Abstract

With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions.

Highlights

  • The Internet of Things (IoT) has been incorporated into many industries, including home appliances, healthcare, manufacturing, and production [1]

  • Unlike the Mirai malware, we describe two methods a malware simulation tool can propagate a malicious code to vulnerable IoT devices even that they have been assigned private IP addresses

  • In order to verify the functionality of the smart segmentation framework that quickly detect and block threats spreading to IoT infrastructure, the malware simulation tool had to spread malicious code as quickly and widely as possible

Read more

Summary

Introduction

The Internet of Things (IoT) has been incorporated into many industries, including home appliances, healthcare, manufacturing, and production [1]. Using Mirai botnet for research purposes is suitable for verifying security solutions that detect or block malware within IoT infrastructure. Because Mirai botnet cannot spread malware in a local environment, it cannot verify security solutions that detect or prevent malware from spreading within a specific infrastructure. We propose an attack tool to verify the security solutions that detect and protect spreading malware within IoT infrastructure. They collected network traffic before and after malware infections generated by IoT devices and used it as training data of deep autoencoders

IoT Malwares
The Foundation of the Malware Simulation Tool
Stateless Random Scanning Method
The Malware Loader’s Malware Infection Method
Malware Simulation Tool
Network Infrastructure Overload
Inefficient Infrastructure Deployment
Solutions to the Problems of the Mirai Malware’s Propagation Technique
Device-to-Device Command Injection Method
Restricted Range Stateless Scanning Method
Experimental Environment
Virtual World
Performance Analysis
The Total Propagation Time
The Number of Duplicate Infections
Malware Propagation Performance According to the Number of Master Bots
Implications
Future Works
Findings
Mid-Year Update
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call