• Tidak ada hasil yang ditemukan

3A.3 CA proctype

4.6 Conclusion

1.5 2 2.5 3 3.5 4

−1

−0.8

−0.6

−0.4

−0.2 0 0.2 0.4

α

ξ

β = 1, Self-healing β = 2, Self-healing β = 1, Vaccine spreading β = 2, Vaccines preading

Figure 4.16: Relative difference of optimal control signal distribution time under different (α,β) configurations in IoT networks.N= 2000,L= 50,I0= 1/N,δ= 1.1, λinf=λpro= 0.05,ηinf= 6,ηpro= 3,κ= 0.1,Tf = 200,M= 1000,t= 1, andc= 103.

4.5.3 Summary

The contributions of this section are twofold. First, with the aid of epidemic mod- eling, we provide an analytically tractable parametric plug-in model for malware propagation control regarding the time-dependent control capability, with the aim of determining the optimal control signal distribution time to minimize the accu- mulated network cost in real time via dynamic programming. Second, we demon- strate how to use our developed tools to control malware propagation in IoT net- works. Compared with the self-healing scheme, we show that vaccine spreading further mitigates the accumulated cost when the immune nodes participate in for- warding control signal. Consequently, this section provides novel mathematical tools for malware propagation with and without control over IoT networks.

Bibliography

[1] President Barack Obama. Improving critical infrastructure cybersecurity.

Executive Order, Office of the Press Secretary. 12 February 2013.

[2] President Barack Obama. Presidential policy directive 21: Critical infras- tructure security and resilience. Washington, DC, 2013.

[3] Roy Malcolm Anderson and Roy Malcolm May. Directly transmitted infec- tions diseases: Control by vaccination. Science, 215(4536):1053–1060, May 1982.

[4] Dimitri P. Bertsekas.Dynamic Programming and Optimal Control (2 Vol Set). Athena Scientific, 3rd edition, 2007.

[5] Abhijit Bose and Kang G. Shin. On capturing malware dynamics in mobile power-law networks. in Proceedings of the 4th International Conference on Security and Privacy in Communications Networks (SecureComm ’08), New York, number 12, September 2008.

[6] Claudio Castellano and Romualdo Pastor-Satorras. Thresholds for epi- demic spreading in networks.Phys. Rev. Lett., 105(21):218701, November 2010.

[7] Eric Cator and Piet Van Mieghem. Second-order mean-field susceptible- infected-susceptible epidemic threshold.Phys. Rev. E, 85(5):056111, May 2012.

[8] Eric Cator and Piet Van Mieghem. Susceptible-infected-susceptible epi- demics on the complete graph and the star graph: Exact analysis. Phys.

Rev. E, 87(1):012811, January 2013.

[9] Li-Chiou Chen and Kathleen M. Carley. The impact of countermeasure propagation on the prevalence of computer viruses.IEEE Trans. Syst. Man., Cybern. B, 34(2):823–833, April 2004.

[10] Pin-Yu Chen and Kwang-Cheng Chen. Information epidemics in complex networks with opportunistic links and dynamic topology. InProceedings of the Global Telecommunications Conference, GLOBECOM 2010, Miami, FL, 6–10 December 2010, pp. 1–6.

[11] Pin-Yu Chen and Kwang-Cheng Chen. Optimal control of epidemic infor- mation dissemination in mobile ad hoc networks. In Proceedings of the Global Telecommunications Conference, GLOBECOM 2011, Houston, TX, 5–9 December 2011, pp. 1–5.

[12] Pin-Yu Chen, Shin-Ming Cheng, and Kwang-Cheng Chen. Smart attacks in smart grid communication networks.IEEE Commun. Mag., 50(8):24–

29, August 2012.

[13] Pin-Yu Chen, Shin-Ming Cheng, and Kwang-Cheng Chen. Optimal con- trol of epidemic information dissemination over networks. IEEE Trans.

Cybern., 44(12):2316–2328, December 2014.

[14] Pin-Yu Chen, Han-Feng Lin, Ko-Hsuan Hsu, and Shin-Ming Cheng. Mod- eling dynamics of malware with incubation period from the view of individ- ual. InProceedings of the Vehicular Technology Conference (VTC Spring), 2014 IEEE 79th, Seoul, 18–21 May 2014, pp. 1–5.

[15] Thomas M. Chen and Jean-Marc Robert. Worm epidemics in high-speed networks.IEEE Computer, 37(6):48–53, June 2004.

[16] Shin-Ming Cheng, Weng Chon Ao, Pin-Yu Chen, and Kwang-Cheng Chen.

On modeling malware propagation in generalized social networks. IEEE Commun. Lett., 15(1):25–27, January 2011.

[17] Shin-Ming Cheng, Vasileios Karyotis, Pin-Yu Chen, Kwang-Cheng Chen, and Symeon Papavassiliou. Diffusion models for information dissemina- tion dynamics in wireless complex communication networks. Journal of Complex Systems, vol. 2013, pp.1–13.

