wireless IoT networks, Secur. Commun. Netw. 2021 (2021) 1–13.
[11]
Miao Li, Li Shuai, Stochastic differential game-based malware propagation in edge computing-based IoT, Secur. Commun. Netw. 2021 (2021) 1–11.
[12]
Zhang Letian, Song Linqi, Xu Jie, Preventing malware propagation in D2D offloading networks with strategic mobile users, in: 2019 IEEE Global Communications Conference, GLOBECOM, IEEE, 2019, pp. 1–6.
[13]
Zhang Letian, Xu Jie, Differential security game in heterogeneous device-to-device offloading network under epidemic risks, IEEE Trans. Netw. Sci. Eng. 7 (3) (2019) 1852–1861.
[14]
Zhang Hu, Upadhyay Ranjit Kumar, Liu Guiyun, Zhang Zizhen, Hopf bifurcation and optimal control of a delayed malware propagation model on mobile wireless sensor networks, Results Phys. 41 (2022).
[15]
Muthukrishnan Senthilkumar, Muthukumar Sumathi, Chinnadurai Veeramani, Optimal control of malware spreading model with tracing and patching in wireless sensor networks, Wirel. Pers. Commun. 117 (2021) 2061–2083.
[16]
Dong Nguyen Phuong, Long Hoang Viet, Son Nguyen Thi Kim, The dynamical behaviors of fractional-order SE1E2IQR epidemic model for malware propagation on wireless sensor network, Commun. Nonlinear Sci. Numer. Simul. 111 (2022).
[17]
Vaezi Mojtaba, Azari Amin, Khosravirad Saeed R, Shirvanimoghaddam Mahyar, Azari M Mahdi, Chasaki Danai, Popovski Petar, Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G, IEEE Commun. Surv. Tutor. 24 (2) (2022) 1117–1174.
[18]
Rao Anil V., A survey of numerical methods for optimal control, Adv. Astronaut. Sci. 135 (1) (2009) 497–528.
[19]
Liu Guiyun, Chen Jieyong, Liang Zhongwei, Peng Zhimin, Li Junqiang, Dynamical analysis and optimal control for a SEIR model based on virus mutation in WSNs, Mathematics 9 (9) (2021) 929.
[20]
Nowzari Cameron, Preciado Victor M., Pappas George J., Analysis and control of epidemics: A survey of spreading processes on complex networks, IEEE Control Syst. Mag. 36 (1) (2016) 26–46,.
[21]
Zino Lorenzo, Cao Ming, Analysis, prediction, and control of epidemics: A survey from scalar to dynamic network models, IEEE Circuits Syst. Mag. 21 (4) (2021) 4–23.
[22]
Huang Yunhan, Zhu Quanyan, Game-theoretic frameworks for epidemic spreading and human decision-making: A review, Dyn. Games Appl. 12 (1) (2022) 7–48.
[23]
Xu Degang, Xu Xiyang, Xie Yongfang, Yang Chunhua, Optimal control of an SIVRS epidemic spreading model with virus variation based on complex networks, Commun. Nonlinear Sci. Numer. Simul. 48 (2017) 200–210.
[24]
Zhang Xulong, Gan Chenquan, Global attractivity and optimal dynamic countermeasure of a virus propagation model in complex networks, Phys. A 490 (2018) 1004–1018.
[25]
Zhang Chunming, Huang Haitao, Optimal control strategy for a novel computer virus propagation model on scale-free networks, Phys. A 451 (2016) 251–265.
[26]
Yu Zhenhua, Lu Si, Wang Dan, Li Zhiwu, Modeling and analysis of rumor propagation in social networks, Inform. Sci. 580 (2021) 857–873.
[27]
Overton Christopher E, Wilkinson Robert R, Loyinmi Adedapo, Miller Joel C, Sharkey Kieran J, Approximating quasi-stationary behaviour in network-based sis dynamics, Bull. Math. Biol. 84 (2022) 1–32.
[28]
Bi Jichao, He Shibo, Luo Fengji, Meng Wenchao, Ji Luyue, Huang Da-Wen, Defense of advanced persistent threat on industrial internet of things with lateral movement modelling, IEEE Trans. Ind. Inform. (2022).
[29]
Huang Kaifan, Li Pengdeng, Yang Lu-Xing, Yang Xiaofan, Tang Yuan Yan, Seeking best-balanced patch-injecting strategies through optimal control approach, Secur. Commun. Netw. 2019 (2019) 1–12.
[30]
Yang Lu-Xing, Draief Moez, Yang Xiaofan, The optimal dynamic immunization under a controlled heterogeneous node-based SIRS model, Phys. A 450 (2016) 403–415.
[31]
