SlideShare a Scribd company logo
1/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Securing Wireless IoT Networks from Backdoor
Stealthy Attacks
Junaid Farooq
Department of Electrical & Computer Engineering,
Tandon School of Engineering, New York University, Brooklyn, NY 11201, USA.
{mjf514,qz494}@nyu.edu
Jul. 28, 2019
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
2/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Outline
1 Introduction
Towards the IoT
IoT Architecture
Security Risks in IoT
2 Motivation
The Security Focus
Examples of Past Attacks
3 Threat Landscape
Knowns and Unknowns
Known Unknowns in IoT
4 Theoretical Modeling
5 Analysis
6 Results
7 Conclusion
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
3/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
From IoC to IoT
We are moving from an “Internet of Computers” to an
“Internet of Things (IoT)”
Security of computers has become mature but security of
things is still in its infancy
IoT is much more vulnerable to attacks and malicious activity
than computers
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
3/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
From IoC to IoT
We are moving from an “Internet of Computers” to an
“Internet of Things (IoT)”
Security of computers has become mature but security of
things is still in its infancy
IoT is much more vulnerable to attacks and malicious activity
than computers
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
3/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
From IoC to IoT
We are moving from an “Internet of Computers” to an
“Internet of Things (IoT)”
Security of computers has become mature but security of
things is still in its infancy
IoT is much more vulnerable to attacks and malicious activity
than computers
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
6/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Cyber-Physical Footprint of IoT
Digital voice assistants are becoming increasingly powerful
and capable
Interaction with critical infrastructure systems
Figure 3: Digital voice assistants for IoT.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
6/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Cyber-Physical Footprint of IoT
Digital voice assistants are becoming increasingly powerful
and capable
Interaction with critical infrastructure systems
Figure 3: Digital voice assistants for IoT.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
8/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: Objective
Knowing the tremendous vulnerabilities in the IoT, the key
objective is to:
Protect IoT systems and networks from malicious attacks
Embed security features into the design and operation of
networks
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
9/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: What Can Go Wrong?
What is the underlying threat model?
What is the security strategy?
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
9/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: What Can Go Wrong?
What is the underlying threat model?
What is the security strategy?
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
10/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: Potential Consequences
Unlike luggage, IoT systems are not passive.They are mission
oriented systems interacting with other devices to achieve certain
functionalities.
Example consequences are as follows:
A simultaneous change in temperature control by large
number of thermostats may lead to a massive surge in power
requirements leading to grid breakdown
A coordinated false alarm from smoke detectors may trigger
simultaneous firetruck requests sabotaging emergency
response systems.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
10/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: Potential Consequences
Unlike luggage, IoT systems are not passive.They are mission
oriented systems interacting with other devices to achieve certain
functionalities.
Example consequences are as follows:
A simultaneous change in temperature control by large
number of thermostats may lead to a massive surge in power
requirements leading to grid breakdown
A coordinated false alarm from smoke detectors may trigger
simultaneous firetruck requests sabotaging emergency
response systems.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
11/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Mirai
The Mirai is an example of a botnet that caused a disruption
in the Internet in 2016 - largest of its kind in history
Several websites such as Twitter, Netflix, CNN, and Guardian
were affected
It exploited default login and password information of IoT
devices such as home appliances, DVRs, CC cameras to
generate superfluous traffic resulting in a large scale DDoS
attack
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
11/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Mirai
The Mirai is an example of a botnet that caused a disruption
in the Internet in 2016 - largest of its kind in history
Several websites such as Twitter, Netflix, CNN, and Guardian
were affected
It exploited default login and password information of IoT
devices such as home appliances, DVRs, CC cameras to
generate superfluous traffic resulting in a large scale DDoS
attack
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
11/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Mirai
The Mirai is an example of a botnet that caused a disruption
in the Internet in 2016 - largest of its kind in history
Several websites such as Twitter, Netflix, CNN, and Guardian
were affected
It exploited default login and password information of IoT
devices such as home appliances, DVRs, CC cameras to
generate superfluous traffic resulting in a large scale DDoS
attack
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
12/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Ransomware
In 2017, a hotel in Austria was attacked by malware that
locked the electronic door locks on its rooms
Attacker demanded ransom to open doors to customers
Physical denial of service due to IoT
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
12/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Ransomware
In 2017, a hotel in Austria was attacked by malware that
locked the electronic door locks on its rooms
Attacker demanded ransom to open doors to customers
Physical denial of service due to IoT
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
12/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Ransomware
In 2017, a hotel in Austria was attacked by malware that
