Not logged in.

Contribution Details

Type Conference or Workshop Paper
Scope Discipline-based scholarship
Published in Proceedings Yes
Title Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices
Organization Unit
Authors
  • Jan Von der Assen
  • Alberto Huertas Celdran
  • Nicolas Huber
  • Gérôme Bovet
  • Gregorio Martínez Pérez
  • Burkhard Stiller
Presentation Type paper
Item Subtype Original Work
Refereed No
Status Published in final form
Language
  • English
ISBN 979-8-3503-1170-9
Page Range 123 - 129
Event Title 2023 IEEE International Conference on Cyber Security and Resilience (CSR)
Event Type conference
Event Location Venice, Italy
Event Start Date July 31 - 2023
Event End Date August 2 - 2023
Series Name IEEE International Conference on Cyber Security and Resilience (CSR)
Publisher Institute of Electrical and Electronics Engineers
Abstract Text Internet-of-Things (IoT) devices have become critical assets to be protected due to increased adoption for emerging use cases. As such, these devices are confronted with a myriad of malware-based threats. To combat malware in IoT, Moving Target Defense (MTD) is a viable defense layer, since MTD does not rely on a low breach probability - aiming to increase security in a dynamic way. Although evidence supports the usefulness of MTD for IoT, the current state of the art suffers from unrealistic deployments, including the problem of operating multiple MTD techniques. Especially, there is a commonly observed gap in determining and deploying one of a set of locally available MTD techniques. This paper addresses this gap by relying on a rule-based selection mechanism. For that, a risk-driven methodology to establish this selection agent with a well-defined architecture is followed. As an input, the device's behavior, as expressed through its resource consumption, serves as a selection criterion. This architecture was implemented for a Raspberry Pi and evaluated against seven malware, given four existing MTD techniques. The resulting prototype highlights that a rule-based system can efficiently mitigate the malware samples.
Digital Object Identifier 10.1109/csr57506.2023.10224824
PDF File Download from ZORA
Export BibTeX
EP3 XML (ZORA)