Title | ||
---|---|---|
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets |
Abstract | ||
---|---|---|
The Mirai botnet revolutionized the idea of IoT botnets by infecting numerous vulnerable IoT devices in 2016, leading to the rise of many Mirai variants and imitators that plague the current IoT ecosystem. Studying the botnet infection process can greatly aid us in understanding IoT botnet capabilities and the efficacy of currently available countermeasures. However, analyzing IoT botnets is difficult due to their massive scale and the numerous existing heterogeneous IoT devices that can be targeted for infection. In this paper, we model and simulate the dynamic behavior of a Mirai-like botnet infrastructure and various IoT device categories as a network of timed automata in UPPAAL-SMC. To determine the feasibility of rebooting as a countermeasure against botnets, we examine the effectiveness of rebooting on various IoT device networks. The resulting analysis provides a solid understanding of the efficacy and feasibility of rebooting on active and dormant botnet propagation processes. |
Year | DOI | Venue |
---|---|---|
2022 | 10.1109/ICC45855.2022.9838865 | ICC 2022 - IEEE International Conference on Communications |
Keywords | DocType | ISSN |
Network Security,Internet of Things (IoT),Botnets,Mirai,Modeling,Timed Automata,UPPAAL | Conference | 1550-3607 |
ISBN | Citations | PageRank |
978-1-5386-8348-4 | 0 | 0.34 |
References | Authors | |
12 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Alvi Jawad | 1 | 0 | 0.34 |
Luke Newton | 2 | 0 | 0.34 |
Ashraf Matrawy | 3 | 146 | 26.98 |
Jason Jaskolka | 4 | 0 | 0.34 |