locked the electronic door locks on its rooms
Attacker demanded ransom to open doors to customers
Physical denial of service due to IoT
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
13/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Cyber-Physical Attacks in IoT: Knowns and Unknowns
Figure 4: Source: Cyber Attacks: The Knowns & Unknowns SE Edition.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
16/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device i
IoT Device
Malware Process
Regular Process
IoT Device
IoT Devicer
Consider wireless IoT devices uniformly distributed in R2
according to a homogeneous Poisson Point Process (PPP)
with intensity λ ∈ N
Each device has computing capabilities and a wireless
interface for communication
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
16/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device i
IoT Device
Malware Process
Regular Process
IoT Device
IoT Devicer
Consider wireless IoT devices uniformly distributed in R2
according to a homogeneous Poisson Point Process (PPP)
with intensity λ ∈ N
Each device has computing capabilities and a wireless
interface for communication
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
17/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction (Cont’d)
The devices are assumed to have omni-directional
transmissions with a communication range of r m.
A typical device located at xi is connected wirelessly with
K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i}
and |.| denotes the cardinality operator.
Since the devices in the network are distributed according to a
PPP, the degree K is a random variable with
P[K = k] = πk = e−λπr2
(λπr2)k
k! . Furthermore, the average
degree of a typical device is E[K] = λπr2
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
17/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction (Cont’d)
The devices are assumed to have omni-directional
transmissions with a communication range of r m.
A typical device located at xi is connected wirelessly with
K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i}
and |.| denotes the cardinality operator.
Since the devices in the network are distributed according to a
PPP, the degree K is a random variable with
P[K = k] = πk = e−λπr2
(λπr2)k
k! . Furthermore, the average
degree of a typical device is E[K] = λπr2
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
17/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction (Cont’d)
The devices are assumed to have omni-directional
transmissions with a communication range of r m.
A typical device located at xi is connected wirelessly with
K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i}
and |.| denotes the cardinality operator.
Since the devices in the network are distributed according to a
PPP, the degree K is a random variable with
P[K = k] = πk = e−λπr2
(λπr2)k
k! . Furthermore, the average
degree of a typical device is E[K] = λπr2
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
18/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Model Validation
0 2 4 6 8 10 12 14 16 18
Device degree, k
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
ProbabilityDensity
Communication Range = 140 m
Link NYC Data
Poisson degree
Figure 5: Analyzing potential connectivity of WiFi hotspots in NYC.
We use location data of WiFi access points in New York City,
referred to as LinkNYC
652 hotspots located in Midtown Manhattan and surrounding
neighborhoods are used in analysis
A communication range of 140 m for each hotspot is used
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
20/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
State-Space Representation
An epidemic-inspired model is used to study malware propagation.
B BI BI
~ ~
µk
µk 
kσ1
kσ2
k kk
Figure 6: State evolution diagram for a typical device.
The possible system states of the population of degree k devices are:
˜Bk - the proportion of degree k devices in the network that are
un-compromised.
B˜Ik - the proportion of degree k devices in the network that are
bots but uninformed about control commands.
BIk - the proportion of degree k devices in the network that are
bots and are also informed with control commands.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
21/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
State-Space Dynamics
The state evolution can be described by the following dynamical system
of equations:
d ˜Bk (t)
dt
= µk (B˜Ik (t) + BIk (t)) − kσ1
˜Bk (t),
= µk (1 − ˜Bk (t)) − kσ1
˜Bk (t), (1)
dB˜Ik (t)
dt
= −(µk + kσ2)B˜Ik (t)+ kσ1
˜Bk (t) + βBIk (t), (2)
dBIk (t)
dt
= −(µk + β)BIk (t) + kσ2B˜Ik (t). (3)
Since ˜Bk (t) + B˜Ik (t) + BIk (t) = 1, ∀t ≥ 0, it results in:
d ˜Bk (t)
dt
= µk − (µk + kσ1) ˜Bk (t), (4)
dBIk (t)
dt
= kσ2 − (µk + β + kσ2)BIk (t) − kσ2
˜Bk (t). (5)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
22/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
Analysis of Equilibrium States
Therefore, the equilibrium population of degree k un-compromised
devices, ˜B∗
k and of informed bot devices, BI∗
k can be expressed as
follows:
˜B∗
k (µk) =
µk
µk + kσ1(θ∗
˜B
)
, (6)
BI∗
k (µk) =
k2σ1(θ∗
˜B
)σ2(θ∗
BI )
(µk + kσ1(θ∗
˜B
))(β + µk + kσ2(θ∗
BI ))
, (7)
θ ˜B =
k
k P(k )
E[K]
˜Bk (t), (8)
θBI =
k
k P(k )
E[K]
BIk (t). (9)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
23/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
Analysis of Equilibrium States
Lemma
In a PPP distributed wireless network with D2D communication,
the probability of a particular link of a degree k device pointing to
an un-compromised and to an informed bot device respectively at
equilibrium can be approximately expressed as follows:
θ∗
˜B
≈ min
µk
ργbpE[K]
, 1 , (10)
θ∗
BI ≈ max 1 −
µkγc + ργb(β + µk)
E[K]ρpγbγc
, 0 . (11)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
24/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Key Results
Fundamental Limits
Corollary
For a PPP deployed wireless IoT network being infiltrated by a
botnet with malware spreading at a rate γb and control commands
propagating at a rate γc, the upper bound on the required
patching rate for a device to have an impact on the equilibrium
populations is given by
µk ≤ ργbpE[K], ∀k ≥ 1, (12)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
25/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
Analysis of Equilibrium States
Theorem
At equilibrium, the proportion of degree k devices in the network
that are un-compromised, i.e., ˜B∗
k and those that are bots and
informed by control commands, i.e., BI∗
k can be approximately
expressed as
˜B
∗
k (µk ) ≈
µk
µk + kργbp

