计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 738-743.doi: 10.11896/jsjkx.210300212

• 交叉&应用 • 上一篇    下一篇

物联网僵尸网络病毒的传播动力学模型与分析

张翕然1, 刘万平1, 龙华2   

  1. 1 重庆理工大学计算机科学与工程学院 重庆 400054
    2 重庆理工大学人工智能学院 重庆 400054
  • 出版日期:2022-06-10 发布日期:2022-06-08
  • 通讯作者: 刘万平(wpliu@cqut.edu.cn)
  • 作者简介:(xiranzhang@foxmail.com)
  • 基金资助:
    重庆市自然科学基金(cstc2021jcyj-msxmX0594);重庆市教委科学技术研究项目(KJQN201901101)

Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things

ZHANG Xi-ran1, LIU Wan-ping1, LONG Hua2   

  1. 1 School of Computer Science and Engineering,Chongqing University of Technology,Chongqing 400054,China
    2 School of Artificial Intelligence,Chongqing University of Technology,Chongqing 400054,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:ZHANG Xi-ran,born in 1994,postgra-duate.His main research interests include Internet of things virus and epidemic models.
    LIU Wan-ping,born in 1986,Ph.D,associate professor,research supervisor,is a member of China Computer Federation.His main research interests include cyberspace security dynamics and information security.
  • Supported by:
    Natural Science Foundation of Chongqing,China(cstc2021jcyj-msxmX0594) and Science and Technology Research Program of Chongqing Municipal Education Commission (KJQN201901101).

摘要: 随着信息技术的革新与进步,物联网技术在各个领域的应用呈现爆发式增长,然而大部分物联网设备却面临着黑客攻击的威胁。基于物联网设备的僵尸网络节点迅猛增长,导致了大规模DDoS攻击等网络安全事件,给物联网用户造成了极大损失。因此,研究以Mirai病毒为代表的一系列僵尸网络恶意威胁在物联网设备节点间的传播规律至关重要。首先,为了细致刻画物联网僵尸网络的形成过程,将物联网中的设备节点分为传输性设备节点和功能性设备节点,并通过对Mirai病毒感染机制的分析,提出了一个新颖的物联网病毒传播动力学模型——SDIV-FB模型。其次,从理论上计算了模型的传播阈值和平衡点,并对平衡点的稳定性进行了证明和分析。通过数值仿真实验验证了理论结果,并分析了模型参数对物联网病毒传播过程的影响。最后,确定了影响物联网僵尸网络病毒传播的重要参数,提出降低感染率和提高清除率可作为抑制物联网僵尸网络的有效控制策略。

关键词: Mirai病毒, SDIV-FB模型, 传播阈值, 僵尸网络, 物联网

Abstract: With the innovation and progress of imformation technology,Internet of things(IoT) technology grows explosively growth in various fields.However,devices over these networks are suffering the threat of hackers.The rapid growth of IoT-Botnets in recent years leads to many security occurrences including large-scale DDoS attacks,which brings IoT users severe damages.Therefore,it is significant to study the spread of a group of botnets represented by Mirai virus among IoT networks.In order to describe the formation process of IoT botnet precisely,this paper classifies the nodes of IoT devices into transmission devices and function devices,and then proposes SDIV-FB,a novel IoT virus dynamics model,through the analysis of Mirai virus propagation mechanism.The spreading threshold and equiliabrium of the model system are calculated,and the stability of the equiliabria are proved and analyzed.Moreover,the rationality of the derived theories are proved through the numerical simulation experiments,and the effectiveness of the model parameters are verified as well.Finally,decreasing the infection rate and increasing the recovery rate are proposed in this paper as two effective strategies for controlling the IoT botnets.

Key words: Botnet networks, Internet of things (IoT), Mirai virus, SDIV-FB model, Spreading threshold

中图分类号: 