Zheng Yonghua, Zhu Jianhua, Lai Chaoan, A SEIQR model considering the effects of different quarantined rates on worm propagation in mobile internet, Math. Probl. Eng. 2020 (1) (2020).
[32]
Kirk Donald E., Optimal Control Theory: An Introduction, Courier Corporation, 2004.
[33]
Liberzon Daniel, Calculus of Variations and Optimal Control Theory: A Concise Introduction, Princeton University Press, 2011.
[34]
Fleming Wendell H., Rishel Raymond W., Deterministic and Stochastic Optimal Control, Springer Science and Business Media, 2012.
[35]
Kamien Morton I., Schwartz Nancy Lou, Dynamic Optimization: The Calculus of Variations and Optimal Control in Economics and Management, courier corporation, 2012.
[36]
Fister K. Renee, Lenhart Suzanne, McNally Joseph Scott, Optimizing Chemotherapy in an HIV Model, Southwest Texas State University, Department of Mathematics, 1998.
[37]
Nowzari Cameron, Ogura Masaki, Preciado Victor M., Pappas George J., Optimal resource allocation for containing epidemics on time-varying networks, in: 2015 49th Asilomar Conference on Signals, Systems and Computers, IEEE, 2015, pp. 1333–1337.
[38]
Kandhway Kundan, Kuri Joy, Optimal resource allocation over time and degree classes for maximizing information dissemination in social networks, IEEE/ACM Trans. Netw. 24 (5) (2016) 3204–3217.
[39]
Asano Erika, Gross Louis J, Lenhart Suzanne, Real Leslie A, Optimal control of vaccine distribution in a rabies metapopulation model, Math. Biosci. Eng. 5 (2) (2008) 219–238.
[40]
Gaff Holly, Schaefer Elsa, Optimal control applied to vaccination and treatment strategies for various epidemiological models, Math. Biosci. Eng. 6 (3) (2009) 469–492.
[41]
Kandhway Kundan, Kuri Joy, How to run a campaign: Optimal control of SIS and SIR information epidemics, Appl. Math. Comput. 231 (2014) 79–92.
[42]
Borgia Eleonora, The internet of things vision: Key features, applications and open issues, Comput. Commun. 54 (2014) 1–31.
[43]
Changazi Sabir Ali, Bakhshi Asim Dilawar, Yousaf Muhammad, Islam Muhammad Hasan, Mohsin Syed Muhammad, Band Shahab S, Alsufyani Abdulmajeed, Bourouis Sami, GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things, Comput. Commun. 193 (2022) 109–117.
[44]
Barabási Albert-László, Albert Réka, Emergence of scaling in random networks, Science 286 (5439) (1999) 509–512.
[45]
Yang Lu-Xing, Huang Kaifan, Yang Xiaofan, Zhang Yushu, Xiang Yong, Tang Yuan Yan, Defense against advanced persistent threat through data backup and recovery, IEEE Trans. Netw. Sci. Eng. 8 (3) (2021) 2001–2013.
[46]
Yang Lu-Xing, Li Pengdeng, Zhang Yushu, Yang Xiaofan, Xiang Yong, Zhou Wanlei, Effective repair strategy against advanced persistent threat: A differential game approach, IEEE Trans. Inf. Forensics Secur. 14 (7) (2019) 1713–1728.
[47]
Yang Lu-Xing, Li Pengdeng, Yang Xiaofan, Xiang Yong, Zhou Wanlei, A differential game approach to patch injection, IEEE Access 6 (2018) 58924–58938.
[48]
Cil Abdullah Emir, Yildiz Kazim, Buldu Ali, Detection of ddos attacks with feed forward based deep neural network model, Expert Syst. Appl. 169 (2021).
[49]
Sahingoz Ozgur Koray, Cekmez Ugur, Buldu Ali, Internet of things (IoTs) security: Intrusion detection using deep learning, J. Web Eng. 20 (6) (2021) 1721–1760.
[50]
Öztürk Onur Fırat, Yıldız Kazım, Comparison of ML-based one-stage and two-stage NIDS models, in: 2023 16th International Conference on Information Security and Cryptology (ISCTÜRkiye), IEEE, 2023, pp. 1–6.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer Communications
Computer Communications  Volume 228, Issue C
Dec 2024
574 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 December 2024

Author Tags

  1. Optimal control
  2. Malware propagation
  3. Internet of Things (IoT)
  4. Epidemic model
  5. Immediate response strategy (IRS)

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media