计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 738-743.doi: 10.11896/jsjkx.210300212
张翕然1, 刘万平1, 龙华2
ZHANG Xi-ran1, LIU Wan-ping1, LONG Hua2
摘要: 随着信息技术的革新与进步,物联网技术在各个领域的应用呈现爆发式增长,然而大部分物联网设备却面临着黑客攻击的威胁。基于物联网设备的僵尸网络节点迅猛增长,导致了大规模DDoS攻击等网络安全事件,给物联网用户造成了极大损失。因此,研究以Mirai病毒为代表的一系列僵尸网络恶意威胁在物联网设备节点间的传播规律至关重要。首先,为了细致刻画物联网僵尸网络的形成过程,将物联网中的设备节点分为传输性设备节点和功能性设备节点,并通过对Mirai病毒感染机制的分析,提出了一个新颖的物联网病毒传播动力学模型——SDIV-FB模型。其次,从理论上计算了模型的传播阈值和平衡点,并对平衡点的稳定性进行了证明和分析。通过数值仿真实验验证了理论结果,并分析了模型参数对物联网病毒传播过程的影响。最后,确定了影响物联网僵尸网络病毒传播的重要参数,提出降低感染率和提高清除率可作为抑制物联网僵尸网络的有效控制策略。
中图分类号:
[1] PEÑA-LÓPEZ I.ITU Internet report 2005:the Internet ofthings[R].Geneva:ITU,2005. [2] ANGRISHI K.Turning internet of things (iot) into Internet of vulnerabilities (iov):Iot botnets[J].arXiv:1702.03681,2017. [3] BERTINO E,ISLAM N.Botnets and internet of things security[J].Computer,2017,50(2):76-79. [4] KAMBOURAKIS G,KOLIAS C,STAVROU A.The miraibotnet and the iot zombie armies[C]//IEEE Military Communications Conference (MILCOM).2017:267-272. [5] JI Y,YAO L,LIU S,et al.The study on the botnet and its prevention policies in the internet of things[C]//2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD).IEEE,2018:837-842. [6] JERKINS J A,STUPIANSKY J.Mitigating IoT insecurity with inoculation epidemics[C]//Proceedings of the ACMSE 2018 Conference.2018:1-6. [7] JIAO D.Inventory of the most serious DDoS attacks in 2016[J].Computer and Network,2016,42(24):48-50. [8] XIAO J C.Eight DDoS attacks affecting enterprise IoT security[J].Computer and network,2017,43(10):56-57. [9] WANG H L.DDoS attacks grew wildly in the first- half of 2017[J].Computer and Network,2017,43(23):53. [10] ZHANG X,ZHANG K L,SANG H Q,et al.2019 IoT Security Annual Report[J].Information Security an-d Communication Confidentiality,2020(1):45-62. [11] MMD-0055-2016-Linux/PnScan, ELF worm that still circlesaround[J/OL].The MalwareMustDie Blog,2016.https://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html. [12] GOODIN D.Record-Breaking DDoS Reportedly Delivered by >145K Hacked Cameras[J/OL].Ars Technica.http://arstechnica.com/security/2016/09/botnet-of-145K-cameras-reportedly-deliver-internets-biggest-ddos-ever. [13] WILLIAMS C.You Can Now Rent a Mirai Botnet of 400,000 Bots[J/OL].Bleeping Computer.https://www.bleepingcomputer.com/news/security/you-can-now-rent-a-mirai-botnet-of-400-000-bots. [14] LIU W,ZHONG S.Web malware spread modelling and optimal control strategies[J].Scientific Reports,2017,7(1):1-19. [15] WILLIAMS C.Today the Web Was Broken by CountlessHacked Devices-Your 60-Second Summary[J/OL].www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained. [16] LI B S,CHANG A Q,ZHANG J X.IoT botnets seriouslythreaten network infrastructure security-analysis of Dyn companÝs botnet attack[J].Information Security Research,2016,2(11):1042-1048. [17] LIU W,ZHONG S.Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method[J].Applied Mathematical Modelling,2018,63:491-507. [18] LIU W,WU X,YANG W,et al.Modeling cyber rumor spreading over mobile social networks:A compartment approach[J].Applied Mathematics and Computation,2019,343:214-229. [19] MISHRA B K,KESHRI N.Mathematical model on the transmission of worms in wireless sensor network[J].Applied Mathe-matical Modelling,2013,37(6):4103-4111. [20] ACARALI D,RAJARAJAN M,KOMNINOS N,et al.Model-ling the spread of botnet malware in IoT-based wireless sensor networks[J].Security and Communication Networks,2019. [21] BREBAN R,DRAKE J M,STALLKNECHT D E,et al.Therole of environmental transmission in recurrent avian influenza epidemics[J].PLoS Comput. Biol.,2009,5(4):e1000346. |
[1] | 张翀宇, 陈彦明, 李炜. 边缘计算中面向数据流的实时任务调度算法 Task Offloading Online Algorithm for Data Stream Edge Computing 计算机科学, 2022, 49(7): 263-270. https://doi.org/10.11896/jsjkx.210300195 |
[2] | 周天清, 岳亚莉. 超密集物联网络中多任务多步计算卸载算法研究 Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks 计算机科学, 2022, 49(6): 12-18. https://doi.org/10.11896/jsjkx.211200147 |
[3] | 董丹丹, 宋康. RIS辅助双向物联网通信系统性能分析 Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System 计算机科学, 2022, 49(6): 19-24. https://doi.org/10.11896/jsjkx.220100064 |
[4] | 沈家芳, 钱丽萍, 杨超. 面向集能型中继窄带物联网的非正交多址接入和多维网络资源优化 Non-orthogonal Multiple Access and Multi-dimension Resource Optimization in EH Relay NB-IoT Networks 计算机科学, 2022, 49(5): 279-286. https://doi.org/10.11896/jsjkx.210400239 |
[5] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[6] | 张叶, 李志华, 王长杰. 基于核密度估计的轻量级物联网异常流量检测方法 Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method 计算机科学, 2021, 48(9): 337-344. https://doi.org/10.11896/jsjkx.200600108 |
[7] | 李贝贝, 宋佳芮, 杜卿芸, 何俊江. DRL-IDS:基于深度强化学习的工业物联网入侵检测系统 DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things 计算机科学, 2021, 48(7): 47-54. https://doi.org/10.11896/jsjkx.210400021 |
[8] | 李嘉明, 赵阔, 屈挺, 刘晓翔. 基于知识图谱的区块链物联网领域研究分析 Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph 计算机科学, 2021, 48(6A): 563-567. https://doi.org/10.11896/jsjkx.200600071 |
[9] | 王卫红, 陈震宇. 基于改进区块链的智能制造安全模型 Intelligent Manufacturing Security Model Based on Improved Blockchain 计算机科学, 2021, 48(2): 295-302. https://doi.org/10.11896/jsjkx.191200159 |
[10] | 刘新, 黄缘缘, 刘子昂, 周睿. IoTGuardEye:一种面向物联网服务的Web攻击检测方法 IoTGuardEye:A Web Attack Detection Method for IoT Services 计算机科学, 2021, 48(2): 324-329. https://doi.org/10.11896/jsjkx.200800030 |
[11] | 王锡龙, 李鑫, 秦小麟. 电力物联网下分布式状态感知的源网荷储协同调度 Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things 计算机科学, 2021, 48(2): 23-32. https://doi.org/10.11896/jsjkx.200900209 |
[12] | 张育龙, 王强, 陈明康, 孙静涛. 图像去雨算法在云物联网应用中的研究综述 Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems 计算机科学, 2021, 48(12): 231-242. https://doi.org/10.11896/jsjkx.201000055 |
[13] | 宗思洁, 覃天, 贺龙兵. 面向IOT芯片的安全启动算法分析与应用 Analysis and Application of Secure Boot Algorithm Based on IOT Chip 计算机科学, 2021, 48(11A): 552-556. https://doi.org/10.11896/jsjkx.210300237 |
[14] | 刘炜, 阮敏捷, 佘维, 张志鸿, 田钊. 面向物联网的PBFT优化共识算法 PBFT Optimized Consensus Algorithm for Internet of Things 计算机科学, 2021, 48(11): 151-158. https://doi.org/10.11896/jsjkx.210500038 |
[15] | 梁俊斌, 田凤森, 蒋婵, 王天舒. 物联网中多设备多服务器的移动边缘计算任务卸载技术综述 Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things 计算机科学, 2021, 48(1): 16-25. https://doi.org/10.11896/jsjkx.200500095 |
|