基于仿真的无线传感器网络恶意软件传播动态分析

M. Badakhshan, D. Arifler
{"title":"基于仿真的无线传感器网络恶意软件传播动态分析","authors":"M. Badakhshan, D. Arifler","doi":"10.1109/SENSORCOMM.2007.90","DOIUrl":null,"url":null,"abstract":"We analyze spreading dynamics of malware (malicious software) that can replicate itself on other nodes in a network of wireless sensing devices. Epidemic models have previously been employed by researchers to investigate the spreading dynamics of malware in the Internet. Most studies have generally ignored spatial deployment characteristics of nodes which are critical for a realistic analysis in wireless sensor networks. We consider random and localized attack strategies by malware that may be introduced by an adversary into a network with either completely random or clustered sensor deployment patterns. Results demonstrate that sensor networks face serious security threats, particularly in cases where sensors are deployed in clusters and when malware can carry out attacks to random targets. We recommend possible defense measures based on simple topology control that might slow down the spread of malware across the network and allow necessary measures to be taken for containing the spread when malware employs a localized attack strategy. Presented analysis has a significant impact on network security and defense industry since it provides an insight into potential threats to information and surveillance infrastructure consisting of wireless sensing devices.","PeriodicalId":161788,"journal":{"name":"2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Simulation Based Analysis of Spreading Dynamics of Malware in Wireless Sensor Networks\",\"authors\":\"M. Badakhshan, D. Arifler\",\"doi\":\"10.1109/SENSORCOMM.2007.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We analyze spreading dynamics of malware (malicious software) that can replicate itself on other nodes in a network of wireless sensing devices. Epidemic models have previously been employed by researchers to investigate the spreading dynamics of malware in the Internet. Most studies have generally ignored spatial deployment characteristics of nodes which are critical for a realistic analysis in wireless sensor networks. We consider random and localized attack strategies by malware that may be introduced by an adversary into a network with either completely random or clustered sensor deployment patterns. Results demonstrate that sensor networks face serious security threats, particularly in cases where sensors are deployed in clusters and when malware can carry out attacks to random targets. We recommend possible defense measures based on simple topology control that might slow down the spread of malware across the network and allow necessary measures to be taken for containing the spread when malware employs a localized attack strategy. Presented analysis has a significant impact on network security and defense industry since it provides an insight into potential threats to information and surveillance infrastructure consisting of wireless sensing devices.\",\"PeriodicalId\":161788,\"journal\":{\"name\":\"2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SENSORCOMM.2007.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SENSORCOMM.2007.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

我们分析了恶意软件(恶意软件)的传播动态,它可以在无线传感设备网络的其他节点上复制自己。流行病模型以前被研究人员用来研究互联网上恶意软件的传播动态。大多数研究通常忽略了节点的空间部署特征,而这对无线传感器网络的现实分析至关重要。我们考虑恶意软件的随机和局部攻击策略,这些攻击可能由对手引入到具有完全随机或集群传感器部署模式的网络中。结果表明,传感器网络面临严重的安全威胁,特别是在传感器集群部署和恶意软件可以对随机目标进行攻击的情况下。我们推荐基于简单拓扑控制的可能的防御措施,这可能会减缓恶意软件在网络中的传播,并允许在恶意软件采用本地化攻击策略时采取必要的措施来遏制传播。所提出的分析对网络安全和国防工业具有重大影响,因为它提供了对由无线传感设备组成的信息和监视基础设施的潜在威胁的洞察。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Simulation Based Analysis of Spreading Dynamics of Malware in Wireless Sensor Networks
We analyze spreading dynamics of malware (malicious software) that can replicate itself on other nodes in a network of wireless sensing devices. Epidemic models have previously been employed by researchers to investigate the spreading dynamics of malware in the Internet. Most studies have generally ignored spatial deployment characteristics of nodes which are critical for a realistic analysis in wireless sensor networks. We consider random and localized attack strategies by malware that may be introduced by an adversary into a network with either completely random or clustered sensor deployment patterns. Results demonstrate that sensor networks face serious security threats, particularly in cases where sensors are deployed in clusters and when malware can carry out attacks to random targets. We recommend possible defense measures based on simple topology control that might slow down the spread of malware across the network and allow necessary measures to be taken for containing the spread when malware employs a localized attack strategy. Presented analysis has a significant impact on network security and defense industry since it provides an insight into potential threats to information and surveillance infrastructure consisting of wireless sensing devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Passive mm-wave Sensor for In-Door and Out-Door Homeland Security Applications Multiplexed Frequency Spectrum Analyzer Instrumentation for the Characterization of Multiple QCM-Based Biosensors A Communication Paradigm for Wireless Sensor/Actuator Networks Design and Analysis of a GPS-free Routing Protocol for Underwater Wireless Sensor Networks in Deep Water A Step towards Standardization of Wireless Sensor Networks: A Layered Protocol Architecture Perspective
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1