Next Article in Journal
Unmanned Vehicles’ Placement Optimisation for Internet of Things and Internet of Unmanned Vehicles
Previous Article in Journal
Predictive Maintenance: An Autoencoder Anomaly-Based Approach for a 3 DoF Delta Robot
Article

A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools

1
Department of Information Security Engineering, University of Science and Technology (UST), Daejeon 34113, Korea
2
Electronics and Telecommunications Research Institute, Daejeon 34129, Korea
*
Author to whom correspondence should be addressed.
Academic Editors: Nikos Fotiou and Peter Han Joo Chong
Sensors 2021, 21(21), 6983; https://doi.org/10.3390/s21216983
Received: 29 June 2021 / Revised: 12 October 2021 / Accepted: 18 October 2021 / Published: 21 October 2021
(This article belongs to the Section Communications)
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to apply existing security solutions to IoT devices. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are increasing every year. The most representative is the Mirai malware that caused distributed denial of service (DDoS) attacks by creating a massive IoT botnet. Moreover, Mirai malware has been released on the Internet, resulting in increasing variants and new malicious codes. One of the ways to mitigate distributed denial of service attacks is to render the creation of massive IoT botnets difficult by preventing the spread of malicious code. For IoT infrastructure security, security solutions are being studied to analyze network packets going in and out of IoT infrastructure to detect threats, and to prevent the spread of threats within IoT infrastructure by dynamically controlling network access to maliciously used IoT devices, network equipment, and IoT services. However, there is a great risk to apply unverified security solutions to real-world environments. In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download command into vulnerable devices. The malware simulation tool proposed in this paper can be used to verify the functionality of network threat detection and prevention solutions. View Full-Text
Keywords: IoT malware; propagation; diffusion; tool; verification IoT malware; propagation; diffusion; tool; verification
Show Figures

Figure 1

MDPI and ACS Style

Hwang, S.-Y.; Kim, J.-N. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools. Sensors 2021, 21, 6983. https://doi.org/10.3390/s21216983

AMA Style

Hwang S-Y, Kim J-N. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools. Sensors. 2021; 21(21):6983. https://doi.org/10.3390/s21216983

Chicago/Turabian Style

Hwang, Song-Yi, and Jeong-Nyeo Kim. 2021. "A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools" Sensors 21, no. 21: 6983. https://doi.org/10.3390/s21216983

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop