Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 738-743.doi: 10.11896/jsjkx.210300212

• Interdiscipline & Application • Previous Articles     Next Articles

Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things

ZHANG Xi-ran1, LIU Wan-ping1, LONG Hua2   

  1. 1 School of Computer Science and Engineering,Chongqing University of Technology,Chongqing 400054,China
    2 School of Artificial Intelligence,Chongqing University of Technology,Chongqing 400054,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:ZHANG Xi-ran,born in 1994,postgra-duate.His main research interests include Internet of things virus and epidemic models.
    LIU Wan-ping,born in 1986,Ph.D,associate professor,research supervisor,is a member of China Computer Federation.His main research interests include cyberspace security dynamics and information security.
  • Supported by:
    Natural Science Foundation of Chongqing,China(cstc2021jcyj-msxmX0594) and Science and Technology Research Program of Chongqing Municipal Education Commission (KJQN201901101).

Abstract: With the innovation and progress of imformation technology,Internet of things(IoT) technology grows explosively growth in various fields.However,devices over these networks are suffering the threat of hackers.The rapid growth of IoT-Botnets in recent years leads to many security occurrences including large-scale DDoS attacks,which brings IoT users severe damages.Therefore,it is significant to study the spread of a group of botnets represented by Mirai virus among IoT networks.In order to describe the formation process of IoT botnet precisely,this paper classifies the nodes of IoT devices into transmission devices and function devices,and then proposes SDIV-FB,a novel IoT virus dynamics model,through the analysis of Mirai virus propagation mechanism.The spreading threshold and equiliabrium of the model system are calculated,and the stability of the equiliabria are proved and analyzed.Moreover,the rationality of the derived theories are proved through the numerical simulation experiments,and the effectiveness of the model parameters are verified as well.Finally,decreasing the infection rate and increasing the recovery rate are proposed in this paper as two effective strategies for controlling the IoT botnets.

Key words: Botnet networks, Internet of things (IoT), Mirai virus, SDIV-FB model, Spreading threshold

CLC Number: 

  • TP393
[1] PEÑA-LÓPEZ I.ITU Internet report 2005:the Internet ofthings[R].Geneva:ITU,2005.
[2] ANGRISHI K.Turning internet of things (iot) into Internet of vulnerabilities (iov):Iot botnets[J].arXiv:1702.03681,2017.
[3] BERTINO E,ISLAM N.Botnets and internet of things security[J].Computer,2017,50(2):76-79.
[4] KAMBOURAKIS G,KOLIAS C,STAVROU A.The miraibotnet and the iot zombie armies[C]//IEEE Military Communications Conference (MILCOM).2017:267-272.
[5] JI Y,YAO L,LIU S,et al.The study on the botnet and its prevention policies in the internet of things[C]//2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD).IEEE,2018:837-842.
[6] JERKINS J A,STUPIANSKY J.Mitigating IoT insecurity with inoculation epidemics[C]//Proceedings of the ACMSE 2018 Conference.2018:1-6.
[7] JIAO D.Inventory of the most serious DDoS attacks in 2016[J].Computer and Network,2016,42(24):48-50.
[8] XIAO J C.Eight DDoS attacks affecting enterprise IoT security[J].Computer and network,2017,43(10):56-57.
[9] WANG H L.DDoS attacks grew wildly in the first- half of 2017[J].Computer and Network,2017,43(23):53.
[10] ZHANG X,ZHANG K L,SANG H Q,et al.2019 IoT Security Annual Report[J].Information Security an-d Communication Confidentiality,2020(1):45-62.
[11] MMD-0055-2016-Linux/PnScan, ELF worm that still circlesaround[J/OL].The MalwareMustDie Blog,2016.https://blog.malwaremustdie.org/2016/08/mmd-0054-2016-pnscan-elf-worm-that.html.
[12] GOODIN D.Record-Breaking DDoS Reportedly Delivered by >145K Hacked Cameras[J/OL].Ars Technica.http://arstechnica.com/security/2016/09/botnet-of-145K-cameras-reportedly-deliver-internets-biggest-ddos-ever.
[13] WILLIAMS C.You Can Now Rent a Mirai Botnet of 400,000 Bots[J/OL].Bleeping Computer.https://www.bleepingcomputer.com/news/security/you-can-now-rent-a-mirai-botnet-of-400-000-bots.
[14] LIU W,ZHONG S.Web malware spread modelling and optimal control strategies[J].Scientific Reports,2017,7(1):1-19.
[15] WILLIAMS C.Today the Web Was Broken by CountlessHacked Devices-Your 60-Second Summary[J/OL].www.theregister.co.uk/2016/10/21/dyn_dns_ddos_explained.
[16] LI B S,CHANG A Q,ZHANG J X.IoT botnets seriouslythreaten network infrastructure security-analysis of Dyn companÝs botnet attack[J].Information Security Research,2016,2(11):1042-1048.
[17] LIU W,ZHONG S.Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method[J].Applied Mathematical Modelling,2018,63:491-507.
[18] LIU W,WU X,YANG W,et al.Modeling cyber rumor spreading over mobile social networks:A compartment approach[J].Applied Mathematics and Computation,2019,343:214-229.
[19] MISHRA B K,KESHRI N.Mathematical model on the transmission of worms in wireless sensor network[J].Applied Mathe-matical Modelling,2013,37(6):4103-4111.
[20] ACARALI D,RAJARAJAN M,KOMNINOS N,et al.Model-ling the spread of botnet malware in IoT-based wireless sensor networks[J].Security and Communication Networks,2019.
[21] BREBAN R,DRAKE J M,STALLKNECHT D E,et al.Therole of environmental transmission in recurrent avian influenza epidemics[J].PLoS Comput. Biol.,2009,5(4):e1000346.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!