Malware containment with immediate response in IoT networks: An optimal control approach

IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computer Communications Pub Date : 2024-09-12 DOI:10.1016/j.comcom.2024.107951
Mousa Tayseer Jafar , Lu-Xing Yang , Gang Li , Qingyi Zhu , Chenquan Gan , Xiaofan Yang
{"title":"Malware containment with immediate response in IoT networks: An optimal control approach","authors":"Mousa Tayseer Jafar ,&nbsp;Lu-Xing Yang ,&nbsp;Gang Li ,&nbsp;Qingyi Zhu ,&nbsp;Chenquan Gan ,&nbsp;Xiaofan Yang","doi":"10.1016/j.comcom.2024.107951","DOIUrl":null,"url":null,"abstract":"<div><p>The exponential growth of Internet of Things (IoT) devices has triggered a substantial increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 percent in such attacks, underscoring the urgent need for robust cybersecurity measures. When a cyber-attack breaches an IoT network, it initiates the dissemination of malware across the network. However, to counteract this threat, an immediate installation of a new patch becomes imperative. The time frame for developing and deploying the patch can vary significantly, contingent upon the specifics of the cyber-attack. This paper aims to address the challenge of pre-emptively mitigating cyber-attacks prior to the installation of a new patch. The main novelties of our work include: (1) A well-designed node-level model known as Susceptible, Infected High, Infected Low, Recover First, and Recover Complete <span><math><mrow><mo>(</mo><msub><mrow><mi>SI</mi></mrow><mrow><mi>H</mi></mrow></msub><msub><mrow><mi>I</mi></mrow><mrow><mi>L</mi></mrow></msub><msub><mrow><mi>R</mi></mrow><mrow><mi>F</mi></mrow></msub><msub><mrow><mi>R</mi></mrow><mrow><mi>C</mi></mrow></msub><mo>)</mo></mrow></math></span>. It categorizes the infected node states into infected high and infected low, according to the categorization of infection states for IoT devices, to accelerate containment strategies for malware propagation and improve mitigation of cyber-attacks targeting IoT networks by incorporating immediate response within a restricted environment. (2) Development of an optimal immediate response strategy (IRS) by modeling and analyzing the associated optimal control problem. This model aims to enhance the containment of malware propagation across IoT networks by swiftly responding to cyber threats. Finally, several numerical analyses were performed to fully illustrate the main findings. In addition, a dataset has been constructed for experimental purposes to simulate real-world scenarios within IoT networks, particularly in smart home environments.</p></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107951"},"PeriodicalIF":4.5000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366424002986","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The exponential growth of Internet of Things (IoT) devices has triggered a substantial increase in cyber-attacks targeting these systems. Recent statistics show a surge of over 100 percent in such attacks, underscoring the urgent need for robust cybersecurity measures. When a cyber-attack breaches an IoT network, it initiates the dissemination of malware across the network. However, to counteract this threat, an immediate installation of a new patch becomes imperative. The time frame for developing and deploying the patch can vary significantly, contingent upon the specifics of the cyber-attack. This paper aims to address the challenge of pre-emptively mitigating cyber-attacks prior to the installation of a new patch. The main novelties of our work include: (1) A well-designed node-level model known as Susceptible, Infected High, Infected Low, Recover First, and Recover Complete (SIHILRFRC). It categorizes the infected node states into infected high and infected low, according to the categorization of infection states for IoT devices, to accelerate containment strategies for malware propagation and improve mitigation of cyber-attacks targeting IoT networks by incorporating immediate response within a restricted environment. (2) Development of an optimal immediate response strategy (IRS) by modeling and analyzing the associated optimal control problem. This model aims to enhance the containment of malware propagation across IoT networks by swiftly responding to cyber threats. Finally, several numerical analyses were performed to fully illustrate the main findings. In addition, a dataset has been constructed for experimental purposes to simulate real-world scenarios within IoT networks, particularly in smart home environments.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网网络中即时响应的恶意软件遏制:优化控制方法
物联网(IoT)设备的指数式增长引发了针对这些系统的网络攻击大幅增加。最近的统计数据显示,此类攻击激增了 100%以上,突出表明迫切需要采取强有力的网络安全措施。当网络攻击侵入物联网网络时,就会在整个网络中传播恶意软件。然而,要应对这种威胁,必须立即安装新补丁。根据网络攻击的具体情况,开发和部署补丁的时间框架可能会有很大差异。本文旨在解决在安装新补丁之前先发制人地减轻网络攻击的难题。我们工作的主要创新点包括(1) 一个精心设计的节点级模型,称为 "易受感染、高感染、低感染、先恢复和完全恢复(SIHILRFRC)"。该模型根据物联网设备感染状态的分类,将受感染节点状态分为高感染和低感染,通过在受限环境中纳入即时响应,加快遏制恶意软件传播的策略,改善针对物联网网络攻击的缓解效果。(2) 通过对相关最优控制问题进行建模和分析,制定最优即时响应策略(IRS)。该模型旨在通过快速响应网络威胁,加强遏制恶意软件在物联网网络中的传播。最后,还进行了几项数值分析,以充分说明主要发现。此外,还构建了一个数据集,用于模拟物联网网络中的真实场景,尤其是智能家居环境中的真实场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computer Communications
Computer Communications 工程技术-电信学
CiteScore
14.10
自引率
5.00%
发文量
397
审稿时长
66 days
期刊介绍: Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms. Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.
期刊最新文献
Editorial Board A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks The pupil outdoes the master: Imperfect demonstration-assisted trust region jamming policy optimization against frequency-hopping spread spectrum High-performance BFT consensus for Metaverse through block linking and shortcut loop Automating 5G network slice management for industrial applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1