MalCon: A blockchain-based malware containment framework for Internet of Things

نویسندگان

چکیده

IoT devices have become a primary medium for malware (e.g., botnets) to launch Distributed Denial of Service (DDoS) attacks. Such exploit low-security measures in spread networks and recruit new victims. Thus, there is need countermeasures that consider both the security operability network. Indeed, some might run critical processes do not tolerate interruptions. This paper proposes MalCon, blockchain-based containment framework IoT. It aims stop from spreading network by set strategies encoded into smart contracts be executed infected devices. Moreover, MalCon provides monitoring service ensures trustworthy behavior reports system administrator any fraudulent activity monitored was tested extensively with real-life use cases. quickly drastically reduces number network, even an extreme case fully connected

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FairAccess: a new Blockchain-based access control framework for the Internet of Things

Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT-related standards and protocols is hardly and slowly widespread. In this paper, we propose a new framework for access control in IoT based on the blockchain technology. Our first contribution consists in providing a reference model for our proposed framework within ...

متن کامل

Blockchain Platform for Industrial Internet of Things

Internet of Things (IoT) are being adopted for industrial and manufacturing applications such as manufacturing automation, remote machine diagnostics, prognostic health management of industrial machines and supply chain management. CloudBased Manufacturing is a recent on-demand model of manufacturing that is leveraging IoT technologies. While Cloud-Based Manufacturing enables on-demand access t...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

A Security Framework for Internet of Things

As we move towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. There is a huge scope for more streamlined living through an increase of smart services but this coincides with an increase in security and privacy concerns, therefore access control has been an important factor in the development of IoT. This work proposes an authorizati...

متن کامل

A Framework for Trustworthy Internet of Things

Security is one of the major challenges in the Internet of Things (IoT). Although various security-related works have been done for IoT, existing works were only based on the classic network security-aspect. For instance, “Cryptography alone cannot solve protecting information in IoT problem as internally compromised nodes can generate bogus information and still authenticate it using valid cry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Networks

سال: 2023

ISSN: ['1872-7069', '1389-1286']

DOI: https://doi.org/10.1016/j.comnet.2023.109853