1 + 1
η
ln

e−η + e
−η
µk
ργbpE[K]




, (13)
BI
∗
k (µk ) ≈
k2
ρ2
γbγc p

1 + 1
η
ln

e−η
+ e
−η
µk
ργbpE[K]





µk + kργbp

1 + 1
η
ln

e−η + e
−η
µk
ργbpE[K]






×
1
η
ln

1 + e
η 1−
µk γc +ργb(β+µk )
E[K]ρpγbγc



β + µk + kργc + 1
η
ln

1 + e
η 1−
µk γc +ργb(β+µk )
E[K]ρpγbγc




. (14)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
26/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Network Defense Problem
The cost incurred on the operation of a network device due to
patching activity is assumed to be a smooth, convex, and
increasing function of the patching rate µk, represented by
φk : R+ → R+, ∀k ≥ 1.
The network defender’s problem can then be formulated as
follows:
minimize
µk ,k≥1
∞
k=1
φk(µk)πk, (15)
subject to
∞
k=1
˜B∗
k (µk)πk ≥ τ ˜B, (16)
∞
k=1
BI∗
k (µk)πk ≤ τBI . (17)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
27/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing Optimal Patching Policies
0 5 10 15 20 25
0
0.001
0.002
0.003
0.004
0.005
0.006
0.007
0.008
0.009
0.01
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
BI
= 0.2, b
= 0.001, c
= 0.01
0 5 10 15 20 25
0
0.001
0.002
0.003
0.004
0.005
0.006
0.007
0.008
0.009
0.01
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
BI
= 0.01, 0.05, 0.1, 0.2
Figure 7: Impact of varying un-compromised bot proportion threshold τ˜B
and informed bot proportion threshold τBI . The dotted line shows the
theoretical upper bound.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
28/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing Patching Cost
1 2 3 4 5 6 7 8 9 10
10-3
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
0.018
c
= 0.01
1 2 3 4 5 6 7 8 9 10
10-3
0.9
1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
10
-4 b
= 0.001
Figure 8: Expected total cost of patching against varying system
parameters.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
29/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
τ ˜B = 0.7
State ˜B State B ˜I State BI
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
τ ˜B = 0.8
State ˜B State B ˜I State BI
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
τ ˜B = 0.9
State ˜B State B ˜I State BI
Figure 9: Proportion of un-compromised devices in a PPP network.
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
time, t ×104
0
10
20
30
40
50
60
70
80
90
100
Proportionofun-compromiseddevices,˜B(t)
τBI
= 0.2, γb
= 0.001, γc
= 0.01
τ ˜B = 0.9
τ ˜B = 0.8
τ ˜B = 0.9
Figure 10: Time evolution of the proportion of un-compromised devices in
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
30/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing equilibrium malware propagation for LinkNYC
Figure 11: Snapshot of network states at equilibrium in the LinkNYC
network.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
31/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing time evolution of malware propagation for LinkNYC
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
time, t ×104
0
10
20
30
40
50
60
70
80
90
100
Proportionofun-compromiseddevices,˜B(t)
τBI
= 0.2, γb
= 0.001, γc
= 0.01
τ ˜B = 0.9
τ ˜B = 0.8
τ ˜B = 0.7
Figure 12: Time evolution of the proportion of un-compromised devices in
the LinkNYC network.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
34/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Thank You!
Questions?
Contact:
Junaid Farooq (junaid.farooq@nyu.edu)
370 Jay Street, Brooklyn, NY 11201. NYU Center for Cyber
Security.
M. J. Farooq and Q. Zhu, ”Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless
IoT Networks,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, pp. 2412-2426,
Sept. 2019.
M. J. Farooq and Q. Zhu, ”Secure and reconfigurable network design for critical information dissemination
in the Internet of battlefield things (IoBT),” 2017 15th International Symposium on Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, 2017, pp. 1-8.
M. J. Farooq and Q. Zhu, ”On the Secure and Reconfigurable Multi-Layer Network Design for Critical
Information Dissemination in the Internet of Battlefield Things (IoBT),” in IEEE Transactions on Wireless
Communications, vol. 17, no. 4, pp. 2618-2632, April 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq

More Related Content

What's hot

Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
SyedImranAliKazmi1
 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
TELKOMNIKA JOURNAL
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
Exosite
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Stanford School of Engineering
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
Lillie Coney
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET Journal
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
Ulf Mattsson
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
IRJET Journal
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
team-WIBU
 

What's hot (20)

Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
 
Development of wireless and intelligent home automation system
Development of wireless and intelligent home automation systemDevelopment of wireless and intelligent home automation system
Development of wireless and intelligent home automation system
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET -  	  Cyber Security Threats and Vulnerabilities in IoTIRJET -  	  Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
IRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security FeaturesIRJET- Smart Home Automation using IoT with Security Features
IRJET- Smart Home Automation using IoT with Security Features
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
 

Similar to Securing Wireless IoT Networks from Backdoor Stealthy Attacks

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Eswar Publications
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
SeasiaInfotech2
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
PrinceGupta789219
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
Daniel Wachtel
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
Dr. Amarjeet Singh
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
sample assignment
sample assignmentsample assignment
sample assignment
#essaywriting
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
prashantkumarchinama
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
#essaywriting
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum
 
A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...
IJECEIAES
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
S .Ali Raza
 
76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
JPLoft Solutions
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Eswar Publications
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 

Similar to Securing Wireless IoT Networks from Backdoor Stealthy Attacks (20)

A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
sample assignment
sample assignmentsample assignment
sample assignment
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...A reliable next generation cyber security architecture for industrial interne...
A reliable next generation cyber security architecture for industrial interne...
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
sensors requirement and understanding and deployment
sensors requirement and understanding and deploymentsensors requirement and understanding and deployment
sensors requirement and understanding and deployment
 
76 s201918
76 s20191876 s201918
76 s201918
 
Security Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdfSecurity Challenges in IoT Software Development and Possible Solutions.pdf
Security Challenges in IoT Software Development and Possible Solutions.pdf
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 

Recently uploaded

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 

Recently uploaded (20)

