Cargando…

A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools

With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices....

Descripción completa

Detalles Bibliográficos
Autores principales: Hwang, Song-Yi, Kim, Jeong-Nyeo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8588292/
https://www.ncbi.nlm.nih.gov/pubmed/34770290
http://dx.doi.org/10.3390/s21216983
_version_ 1784598412804489216
author Hwang, Song-Yi
Kim, Jeong-Nyeo
author_facet Hwang, Song-Yi
Kim, Jeong-Nyeo
author_sort Hwang, Song-Yi
collection PubMed
description With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions.
format Online
Article
Text
id pubmed-8588292
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-85882922021-11-13 A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools Hwang, Song-Yi Kim, Jeong-Nyeo Sensors (Basel) Article With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions. MDPI 2021-10-21 /pmc/articles/PMC8588292/ /pubmed/34770290 http://dx.doi.org/10.3390/s21216983 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Hwang, Song-Yi
Kim, Jeong-Nyeo
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
title A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
title_full A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
title_fullStr A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
title_full_unstemmed A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
title_short A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
title_sort malware distribution simulator for the verification of network threat prevention tools
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8588292/
https://www.ncbi.nlm.nih.gov/pubmed/34770290
http://dx.doi.org/10.3390/s21216983
work_keys_str_mv AT hwangsongyi amalwaredistributionsimulatorfortheverificationofnetworkthreatpreventiontools
AT kimjeongnyeo amalwaredistributionsimulatorfortheverificationofnetworkthreatpreventiontools
AT hwangsongyi malwaredistributionsimulatorfortheverificationofnetworkthreatpreventiontools
AT kimjeongnyeo malwaredistributionsimulatorfortheverificationofnetworkthreatpreventiontools