2020
DOI: 10.1109/access.2020.3011919
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive and Scalable Technique for Securing IoT Networks Against Malware Epidemics

Abstract: The sheer volume of IoT networks being deployed today presents a major "attack surface" and poses significant security risks at a scale never encountered before. In other words, a single IoT device/node that gets infected with malware has the potential to spread the malicious activities across the network, eventually ceasing the network functionality or compromising the network. Simply detecting and quarantining the malware in IoT networks does not guarantee preventing malware propagation. On the other hand, u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 86 publications
0
15
0
Order By: Relevance
“…Furthermore, a quarantine-oriented mitigation plan has been researched for time-varying graphs [25], whereby the layout of a graph is employed to represent the necessary measures to overcome a resource allocation dilemma [26]. Control theory and game theory are two main approaches to containing malware in networks [27]. Solutions based on control theory are often based on heuristics and simplifications, which can lead to sub-optimal results [28].…”
Section: Mitigation Strategiesmentioning
confidence: 99%
“…Furthermore, a quarantine-oriented mitigation plan has been researched for time-varying graphs [25], whereby the layout of a graph is employed to represent the necessary measures to overcome a resource allocation dilemma [26]. Control theory and game theory are two main approaches to containing malware in networks [27]. Solutions based on control theory are often based on heuristics and simplifications, which can lead to sub-optimal results [28].…”
Section: Mitigation Strategiesmentioning
confidence: 99%
“…FDI attacks can affect the LMP by confusing the state estimation, which then unsympathetically involves the contingency analysis processes [45]. • Insertion of worms or malware can range from malicious software that operates in backgrounds to decelerate the smart grid computers' operations via employing Trojan software for stealing the certificates of practical security [46]. To detect cyber-attacks on the Internet-of-Things (IoT) applications, the sensors available in the system is utilized along with monitoring the physical system possible models.…”
Section: A Causes Of Cyber-attacksmentioning
confidence: 99%
“…Attackers are increasingly motivated and enabled to compromise software and computing hardware infrastructure. The increasing complexity of modern computing systems in different application domains has resulted in the emergence of new security vulnerabilities [1][2][3][4]. Cyber attackers make use of these vulnerabilities to compromise systems using sophisticated malicious activities.…”
Section: Introductionmentioning
confidence: 99%
“…The emergence of new malware threats requires patching or updating the software-based malware detection solutions (such as off-the-shelf anti-virus) that needs a vast amount of memory and hardware resources, which is not feasible for emerging computing systems especially in embedded mobile and IoT devices [3,14,15]. In addition, most of these advanced analysis techniques are architecture-dependent i.e., dependent on the underlying hardware, which makes the existing traditional malware detection techniques hard to import onto emerging embedded computing devices [4,14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation