An agent-based modeling framework for cybersecurity in mobile tactical networks

Mobile tactical networks facilitate communication, coordination, and information dissemination between soldiers in the field. Their increasing use provides important benefits, yet also makes them a prime enemy target. Furthermore, their dynamic, distributed, and ad-hoc nature makes them particularly vulnerable to cyber attack. Unfortunately, most existing research on cybersecurity in mobile ad-hoc networks either uses simplistic mobility models that are easier to analyze mathematically or focuses on modeling the dynamics of civilian networks. In this work, we present an agent-based modeling framework to study malware spread in mobile tactical networks. Our framework includes military-inspired models of hierarchical command structure, unit movement, communication over short-range radio, self-propagating malware, and cyber defense mechanisms. We implement several example scenarios representing military units engaged in tactical operations on a synthetic battlefield. Finally, we conduct a case study, using agent-based simulation to analyze the impact of hierarchy and cybersecurity policies on malware spread. Our results support the claim that agent-based modeling is particularly well-suited for representing the complex organizational and spatial structures inherent to military operations, and we urge others to incorporate the key elements of our framework into existing modeling tools when performing studies of cyber attacks on mobile tactical networks and corresponding cybersecurity measures.

[1]  Brian Thompson,et al.  The impact of hierarchy on bluetooth-based malware spread in mobile tactical networks , 2016, SummerSim.

[2]  M. Rajesh Babu,et al.  Lightweight Vigilant procedure to Implement Security Measures in Highly Roving Military Operations , 2013, J. Comput. Sci..

[3]  Michael J. North,et al.  Complex adaptive systems modeling with Repast Simphony , 2013, Complex Adapt. Syst. Model..

[4]  Robert G. Cole Initial Studies on Worm Propagation in Manets for Future Army Combat Systems , 2004 .

[5]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[6]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[7]  A. Barabasi,et al.  Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[9]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[10]  Stefano Zanero,et al.  Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.

[11]  Brian D. Noble,et al.  Analytical Models for Epidemics in Mobile Networks , 2007 .

[12]  Brian Thompson,et al.  Identifying Key Cyber-Physical Terrain , 2017, IWSPA@CODASPY.

[13]  P. Kaye Infectious diseases of humans: Dynamics and control , 1993 .

[14]  Volkan Rodoplu,et al.  TraJECT-3D: Generating realistic mobility traces for tactical network simulation , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[15]  John Paul Dunning,et al.  Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.

[16]  Eduard Heindl,et al.  Understanding the spreading patterns of mobile phone viruses , 2012 .

[17]  W. O. Kermack,et al.  A contribution to the mathematical theory of epidemics , 1927 .

[18]  Marius S. Vassiliou,et al.  Practical Considerations for Use of Mobile Apps at the Tactical Edge , 2014 .

[19]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[20]  Madhav V. Marathe,et al.  EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SIMUTools 2009.

[21]  Peter C. Mason,et al.  Mitigating Security Threats in Tactical Networks , 2010 .

[22]  Prabhakar L. Ramteke,et al.  MANET : History , Challenges And Applications , 2013 .

[23]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[24]  Bruce Lowekamp,et al.  A structured group mobility model for the simulation of mobile ad hoc networks , 2004, MobiWac '04.

[25]  Nam C. Phamdo,et al.  Requirements on worm mitigation technologies in MANETS , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).

[26]  Muttukrishnan Rajarajan,et al.  Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.

[27]  Brian Thompson,et al.  Slowing the spread of Bluetooth-based malware in mobile tactical networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[28]  A. G. McKendrick,et al.  XLV.—The Rate of Multiplication of Micro-organisms: A Mathematical Study , 1912 .

[29]  Mazleena Salleh,et al.  Preventing collusion attack in android , 2015, Int. Arab J. Inf. Technol..

[30]  Alessandro Vespignani,et al.  Epidemic spreading in complex networks with degree correlations , 2003, cond-mat/0301149.

[31]  Marco Fiore,et al.  Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.

[32]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[33]  Michalis Faloutsos,et al.  Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point , 2011, Networking.