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 

Securing Wireless IoT Networks from Backdoor Stealthy Attacks

  • 1. 1/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq Department of Electrical & Computer Engineering, Tandon School of Engineering, New York University, Brooklyn, NY 11201, USA. {mjf514,qz494}@nyu.edu Jul. 28, 2019 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 2. 2/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Outline 1 Introduction Towards the IoT IoT Architecture Security Risks in IoT 2 Motivation The Security Focus Examples of Past Attacks 3 Threat Landscape Knowns and Unknowns Known Unknowns in IoT 4 Theoretical Modeling 5 Analysis 6 Results 7 Conclusion Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 3. 3/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction From IoC to IoT We are moving from an “Internet of Computers” to an “Internet of Things (IoT)” Security of computers has become mature but security of things is still in its infancy IoT is much more vulnerable to attacks and malicious activity than computers Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 4. 3/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction From IoC to IoT We are moving from an “Internet of Computers” to an “Internet of Things (IoT)” Security of computers has become mature but security of things is still in its infancy IoT is much more vulnerable to attacks and malicious activity than computers Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 5. 3/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction From IoC to IoT We are moving from an “Internet of Computers” to an “Internet of Things (IoT)” Security of computers has become mature but security of things is still in its infancy IoT is much more vulnerable to attacks and malicious activity than computers Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 6. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 7. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 8. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 9. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 10. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 11. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 12. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 13. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 14. 6/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Cyber-Physical Footprint of IoT Digital voice assistants are becoming increasingly powerful and capable Interaction with critical infrastructure systems Figure 3: Digital voice assistants for IoT. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 15. 6/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Cyber-Physical Footprint of IoT Digital voice assistants are becoming increasingly powerful and capable Interaction with critical infrastructure systems Figure 3: Digital voice assistants for IoT. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 16. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 17. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 18. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 19. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 20. 8/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: Objective Knowing the tremendous vulnerabilities in the IoT, the key objective is to: Protect IoT systems and networks from malicious attacks Embed security features into the design and operation of networks Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 21. 9/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: What Can Go Wrong? What is the underlying threat model? What is the security strategy? Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 22. 9/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: What Can Go Wrong? What is the underlying threat model? What is the security strategy? Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 23. 10/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: Potential Consequences Unlike luggage, IoT systems are not passive.They are mission oriented systems interacting with other devices to achieve certain functionalities. Example consequences are as follows: A simultaneous change in temperature control by large number of thermostats may lead to a massive surge in power requirements leading to grid breakdown A coordinated false alarm from smoke detectors may trigger simultaneous firetruck requests sabotaging emergency response systems. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 24. 10/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: Potential Consequences Unlike luggage, IoT systems are not passive.They are mission oriented systems interacting with other devices to achieve certain functionalities. Example consequences are as follows: A simultaneous change in temperature control by large number of thermostats may lead to a massive surge in power requirements leading to grid breakdown A coordinated false alarm from smoke detectors may trigger simultaneous firetruck requests sabotaging emergency response systems. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 25. 11/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Mirai The Mirai is an example of a botnet that caused a disruption in the Internet in 2016 - largest of its kind in history Several websites such as Twitter, Netflix, CNN, and Guardian were affected It exploited default login and password information of IoT devices such as home appliances, DVRs, CC cameras to generate superfluous traffic resulting in a large scale DDoS attack Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 26. 11/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Mirai The Mirai is an example of a botnet that caused a disruption in the Internet in 2016 - largest of its kind in history Several websites such as Twitter, Netflix, CNN, and Guardian were affected It exploited default login and password information of IoT devices such as home appliances, DVRs, CC cameras to generate superfluous traffic resulting in a large scale DDoS attack Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 27. 11/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Mirai The Mirai is an example of a botnet that caused a disruption in the Internet in 2016 - largest of its kind in history Several websites such as Twitter, Netflix, CNN, and Guardian were affected It exploited default login and password information of IoT devices such as home appliances, DVRs, CC cameras to generate superfluous traffic resulting in a large scale DDoS attack Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 28. 