20
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets †

      research-article
      Sensors (Basel, Switzerland)
      MDPI
      IoT, cybersecurity, malware, DDoS, bot, botnet, Petri net

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics. This paper proposes a new approach that uses a white-hat worm to fight malware. The white-hat worm is an extension of an IoT worm called Hajime and introduces lifespan and secondary infectivity (the ability to infect a device infected by Mirai). The proposed white-hat worm was expressed as a formal model with agent-oriented Petri nets called PN 2 . The model enables us to simulate a battle between the white-hat worm and Mirai. The result of the simulation evaluation shows that (i) the lifespan successfully reduces the worm’s remaining if short; (ii) if the worm has low secondary infectivity, its effect depends on the lifespan; and (iii) if the worm has high secondary infectivity, it is effective without depending on the lifespan.

          Related collections

          Most cited references21

          • Record: found
          • Abstract: not found
          • Article: not found

          DDoS in the IoT: Mirai and Other Botnets

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            PEABS: A Process for developing Efficient Agent-Based Simulators

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Improving IoT Botnet Investigation Using an Adaptive Network Layer

              IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets’ intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limitations in regard to the network access containment and network traffic manipulation. In this paper, we present an approach for handling the network traffic generated by the IoT malware in an analysis environment. The proposed solution can modify the traffic at the network layer based on the actions performed by the malware. In our study case, we investigated the Mirai and Bashlite botnet families, where it was possible to block attacks to other systems, identify attacks targets, and rewrite botnets commands sent by the botnet controller to the infected devices.
                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                19 January 2020
                January 2020
                : 20
                : 2
                : 556
                Affiliations
                Graduate School of Sciences and Technology for Innovation, Yamaguchi University, Ube 755-8611, Japan; shingo@ 123456yamaguchi-u.ac.jp
                Author notes
                [†]

                This paper is an extended version of our paper published in Yamaguchi, S. Modeling and Evaluation of IoT Worm with Lifespan and Secondary Infectivity by Agent-Oriented Petri Net PN 2 . In Proceeding of the IEEE 6th International Conference on Consumer Electronics – Taiwan (IEEE 2019 ICCE-TW), Yilan, Taiwan, 20–22 May 2019.

                Author information
                https://orcid.org/0000-0003-0579-8501
                Article
                sensors-20-00556
                10.3390/s20020556
                7014485
                31963954
                f0f6ecd8-4452-4a97-91ba-e89bd567eda9
                © 2020 by the author.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 23 December 2019
                : 16 January 2020
                Categories
                Article

                Biomedical engineering
                iot,cybersecurity,malware,ddos,bot,botnet,petri net
                Biomedical engineering
                iot, cybersecurity, malware, ddos, bot, botnet, petri net

                Comments

                Comment on this article