Javascript must be enabled to continue!
Malware Containment via Firewall Placement in Large Scale Wireless IoT Networks
View through CrossRef
One of the biggest risks that wireless IoT networks encounter is malware or botnet epidemics. Malware can propagate from one device to another device that exists in its coverage range as long as there are no check points (firewalls) to protect that device. Firewalls can be hardware (special devices) or software licences that can be installed on a limited number of devices. Unfortunately, in both cases the number of firewalls that can be installed in any network is limited due to cost constraints. Therefore, it is mandatory to make efficient use of that available number of firewalls. In this paper we consider two optimization problems to optimize the firewall placement in a massive wireless IoT network. The objective of the first optimization problem is to reduce the number of firewalls required to divide the network into a given number of isolated clusters. The second problem aims at maximizing the number of isolated network clusters that can be achieved given an available number of firewalls. These two clustering problems are non-convex and are known to be NPhard. However, We provide efficient algorithms, with different variations, to solve the two problems, and we compare their performance to the well known K-Means clustering algorithm. Simulation results show that in both problems the average performance of the proposed algorithms outperforms performance of the the K-Means algorithm.
Title: Malware Containment via Firewall Placement in Large Scale Wireless IoT Networks
Description:
One of the biggest risks that wireless IoT networks encounter is malware or botnet epidemics.
Malware can propagate from one device to another device that exists in its coverage range as long as there are no check points (firewalls) to protect that device.
Firewalls can be hardware (special devices) or software licences that can be installed on a limited number of devices.
Unfortunately, in both cases the number of firewalls that can be installed in any network is limited due to cost constraints.
Therefore, it is mandatory to make efficient use of that available number of firewalls.
In this paper we consider two optimization problems to optimize the firewall placement in a massive wireless IoT network.
The objective of the first optimization problem is to reduce the number of firewalls required to divide the network into a given number of isolated clusters.
The second problem aims at maximizing the number of isolated network clusters that can be achieved given an available number of firewalls.
These two clustering problems are non-convex and are known to be NPhard.
However, We provide efficient algorithms, with different variations, to solve the two problems, and we compare their performance to the well known K-Means clustering algorithm.
Simulation results show that in both problems the average performance of the proposed algorithms outperforms performance of the the K-Means algorithm.
Related Results
Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
The need to mitigate malware attacks cannot be overemphasized, as they pose serious threats to the critical information assets in cyberspace. Understanding and utilizing appropriat...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
MCPDS: image-based malware classification method using PE metadata alone
MCPDS: image-based malware classification method using PE metadata alone
Abstract
In response to the increasing threat posed by the exponential growth of malware in cybersecurity, researchers have developed a numbe...
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by atta...
Malware and Windows APIs: A Dangerous Duo
Malware and Windows APIs: A Dangerous Duo
This paper introduces its interaction with malware and Windows APIs (application programming interface). The first section describes malware and investigates various types such as ...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
Optimalisasi Keamanan Wide Area Network (WAN) Menggunakan Raw Firewall Berbasis Mikrotik pada PT. Permata Graha Nusantara
Optimalisasi Keamanan Wide Area Network (WAN) Menggunakan Raw Firewall Berbasis Mikrotik pada PT. Permata Graha Nusantara
Fokus penelitian ini adalah optimalisasi keamanan jaringan dengan implementasi metode firewall dengan teknik raw firewall pada perangkat jaringan mikrotik. Firewall membatasi siapa...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective:
This paper provides the basics of Android malware, its evolution and tools and
techniques for malware analysis. Its main aim is to present a review of the literature on ...