12/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Ransomware In 2017, a hotel in Austria was attacked by malware that locked the electronic door locks on its rooms Attacker demanded ransom to open doors to customers Physical denial of service due to IoT Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 29. 12/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Ransomware In 2017, a hotel in Austria was attacked by malware that locked the electronic door locks on its rooms Attacker demanded ransom to open doors to customers Physical denial of service due to IoT Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 30. 12/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Ransomware In 2017, a hotel in Austria was attacked by malware that locked the electronic door locks on its rooms Attacker demanded ransom to open doors to customers Physical denial of service due to IoT Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 31. 13/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Cyber-Physical Attacks in IoT: Knowns and Unknowns Figure 4: Source: Cyber Attacks: The Knowns & Unknowns SE Edition. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 32. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 33. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 34. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 35. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 36. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 37. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 38. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 39. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 40. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 41. 16/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device i IoT Device Malware Process Regular Process IoT Device IoT Devicer Consider wireless IoT devices uniformly distributed in R2 according to a homogeneous Poisson Point Process (PPP) with intensity λ ∈ N Each device has computing capabilities and a wireless interface for communication Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 42. 16/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device i IoT Device Malware Process Regular Process IoT Device IoT Devicer Consider wireless IoT devices uniformly distributed in R2 according to a homogeneous Poisson Point Process (PPP) with intensity λ ∈ N Each device has computing capabilities and a wireless interface for communication Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 43. 17/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction (Cont’d) The devices are assumed to have omni-directional transmissions with a communication range of r m. A typical device located at xi is connected wirelessly with K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i} and |.| denotes the cardinality operator. Since the devices in the network are distributed according to a PPP, the degree K is a random variable with P[K = k] = πk = e−λπr2 (λπr2)k k! . Furthermore, the average degree of a typical device is E[K] = λπr2 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 44. 17/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction (Cont’d) The devices are assumed to have omni-directional transmissions with a communication range of r m. A typical device located at xi is connected wirelessly with K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i} and |.| denotes the cardinality operator. Since the devices in the network are distributed according to a PPP, the degree K is a random variable with P[K = k] = πk = e−λπr2 (λπr2)k k! . Furthermore, the average degree of a typical device is E[K] = λπr2 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 45. 17/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction (Cont’d) The devices are assumed to have omni-directional transmissions with a communication range of r m. A typical device located at xi is connected wirelessly with K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i} and |.| denotes the cardinality operator. Since the devices in the network are distributed according to a PPP, the degree K is a random variable with P[K = k] = πk = e−λπr2 (λπr2)k k! . Furthermore, the average degree of a typical device is E[K] = λπr2 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 46. 18/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Model Validation 0 2 4 6 8 10 12 14 16 18 Device degree, k 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 ProbabilityDensity Communication Range = 140 m Link NYC Data Poisson degree Figure 5: Analyzing potential connectivity of WiFi hotspots in NYC. We use location data of WiFi access points in New York City, referred to as LinkNYC 652 hotspots located in Midtown Manhattan and surrounding neighborhoods are used in analysis A communication range of 140 m for each hotspot is used Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 47. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 48. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 49. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 50. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 51. 20/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution State-Space Representation An epidemic-inspired model is used to study malware propagation. B BI BI ~ ~ µk µk  kσ1 kσ2 k kk Figure 6: State evolution diagram for a typical device. The possible system states of the population of degree k devices are: ˜Bk - the proportion of degree k devices in the network that are un-compromised. B˜Ik - the proportion of degree k devices in the network that are bots but uninformed about control commands. BIk - the proportion of degree k devices in the network that are bots and are also informed with control commands. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 52. 21/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution State-Space Dynamics The state evolution can be described by the following dynamical system of equations: d ˜Bk (t) dt = µk (B˜Ik (t) + BIk (t)) − kσ1 ˜Bk (t), = µk (1 − ˜Bk (t)) − kσ1 ˜Bk (t), (1) dB˜Ik (t) dt = −(µk + kσ2)B˜Ik (t)+ kσ1 ˜Bk (t) + βBIk (t), (2) dBIk (t) dt = −(µk + β)BIk (t) + kσ2B˜Ik (t). (3) Since ˜Bk (t) + B˜Ik (t) + BIk (t) = 1, ∀t ≥ 0, it results in: d ˜Bk (t) dt = µk − (µk + kσ1) ˜Bk (t), (4) dBIk (t) dt = kσ2 − (µk + β + kσ2)BIk (t) − kσ2 ˜Bk (t). (5) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 53. 