Not logged in.
Quick Search - Contribution
Contribution Details
Type | Conference or Workshop Paper |
Scope | Discipline-based scholarship |
Published in Proceedings | Yes |
Title | Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices |
Organization Unit | |
Authors |
|
Presentation Type | paper |
Item Subtype | Original Work |
Refereed | No |
Status | Published in final form |
Language |
|
ISBN | 979-8-3503-1170-9 |
Page Range | 123 - 129 |
Event Title | 2023 IEEE International Conference on Cyber Security and Resilience (CSR) |
Event Type | conference |
Event Location | Venice, Italy |
Event Start Date | July 31 - 2023 |
Event End Date | August 2 - 2023 |
Series Name | IEEE International Conference on Cyber Security and Resilience (CSR) |
Publisher | Institute of Electrical and Electronics Engineers |
Abstract Text | Internet-of-Things (IoT) devices have become critical assets to be protected due to increased adoption for emerging use cases. As such, these devices are confronted with a myriad of malware-based threats. To combat malware in IoT, Moving Target Defense (MTD) is a viable defense layer, since MTD does not rely on a low breach probability - aiming to increase security in a dynamic way. Although evidence supports the usefulness of MTD for IoT, the current state of the art suffers from unrealistic deployments, including the problem of operating multiple MTD techniques. Especially, there is a commonly observed gap in determining and deploying one of a set of locally available MTD techniques. This paper addresses this gap by relying on a rule-based selection mechanism. For that, a risk-driven methodology to establish this selection agent with a well-defined architecture is followed. As an input, the device's behavior, as expressed through its resource consumption, serves as a selection criterion. This architecture was implemented for a Raspberry Pi and evaluated against seven malware, given four existing MTD techniques. The resulting prototype highlights that a rule-based system can efficiently mitigate the malware samples. |
Digital Object Identifier | 10.1109/csr57506.2023.10224824 |
PDF File | Download from ZORA |
Export |
BibTeX
EP3 XML (ZORA) |