  • TP393
[1] PEÑA-LÓPEZ I.ITU Internet report 2005:the Internet ofthings[R].Geneva:ITU,2005.
[2] ANGRISHI K.Turning internet of things (iot) into Internet of vulnerabilities (iov):Iot botnets[J].arXiv:1702.03681,2017.
[3] BERTINO E,ISLAM N.Botnets and internet of things security[J].Computer,2017,50(2):76-79.
[4] KAMBOURAKIS G,KOLIAS C,STAVROU A.The miraibotnet and the iot zombie armies[C]//IEEE Military Communications Conference (MILCOM).2017:267-272.
[5] JI Y,YAO L,LIU S,et al.The study on the botnet and its prevention policies in the internet of things[C]//2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD).IEEE,2018:837-842.
[6] JERKINS J A,STUPIANSKY J.Mitigating IoT insecurity with inoculation epidemics[C]//Proceedings of the ACMSE 2018 Conference.2018:1-6.
[7] JIAO D.Inventory of the most serious DDoS attacks in 2016[J].Computer and Network,2016,42(24):48-50.
[8] XIAO J C.Eight DDoS attacks affecting enterprise IoT security[J].Computer and network,2017,43(10):56-57.
[9] WANG H L.DDoS attacks grew wildly in the first- half of 2017[J].Computer and Network,2017,43(23):53.
[10] ZHANG X,ZHANG K L,SANG H Q,et al.2019 IoT Security Annual Report[J].Information Security an-d Communication Confidentiality,2020(1):45-62.
[11] MMD-0055-2016-Linux/PnScan, ELF worm that still circlesaround[J/OL].The MalwareMustDie Blog,2016.https://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html.
[12] GOODIN D.Record-Breaking DDoS Reportedly Delivered by >145K Hacked Cameras[J/OL].Ars Technica.http://arstechnica.com/security/2016/09/botnet-of-145K-cameras-reportedly-deliver-internets-biggest-ddos-ever.
[13] WILLIAMS C.You Can Now Rent a Mirai Botnet of 400,000 Bots[J/OL].Bleeping Computer.https://www.bleepingcomputer.com/news/security/you-can-now-rent-a-mirai-botnet-of-400-000-bots.
[14] LIU W,ZHONG S.Web malware spread modelling and optimal control strategies[J].Scientific Reports,2017,7(1):1-19.
[15] WILLIAMS C.Today the Web Was Broken by CountlessHacked Devices-Your 60-Second Summary[J/OL].www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained.
[16] LI B S,CHANG A Q,ZHANG J X.IoT botnets seriouslythreaten network infrastructure security-analysis of Dyn companÝs botnet attack[J].Information Security Research,2016,2(11):1042-1048.
[17] LIU W,ZHONG S.Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method[J].Applied Mathematical Modelling,2018,63:491-507.
[18] LIU W,WU X,YANG W,et al.Modeling cyber rumor spreading over mobile social networks:A compartment approach[J].Applied Mathematics and Computation,2019,343:214-229.
[19] MISHRA B K,KESHRI N.Mathematical model on the transmission of worms in wireless sensor network[J].Applied Mathe-matical Modelling,2013,37(6):4103-4111.
[20] ACARALI D,RAJARAJAN M,KOMNINOS N,et al.Model-ling the spread of botnet malware in IoT-based wireless sensor networks[J].Security and Communication Networks,2019.
[21] BREBAN R,DRAKE J M,STALLKNECHT D E,et al.Therole of environmental transmission in recurrent avian influenza epidemics[J].PLoS Comput. Biol.,2009,5(4):e1000346.
[1] 张翀宇, 陈彦明, 李炜.
边缘计算中面向数据流的实时任务调度算法
Task Offloading Online Algorithm for Data Stream Edge Computing
计算机科学, 2022, 49(7): 263-270. https://doi.org/10.11896/jsjkx.210300195
[2] 周天清, 岳亚莉.
超密集物联网络中多任务多步计算卸载算法研究
Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks
计算机科学, 2022, 49(6): 12-18. https://doi.org/10.11896/jsjkx.211200147
[3] 董丹丹, 宋康.
RIS辅助双向物联网通信系统性能分析
Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System
计算机科学, 2022, 49(6): 19-24. https://doi.org/10.11896/jsjkx.220100064
[4] 沈家芳, 钱丽萍, 杨超.
面向集能型中继窄带物联网的非正交多址接入和多维网络资源优化
Non-orthogonal Multiple Access and Multi-dimension Resource Optimization in EH Relay NB-IoT Networks
计算机科学, 2022, 49(5): 279-286. https://doi.org/10.11896/jsjkx.210400239
[5] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[6] 张叶, 李志华, 王长杰.
基于核密度估计的轻量级物联网异常流量检测方法
Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method
计算机科学, 2021, 48(9): 337-344. https://doi.org/10.11896/jsjkx.200600108
[7] 李贝贝, 宋佳芮, 杜卿芸, 何俊江.
DRL-IDS:基于深度强化学习的工业物联网入侵检测系统
DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things
计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021
[8] 李嘉明, 赵阔, 屈挺, 刘晓翔.
基于知识图谱的区块链物联网领域研究分析
Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph
计算机科学, 2021, 48(6A): 563-567. https://doi.org/10.11896/jsjkx.200600071
[9] 王卫红, 陈震宇.
基于改进区块链的智能制造安全模型
Intelligent Manufacturing Security Model Based on Improved Blockchain
计算机科学, 2021, 48(2): 295-302. https://doi.org/10.11896/jsjkx.191200159
[10] 刘新, 黄缘缘, 刘子昂, 周睿.
IoTGuardEye:一种面向物联网服务的Web攻击检测方法
IoTGuardEye:A Web Attack Detection Method for IoT Services
计算机科学, 2021, 48(2): 324-329. https://doi.org/10.11896/jsjkx.200800030
[11] 王锡龙, 李鑫, 秦小麟.
电力物联网下分布式状态感知的源网荷储协同调度
Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things
计算机科学, 2021, 48(2): 23-32. https://doi.org/10.11896/jsjkx.200900209
[12] 张育龙, 王强, 陈明康, 孙静涛.
图像去雨算法在云物联网应用中的研究综述
Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems
计算机科学, 2021, 48(12): 231-242. https://doi.org/10.11896/jsjkx.201000055
[13] 宗思洁, 覃天, 贺龙兵.
面向IOT芯片的安全启动算法分析与应用
Analysis and Application of Secure Boot Algorithm Based on IOT Chip
计算机科学, 2021, 48(11A): 552-556. https://doi.org/10.11896/jsjkx.210300237
[14] 刘炜, 阮敏捷, 佘维, 张志鸿, 田钊.
面向物联网的PBFT优化共识算法
PBFT Optimized Consensus Algorithm for Internet of Things
计算机科学, 2021, 48(11): 151-158. https://doi.org/10.11896/jsjkx.210500038
[15] 梁俊斌, 田凤森, 蒋婵, 王天舒.
物联网中多设备多服务器的移动边缘计算任务卸载技术综述
Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things
计算机科学, 2021, 48(1): 16-25. https://doi.org/10.11896/jsjkx.200500095
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!