[18] Daryl J. Daley and Joseph Gani. Epidemic Modelling: An Introduction.

Cambridge University Press, 2001.

[19] Patrick T. Eugster, Rachid. Guerraoui, A.-M. Kermarrec, and L. Massoulie.

Epidemic information dissemination in distributed systems. IEEE Com- puter, 37(5):60–67, May 2004.

[20] Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On power- law relationships of the Internet topology. InProc. ACM SIGCOMM 1999, pages 251–262, October.

[21] Eric Filiol, Marko Helenius, and Stefano Zanero. Open problems in com- puter virology.J. Comput. Virol., 1(3):55–66, February 2006.

[22] A. Ganesh, L. Massoulie, and D. Towsley. The effect of network topology on the spread of epidemics. InProceedings of IEEE Infocom 2005, volume 2, 13–17 March 2005, pp. 1455–1466.

[23] Jorge Granjal, Edmundo Monteiro, and Jorge S´a Silva. Security for the Internet of Things: A survey of existing protocols and open research issues.

IEEE Commun. Surv. Tut., 17:1294–1312, January 2015.

[24] Christopher Griffin and Richard Brooks. A note on the spread of worms in scale-free networks.IEEE Trans. Syst. Man. Cybern. B, 36(1):198–202, February 2006.

[25] Chang-Rui Guo, ShaoHong Cai, HaiPing Zhou, and DaMin Zhang.

Susceptible-infected-susceptible virus spread model in 2-dimension reg- ular network under local area control. In Proc. ICNDS 2009, volume 1, Guiyang, Guizhou, 30–31 May 2009, pp. 97–100.

[26] Herbert W. Hethcote. The mathematics of infectious diseases.SIAM Rev., 42:599–653, December 2000.

[27] Hao Hu, Steven Myers, Vittoria Colizza, and Alessandro Vespignani.

WiFi networks and malware epidemiology. Proc. Natl. Acad. Sci. USA, 106(5):1318–1323, February 2009.

[28] Jennifer T. Jackson and Sadie Creese. Virus propagation in heterogeneous bluetooth networks with human behaviors. IEEE TDSC, 9(6):930–943, November 2012.

[29] Vasileios Karyotis. Markov random fields for malware propagation: The case of chain networks.IEEE Commun. Lett., 14(9):875–877, September 2010.

[30] Jeffrey O. Kephart and Steve R. White. Directed-graph epidemiological models of computer viruses. InProc. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 20–22 May 1991, pp. 343–359.

[31] William Ogilvy Kermack and Anderson Gray McKendrick. Contribu- tions to the mathematical theory of epidemics. Part I. Proc. R. Soc. A, 115(5):700–721, August 1927.

[32] Mohammad Hossein Rezaei Khouzani, Eitan Altman, and Saswati Sarkar.

Optimal quarantining of wireless malware through reception gain control.

IEEE Trans. Autom. Control, 57(1):49–61, January 2012.

[33] Seong-Woo Kim, Jong-Ho Park, Eun-Dong Lee, Mid-Eum Choi, and In Proc. IEEE VTC 2010, Taipei, 16–19 May 2010, pp. 1–5.

[34] Donald E. Kirk.Optimal Control Theory: An Introduction. Dover Publica- tions, Mineola, NY, 2004.

[35] Cong Li, Ruud van de Bovenkamp, and Piet Van Mieghem. Susceptible- infected-susceptible model: A comparison of N-intertwined and heteroge- neous mean-field approximations.Phys. Rev. E, 86(2), September 2012.

[36] Yong Li, Pan Hui, Depeng Jin, Li Su, and Lieguang Zeng. Optimal dis- tributed malware defense in mobile networks with heterogeneous devices.

IEEE Trans. Mobile Comput., 13(2):377–391, February 2014.

[37] Yao Liu, Peng Ning, and Michael K. Reiter. False data injection attacks against state estimation in electric power grids. InProc. ACM Conf. Com- put. Commun. Security, pages 21–32, November 2009.

[38] Alun L. Lloyd and Robert M. May. How viruses spread among computers and people.Science, 292(5520):1316–1317, May 2001.

[39] Piet Van Mieghem. The N-intertwined SIS epidemic network model.Com- puting, 93(2–4):147–169, October 2011.

[40] Sancheng Peng, Shui Yu, and Aimin Yang. Smartphone malware and its propagation modeling: A survey. IEEE Commun. Surv. Tut., 16(2):

952–941, April 2014.

[41] Lev Semyonovich Pontryagin, Vladimir Grigorevich Boltyanskii, Revaz Valerianovich Gamkrelidze, and E. Mishchenko. The Mathematical The- ory of Optimal Processes (International Series of Monographs in Pure and Applied Mathematics). Interscience, New York, 1962.

[42] Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Lee, Seong Joon Kim, and Song Chong. On the Levy-walk nature of human mobility.IEEE/ACM Trans. Netw., 19(3):630–643, June 2011.

[43] Faryad Darabi Sahneh and Caterina Scoglio. Epidemic spread in human networks. InProc. IEEE CDC-ECC 2011, Orlando, FL, 12–15 December 2011, pp. 3008–3013.

[44] Chayan Sarkar, Akshay Uttama Nambi S. N., R. Venkatesha Prasad, Abdur Rahim, Ricardo Neisse, and Gianmarco Baldini. DIAT: A scalable dis- tributed architecture for IoT. IEEE Internet Things J., 2:230–239, June 2015.

[45] Sarah H. Sellke, Ness B. Shroff, and Saurabh Bagchi. Modeling and auto- mated containment of worms.IEEE TDSC, 5(2):71–86, April-June 2008.

[46] Daniel Smilkov and Ljupco Kocarev. Influence of the network topology on epidemic spreading.Phys. Rev. E, 85:016114, January 2012.

[47] Stuart Staniford, Vern Paxson, and Nicholas Weaver. How to own the Inter- net in your spare time. In Proc. USENIX Security 2002, San Francisco, August 5–9, 2002, pp. 149–167.

[48] Christian Szongott, Benjamin Henne, and Matthew Smith. Evaluating the threat of epidemic mobile malware. InProc. IEEE WiMob 2012, Barcelona, 8–10 October 2012, pp. 443–450.

[49] Sapon Tanachaiwiwat and Ahmed Helmy. Encounter-based worms: Anal- ysis and defense.Ad Hoc Netw., 7(7):1414–1430, September 2009.

[50] Richard Thommes and Mark Coates. Epidemiological modelling of peer- to-peer viruses and pollution. In Proc. IEEE Infocom 2006, Barcelona, Spain, April 2006, pp. 1–12.

[51] Pu Wang, Marta C. Gonzalez, Cesar A. Hidalgo, and Albert-Laszlo Barabasi. Understanding the spreading patterns of mobile phone viruses.

Science, 324(5930):1071–1075, May 2009.

[52] Mina Youssef and Caterina Scoglio. An individual-based approach to SIR epidemics in contact networks. J. Theor. Biol., 283(1):136–144, August 2011.

[53] Shui Yu, Guofei Gu, Ahmed Barnawi, Song Guo, and Ivan Stojmenovic.

Malware propagation in large-scale networks. IEEE TDSC, 27:170–179, January 2015.

[54] Wei Yu, Xun Wang, P. Calyam, Dong Xuan, and Wei Zhao. Modeling and detection of camouflaging worm. IEEE TDSC, 8(3):377–390, May–June 2011.

[55] Xiaolan Zhang, Giovanni Negli, Jim Kurose, and Don Towsley. Perfor- mance modeling of epidemic routing. Comput. Netw., 51(8):2867–2891, July 2007.

[56] Cliff C. Zou, Weibo Gong, Don Towsley, and Lixin Gao. The monitor- ing and early detection of Internet worm.IEEE/ACM Trans. Netw., 13(5):

961–974, October 2005.

[57] Cliff C. Zou, Don Towsley, and Weibo Gong. On the performance of Inter- net worm scanning strategies.Perform. Eval., 63:700–723, July 2006.

[58] Cliff C. Zou, Don Towsley, and Weibo Gong. Modeling and simulation study of the propagation and defense of Internet e-mail worms. IEEE TDSC, 4(2):105–118, April–June 2007.

[59] Gjergji Zyba, Geoffrey M. Voelker, Michael Liljenstam, A. Mehes, and Per Johansson. Defending mobile phones from proximity malware. In Proc.

IEEE Infocom 2009, Rio de Janeiro, 19–25 April 2009, pp 1503–1511.

Hiva-Network.Com

This page intentionally left blank

This page intentionally left blank

Chapter 5

A Solution-Based

Analysis of Attack Vectors on Smart Home Systems

Andreas Brauchli Depeng Li

CONTENTS

Abstract. . . 92 5.1 Introduction . . . 92 5.1.1 Smart world . . . 93 5.2 Related Work . . . 94 5.3 The digitalSTROM Environment . . . 95 5.4 Attack Vectors on SHS . . . 96 5.4.1 Central digitalSTROM server . . . 97 5.4.2 Smart control devices . . . 98 5.4.3 Smart home communication bus . . . 99 5.4.4 Remote third-party services . . . 100 5.4.5 Two attack scenarios . . . 100 5.5 SHS Hardening . . . 101 5.5.1 Central digitalSTROM server . . . 101 5.5.2 Smart control devices . . . 102 5.5.3 Smart home communication bus . . . 102 5.5.4 Remote third-party services . . . 103 91

5.6 Solution Analysis . . . 103 5.7 Conclusion . . . 104 Bibliography . . . 104

Dalam dokumen Security and Privacy in Internet of Things (Halaman 105-113)