Malware Threat in Internet of Things and Its Mitigation Analysis

This chapter introduces malware’s threat in the internet of things (IoT) and then analyzes the mitigation methods against the threat. In September 2016, Brian Krebs’ web site “Krebs on Security” came under a massive distributed denial of service (DDoS) attack. It reached twice the size of the largest attack in history. This attack was caused by a new type of malware called Mirai. Mirai primarily targets IoT devices such as security cameras and wireless routers. IoT devices have some properties which make them malware attack’s targets such as large volume, pervasiveness, and high vulnerability. As a result, a DDoS attack launched by infected IoT devices tends to become massive and disruptive. Thus, the threat of Mirai is an extremely important issue. Mirai has been attracting a great deal of attention since its birth. This resulted in a lot of information related to IoT malware. Most of them came from not academia but industry represented by antivirus software makers. This chapter summarizes such information.

[1]  Hiroaki Tanaka,et al.  Consideration of IoT Structure in Mitigation against Mirai Malware , 2018, 2018 IEEE 8th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).

[2]  Qi-Wei Ge,et al.  Introduction of Petri Nets: Its Applications and Security Challenges , 2016 .

[3]  Shingo Yamaguchi,et al.  Modeling and Evaluation of Mitigation Methods against IoT Malware Mirai with Agent-Oriented Petri Net PN2 , 2019 .

[4]  Koji Nakao Proactive cyber security response by utilizing passive monitoring technologies , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).

[5]  Shingo Yamaguchi,et al.  Hajime Worm with Lifespan and Its Mitigation Evaluation Against Mirai Malware Based on Agent-Oriented Petri Net PN2 , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[6]  Tim Torvatn,et al.  Risk of Contract Growth and Opportunistic Behavior: A Comparison of Two Megaprojects , 2012 .

[7]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[8]  Sasa Mrdovic,et al.  Analysis of Mirai malicious software , 2017, 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM).

[9]  Sharmistha Mandal,et al.  Dual Image-Based Dictionary Encoded Data Hiding in Spatial Domain , 2020, Int. J. Inf. Secur. Priv..

[10]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[11]  Anandakumar Haldorai,et al.  The Impact of Big Data Analytics and Challenges to Cyber Security , 2018 .

[12]  Kunihiko Hiraishi,et al.  A Petri-net-based model for the mathematical analysis of multi-agent systems , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[13]  Mason J. Molesky,et al.  Internet of Things: An Analysis and Proposal of White Worm Technology , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[14]  Shingo Yamaguchi,et al.  A support tool to design IoT services with NuSMV , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).