22/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution Analysis of Equilibrium States Therefore, the equilibrium population of degree k un-compromised devices, ˜B∗ k and of informed bot devices, BI∗ k can be expressed as follows: ˜B∗ k (µk) = µk µk + kσ1(θ∗ ˜B ) , (6) BI∗ k (µk) = k2σ1(θ∗ ˜B )σ2(θ∗ BI ) (µk + kσ1(θ∗ ˜B ))(β + µk + kσ2(θ∗ BI )) , (7) θ ˜B = k k P(k ) E[K] ˜Bk (t), (8) θBI = k k P(k ) E[K] BIk (t). (9) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 54. 23/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution Analysis of Equilibrium States Lemma In a PPP distributed wireless network with D2D communication, the probability of a particular link of a degree k device pointing to an un-compromised and to an informed bot device respectively at equilibrium can be approximately expressed as follows: θ∗ ˜B ≈ min µk ργbpE[K] , 1 , (10) θ∗ BI ≈ max 1 − µkγc + ργb(β + µk) E[K]ρpγbγc , 0 . (11) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 55. 24/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Key Results Fundamental Limits Corollary For a PPP deployed wireless IoT network being infiltrated by a botnet with malware spreading at a rate γb and control commands propagating at a rate γc, the upper bound on the required patching rate for a device to have an impact on the equilibrium populations is given by µk ≤ ργbpE[K], ∀k ≥ 1, (12) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 56. 25/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution Analysis of Equilibrium States Theorem At equilibrium, the proportion of degree k devices in the network that are un-compromised, i.e., ˜B∗ k and those that are bots and informed by control commands, i.e., BI∗ k can be approximately expressed as ˜B ∗ k (µk ) ≈ µk µk + kργbp  1 + 1 η ln  e−η + e −η µk ργbpE[K]     , (13) BI ∗ k (µk ) ≈ k2 ρ2 γbγc p  1 + 1 η ln  e−η + e −η µk ργbpE[K]      µk + kργbp  1 + 1 η ln  e−η + e −η µk ργbpE[K]       × 1 η ln  1 + e η 1− µk γc +ργb(β+µk ) E[K]ρpγbγc    β + µk + kργc + 1 η ln  1 + e η 1− µk γc +ργb(β+µk ) E[K]ρpγbγc     . (14) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 57. 26/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Network Defense Problem The cost incurred on the operation of a network device due to patching activity is assumed to be a smooth, convex, and increasing function of the patching rate µk, represented by φk : R+ → R+, ∀k ≥ 1. The network defender’s problem can then be formulated as follows: minimize µk ,k≥1 ∞ k=1 φk(µk)πk, (15) subject to ∞ k=1 ˜B∗ k (µk)πk ≥ τ ˜B, (16) ∞ k=1 BI∗ k (µk)πk ≤ τBI . (17) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 58. 27/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing Optimal Patching Policies 0 5 10 15 20 25 0 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 0.01 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 BI = 0.2, b = 0.001, c = 0.01 0 5 10 15 20 25 0 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 0.01 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 BI = 0.01, 0.05, 0.1, 0.2 Figure 7: Impact of varying un-compromised bot proportion threshold τ˜B and informed bot proportion threshold τBI . The dotted line shows the theoretical upper bound. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 59. 28/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing Patching Cost 1 2 3 4 5 6 7 8 9 10 10-3 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 c = 0.01 1 2 3 4 5 6 7 8 9 10 10-3 0.9 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 10 -4 b = 0.001 Figure 8: Expected total cost of patching against varying system parameters. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 60. 29/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 τ ˜B = 0.7 State ˜B State B ˜I State BI -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 τ ˜B = 0.8 State ˜B State B ˜I State BI -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 τ ˜B = 0.9 State ˜B State B ˜I State BI Figure 9: Proportion of un-compromised devices in a PPP network. 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 time, t ×104 0 10 20 30 40 50 60 70 80 90 100 Proportionofun-compromiseddevices,˜B(t) τBI = 0.2, γb = 0.001, γc = 0.01 τ ˜B = 0.9 τ ˜B = 0.8 τ ˜B = 0.9 Figure 10: Time evolution of the proportion of un-compromised devices in Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 61. 30/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing equilibrium malware propagation for LinkNYC Figure 11: Snapshot of network states at equilibrium in the LinkNYC network. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 62. 31/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing time evolution of malware propagation for LinkNYC 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 time, t ×104 0 10 20 30 40 50 60 70 80 90 100 Proportionofun-compromiseddevices,˜B(t) τBI = 0.2, γb = 0.001, γc = 0.01 τ ˜B = 0.9 τ ˜B = 0.8 τ ˜B = 0.7 Figure 12: Time evolution of the proportion of un-compromised devices in the LinkNYC network. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 63. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 64. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 65. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 66. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 67. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 68. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 69. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 70. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 71. 34/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Thank You! Questions? Contact: Junaid Farooq (junaid.farooq@nyu.edu) 370 Jay Street, Brooklyn, NY 11201. NYU Center for Cyber Security. M. J. Farooq and Q. Zhu, ”Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, pp. 2412-2426, Sept. 2019. M. J. Farooq and Q. Zhu, ”Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT),” 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, 2017, pp. 1-8. M. J. Farooq and Q. Zhu, ”On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT),” in IEEE Transactions on Wireless Communications, vol. 17, no. 4, pp. 2618-2632, April 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq