SlideShare a Scribd company logo
1/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Securing Wireless IoT Networks from Backdoor
Stealthy Attacks
Junaid Farooq
Department of Electrical & Computer Engineering,
Tandon School of Engineering, New York University, Brooklyn, NY 11201, USA.
{mjf514,qz494}@nyu.edu
Jul. 28, 2019
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
2/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Outline
1 Introduction
Towards the IoT
IoT Architecture
Security Risks in IoT
2 Motivation
The Security Focus
Examples of Past Attacks
3 Threat Landscape
Knowns and Unknowns
Known Unknowns in IoT
4 Theoretical Modeling
5 Analysis
6 Results
7 Conclusion
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
3/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
From IoC to IoT
We are moving from an “Internet of Computers” to an
“Internet of Things (IoT)”
Security of computers has become mature but security of
things is still in its infancy
IoT is much more vulnerable to attacks and malicious activity
than computers
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
3/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
From IoC to IoT
We are moving from an “Internet of Computers” to an
“Internet of Things (IoT)”
Security of computers has become mature but security of
things is still in its infancy
IoT is much more vulnerable to attacks and malicious activity
than computers
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
3/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
From IoC to IoT
We are moving from an “Internet of Computers” to an
“Internet of Things (IoT)”
Security of computers has become mature but security of
things is still in its infancy
IoT is much more vulnerable to attacks and malicious activity
than computers
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
4/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Emerging paradigms
The IoT is revolutionizing the operation of electronic systems.
New paradigms are emerging such as smart homes, factories,
buildings, and cities.
It brings tremendous amount of convenience
Automated functionalities are not without risks
Figure 1: Smart home, smart factory, smart buildings, smart city
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
5/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
IoT System Architecture
The IoT ecosystem consists of the following components:
Endpoint Devices (Sensors/ Actuators)
Wireless Access Points (Hubs/ Routers/ Gateways)
Cloud Computing Systems
User Devices (Smart Phones/ Smart Watches/ Voice
Assistants)
Figure 2: IoT technology stack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
6/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Cyber-Physical Footprint of IoT
Digital voice assistants are becoming increasingly powerful
and capable
Interaction with critical infrastructure systems
Figure 3: Digital voice assistants for IoT.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
6/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Cyber-Physical Footprint of IoT
Digital voice assistants are becoming increasingly powerful
and capable
Interaction with critical infrastructure systems
Figure 3: Digital voice assistants for IoT.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
7/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Introduction
Security Risks in IoT
Main factors leading to vulnerabilities are as follows:
low cost devices and little emphasis on security
Rapid product development cycle ignoring security aspects
Device inter-operability opens doors for malicious activity
Less regulated ecosystem - off the shelf hardware can be
programmed to interact with critical systems such as HVACs,
Fire safety systems, electronic door locks, etc.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
8/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: Objective
Knowing the tremendous vulnerabilities in the IoT, the key
objective is to:
Protect IoT systems and networks from malicious attacks
Embed security features into the design and operation of
networks
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
9/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: What Can Go Wrong?
What is the underlying threat model?
What is the security strategy?
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
9/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: What Can Go Wrong?
What is the underlying threat model?
What is the security strategy?
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
10/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: Potential Consequences
Unlike luggage, IoT systems are not passive.They are mission
oriented systems interacting with other devices to achieve certain
functionalities.
Example consequences are as follows:
A simultaneous change in temperature control by large
number of thermostats may lead to a massive surge in power
requirements leading to grid breakdown
A coordinated false alarm from smoke detectors may trigger
simultaneous firetruck requests sabotaging emergency
response systems.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
10/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Security Focus: Potential Consequences
Unlike luggage, IoT systems are not passive.They are mission
oriented systems interacting with other devices to achieve certain
functionalities.
Example consequences are as follows:
A simultaneous change in temperature control by large
number of thermostats may lead to a massive surge in power
requirements leading to grid breakdown
A coordinated false alarm from smoke detectors may trigger
simultaneous firetruck requests sabotaging emergency
response systems.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
11/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Mirai
The Mirai is an example of a botnet that caused a disruption
in the Internet in 2016 - largest of its kind in history
Several websites such as Twitter, Netflix, CNN, and Guardian
were affected
It exploited default login and password information of IoT
devices such as home appliances, DVRs, CC cameras to
generate superfluous traffic resulting in a large scale DDoS
attack
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
11/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Mirai
The Mirai is an example of a botnet that caused a disruption
in the Internet in 2016 - largest of its kind in history
Several websites such as Twitter, Netflix, CNN, and Guardian
were affected
It exploited default login and password information of IoT
devices such as home appliances, DVRs, CC cameras to
generate superfluous traffic resulting in a large scale DDoS
attack
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
11/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Mirai
The Mirai is an example of a botnet that caused a disruption
in the Internet in 2016 - largest of its kind in history
Several websites such as Twitter, Netflix, CNN, and Guardian
were affected
It exploited default login and password information of IoT
devices such as home appliances, DVRs, CC cameras to
generate superfluous traffic resulting in a large scale DDoS
attack
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
12/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Ransomware
In 2017, a hotel in Austria was attacked by malware that
locked the electronic door locks on its rooms
Attacker demanded ransom to open doors to customers
Physical denial of service due to IoT
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
12/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Ransomware
In 2017, a hotel in Austria was attacked by malware that
locked the electronic door locks on its rooms
Attacker demanded ransom to open doors to customers
Physical denial of service due to IoT
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
12/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Examples of Past Attacks - Ransomware
In 2017, a hotel in Austria was attacked by malware that
locked the electronic door locks on its rooms
Attacker demanded ransom to open doors to customers
Physical denial of service due to IoT
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
13/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Cyber-Physical Attacks in IoT: Knowns and Unknowns
Figure 4: Source: Cyber Attacks: The Knowns & Unknowns SE Edition.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
14/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
The Known Unknowns in IoT?
New forms of attacks are emerging such as Advanced
Persistent Threats (APTs) - stealthy, prolonged, and targeted
cyberattacks
Backdoor channels may allow supply chain actors to attack
the system
There are reports that IoTroop and Reaper are two
Mirai-variant botnets1 that are stealthily propagating using
IoT device vulnerabilities.
How do we tackle the known unknowns?
Do not leave the devices/network unattended
1
P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target
financial sector in January 2018,” Insikt Group, Apr. 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
15/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Motivation
Mitigation Approach
How can we mitigate the risk of stealthy botnet attacks?
We can use the “do not leave unattended” philosophy to
check on the devices
One way is to patch devices periodically to ensure that it is
not in a compromised state
How often the devices should be patched?
Even though the attacker may be able to compromise a
portion of the network, it will not be able to intrude and cause
a large scale coordinated attack.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
16/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device i
IoT Device
Malware Process
Regular Process
IoT Device
IoT Devicer
Consider wireless IoT devices uniformly distributed in R2
according to a homogeneous Poisson Point Process (PPP)
with intensity λ ∈ N
Each device has computing capabilities and a wireless
interface for communication
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
16/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device
IoT Device i
IoT Device
Malware Process
Regular Process
IoT Device
IoT Devicer
Consider wireless IoT devices uniformly distributed in R2
according to a homogeneous Poisson Point Process (PPP)
with intensity λ ∈ N
Each device has computing capabilities and a wireless
interface for communication
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
17/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction (Cont’d)
The devices are assumed to have omni-directional
transmissions with a communication range of r m.
A typical device located at xi is connected wirelessly with
K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i}
and |.| denotes the cardinality operator.
Since the devices in the network are distributed according to a
PPP, the degree K is a random variable with
P[K = k] = πk = e−λπr2
(λπr2)k
k! . Furthermore, the average
degree of a typical device is E[K] = λπr2
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
17/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction (Cont’d)
The devices are assumed to have omni-directional
transmissions with a communication range of r m.
A typical device located at xi is connected wirelessly with
K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i}
and |.| denotes the cardinality operator.
Since the devices in the network are distributed according to a
PPP, the degree K is a random variable with
P[K = k] = πk = e−λπr2
(λπr2)k
k! . Furthermore, the average
degree of a typical device is E[K] = λπr2
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
17/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Network Abstraction (Cont’d)
The devices are assumed to have omni-directional
transmissions with a communication range of r m.
A typical device located at xi is connected wirelessly with
K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i}
and |.| denotes the cardinality operator.
Since the devices in the network are distributed according to a
PPP, the degree K is a random variable with
P[K = k] = πk = e−λπr2
(λπr2)k
k! . Furthermore, the average
degree of a typical device is E[K] = λπr2
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
18/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Model Validation
0 2 4 6 8 10 12 14 16 18
Device degree, k
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
ProbabilityDensity
Communication Range = 140 m
Link NYC Data
Poisson degree
Figure 5: Analyzing potential connectivity of WiFi hotspots in NYC.
We use location data of WiFi access points in New York City,
referred to as LinkNYC
652 hotspots located in Midtown Manhattan and surrounding
neighborhoods are used in analysis
A communication range of 140 m for each hotspot is used
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
19/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
System Model
Threat Model
We assume that a botmaster possesses powerful capabilities
to exploit loopholes in vulnerable wireless IoT devices to
infiltrate them and install malicious software process on them.
We assume that a proportion p ∈ [0, 1] of the network is
vulnerable to being compromised or infiltrated by the malware
if the malware has been successfully transmitted over the
wireless interface.
The bots use a fraction of the communication resources of the
host device to infiltrate nearby devices and to share control
commands.
γb ≥ 0 - malware spreading rate
γc ≥ 0 - control command propagation rate
Patching removes malware as well as control commands on
the device
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
20/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
State-Space Representation
An epidemic-inspired model is used to study malware propagation.
B BI BI
~ ~
µk
µk 
kσ1
kσ2
k kk
Figure 6: State evolution diagram for a typical device.
The possible system states of the population of degree k devices are:
˜Bk - the proportion of degree k devices in the network that are
un-compromised.
B˜Ik - the proportion of degree k devices in the network that are
bots but uninformed about control commands.
BIk - the proportion of degree k devices in the network that are
bots and are also informed with control commands.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
21/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
State-Space Dynamics
The state evolution can be described by the following dynamical system
of equations:
d ˜Bk (t)
dt
= µk (B˜Ik (t) + BIk (t)) − kσ1
˜Bk (t),
= µk (1 − ˜Bk (t)) − kσ1
˜Bk (t), (1)
dB˜Ik (t)
dt
= −(µk + kσ2)B˜Ik (t)+ kσ1
˜Bk (t) + βBIk (t), (2)
dBIk (t)
dt
= −(µk + β)BIk (t) + kσ2B˜Ik (t). (3)
Since ˜Bk (t) + B˜Ik (t) + BIk (t) = 1, ∀t ≥ 0, it results in:
d ˜Bk (t)
dt
= µk − (µk + kσ1) ˜Bk (t), (4)
dBIk (t)
dt
= kσ2 − (µk + β + kσ2)BIk (t) − kσ2
˜Bk (t). (5)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
22/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
Analysis of Equilibrium States
Therefore, the equilibrium population of degree k un-compromised
devices, ˜B∗
k and of informed bot devices, BI∗
k can be expressed as
follows:
˜B∗
k (µk) =
µk
µk + kσ1(θ∗
˜B
)
, (6)
BI∗
k (µk) =
k2σ1(θ∗
˜B
)σ2(θ∗
BI )
(µk + kσ1(θ∗
˜B
))(β + µk + kσ2(θ∗
BI ))
, (7)
θ ˜B =
k
k P(k )
E[K]
˜Bk (t), (8)
θBI =
k
k P(k )
E[K]
BIk (t). (9)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
23/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
Analysis of Equilibrium States
Lemma
In a PPP distributed wireless network with D2D communication,
the probability of a particular link of a degree k device pointing to
an un-compromised and to an informed bot device respectively at
equilibrium can be approximately expressed as follows:
θ∗
˜B
≈ min
µk
ργbpE[K]
, 1 , (10)
θ∗
BI ≈ max 1 −
µkγc + ργb(β + µk)
E[K]ρpγbγc
, 0 . (11)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
24/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Key Results
Fundamental Limits
Corollary
For a PPP deployed wireless IoT network being infiltrated by a
botnet with malware spreading at a rate γb and control commands
propagating at a rate γc, the upper bound on the required
patching rate for a device to have an impact on the equilibrium
populations is given by
µk ≤ ργbpE[K], ∀k ≥ 1, (12)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
25/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Malware & Information Evolution
Analysis of Equilibrium States
Theorem
At equilibrium, the proportion of degree k devices in the network
that are un-compromised, i.e., ˜B∗
k and those that are bots and
informed by control commands, i.e., BI∗
k can be approximately
expressed as
˜B
∗
k (µk ) ≈
µk
µk + kργbp

1 + 1
η
ln

e−η + e
−η
µk
ργbpE[K]




, (13)
BI
∗
k (µk ) ≈
k2
ρ2
γbγc p

1 + 1
η
ln

e−η
+ e
−η
µk
ργbpE[K]





µk + kργbp

1 + 1
η
ln

e−η + e
−η
µk
ργbpE[K]






×
1
η
ln

1 + e
η 1−
µk γc +ργb(β+µk )
E[K]ρpγbγc



β + µk + kργc + 1
η
ln

1 + e
η 1−
µk γc +ργb(β+µk )
E[K]ρpγbγc




. (14)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
26/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Network Defense Problem
The cost incurred on the operation of a network device due to
patching activity is assumed to be a smooth, convex, and
increasing function of the patching rate µk, represented by
φk : R+ → R+, ∀k ≥ 1.
The network defender’s problem can then be formulated as
follows:
minimize
µk ,k≥1
∞
k=1
φk(µk)πk, (15)
subject to
∞
k=1
˜B∗
k (µk)πk ≥ τ ˜B, (16)
∞
k=1
BI∗
k (µk)πk ≤ τBI . (17)
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
27/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing Optimal Patching Policies
0 5 10 15 20 25
0
0.001
0.002
0.003
0.004
0.005
0.006
0.007
0.008
0.009
0.01
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
BI
= 0.2, b
= 0.001, c
= 0.01
0 5 10 15 20 25
0
0.001
0.002
0.003
0.004
0.005
0.006
0.007
0.008
0.009
0.01
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
BI
= 0.01, 0.05, 0.1, 0.2
Figure 7: Impact of varying un-compromised bot proportion threshold τ˜B
and informed bot proportion threshold τBI . The dotted line shows the
theoretical upper bound.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
28/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing Patching Cost
1 2 3 4 5 6 7 8 9 10
10-3
0
0.002
0.004
0.006
0.008
0.01
0.012
0.014
0.016
0.018
c
= 0.01
1 2 3 4 5 6 7 8 9 10
10-3
0.9
1
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
10
-4 b
= 0.001
Figure 8: Expected total cost of patching against varying system
parameters.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
29/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
τ ˜B = 0.7
State ˜B State B ˜I State BI
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
τ ˜B = 0.8
State ˜B State B ˜I State BI
-0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5
-0.5
-0.4
-0.3
-0.2
-0.1
0
0.1
0.2
0.3
0.4
0.5
τ ˜B = 0.9
State ˜B State B ˜I State BI
Figure 9: Proportion of un-compromised devices in a PPP network.
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2
time, t ×104
0
10
20
30
40
50
60
70
80
90
100
Proportionofun-compromiseddevices,˜B(t)
τBI
= 0.2, γb
= 0.001, γc
= 0.01
τ ˜B = 0.9
τ ˜B = 0.8
τ ˜B = 0.9
Figure 10: Time evolution of the proportion of un-compromised devices in
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
30/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing equilibrium malware propagation for LinkNYC
Figure 11: Snapshot of network states at equilibrium in the LinkNYC
network.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
31/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Results
Analyzing time evolution of malware propagation for LinkNYC
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
time, t ×104
0
10
20
30
40
50
60
70
80
90
100
Proportionofun-compromiseddevices,˜B(t)
τBI
= 0.2, γb
= 0.001, γc
= 0.01
τ ˜B = 0.9
τ ˜B = 0.8
τ ˜B = 0.7
Figure 12: Time evolution of the proportion of un-compromised devices in
the LinkNYC network.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
32/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Summary
An overview of security challenges in IoT was provided
Past attacks and emerging threats were discussed
A theoretical standpoint on countering stealthy botnet
propagation is presented
Optimal patching policies are developed to minimize the
threat of botnet formation
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
33/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Conclusion
Key Takeaways
Security concerns are going to be further amplified as the IoT
ecosystem grows
Novel security mechanisms are required to tackle the known
unknowns
A holistic approach is needed to understand risks (By having a
global view instead of local security of individual devices)
Next Step: Cyber-Physical Resilience - Countering Unknown
Unknowns
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
34/34
Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion
Thank You!
Questions?
Contact:
Junaid Farooq (junaid.farooq@nyu.edu)
370 Jay Street, Brooklyn, NY 11201. NYU Center for Cyber
Security.
M. J. Farooq and Q. Zhu, ”Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless
IoT Networks,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, pp. 2412-2426,
Sept. 2019.
M. J. Farooq and Q. Zhu, ”Secure and reconfigurable network design for critical information dissemination
in the Internet of battlefield things (IoBT),” 2017 15th International Symposium on Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, 2017, pp. 1-8.
M. J. Farooq and Q. Zhu, ”On the Secure and Reconfigurable Multi-Layer Network Design for Critical
Information Dissemination in the Internet of Battlefield Things (IoBT),” in IEEE Transactions on Wireless
Communications, vol. 17, no. 4, pp. 2618-2632, April 2018.
Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq

More Related Content

PDF
DEDA: An algorithm for early detection of topology attacks in the internet of...
PDF
509286-Aki_Koivu-Review
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
PDF
Io t security defense in depth charles li v1 20180425c
PPTX
PPTX
Introduction to IOT security
PDF
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
PDF
Hacking Internet of Things (IoT)
DEDA: An algorithm for early detection of topology attacks in the internet of...
509286-Aki_Koivu-Review
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Io t security defense in depth charles li v1 20180425c
Introduction to IOT security
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
Hacking Internet of Things (IoT)

What's hot (20)

PDF
Security and Privacy Big Challenges in Internet of things
PDF
Security Architecture for Small Branch and IoT
PDF
IoT security and privacy: main challenges and how ISOC-OTA address them
PDF
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
PDF
Development of wireless and intelligent home automation system
PPTX
Presentation on IOT SECURITY
PPTX
IoT security patterns
PDF
IoT Security Elements
PDF
IRJET - Cyber Security Threats and Vulnerabilities in IoT
PDF
Security in IoT
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PPTX
Introduction to IoT Security
 
PDF
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
PDF
A survey on Internet of Things (IoT) security : Challenges and Current status
PDF
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
PDF
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
PPTX
Security for iot and cloud aug 25b 2017
PDF
IRJET- Smart Home Automation using IoT with Security Features
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Security and Privacy Big Challenges in Internet of things
Security Architecture for Small Branch and IoT
IoT security and privacy: main challenges and how ISOC-OTA address them
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
Development of wireless and intelligent home automation system
Presentation on IOT SECURITY
IoT security patterns
IoT Security Elements
IRJET - Cyber Security Threats and Vulnerabilities in IoT
Security in IoT
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Introduction to IoT Security
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
A survey on Internet of Things (IoT) security : Challenges and Current status
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
Security for iot and cloud aug 25b 2017
IRJET- Smart Home Automation using IoT with Security Features
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Ad

Similar to Securing Wireless IoT Networks from Backdoor Stealthy Attacks (20)

PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
Io t security_review_blockchain_solutions
PDF
Addressing IoT Security Challenges through AI Solutions
PDF
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
PDF
Strengthening IoT Security Against Cyber Threats.pdf
PDF
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
PPTX
Security aspect of IOT.pptx
PDF
The Evolution of Cybersecurity in the Age of IoT.pdf
PDF
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
PDF
Security and Privacy Issues in IoT Environment
PDF
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
PDF
sample assignment
PPTX
iot ppt.pptx
PDF
assignment help experts
PPTX
Internet & iot security
PDF
A reliable next generation cyber security architecture for industrial interne...
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
PDF
sensors requirement and understanding and deployment
PDF
76 s201918
PDF
Security Challenges in IoT Software Development and Possible Solutions.pdf
A Survey Report on : Security & Challenges in Internet of Things
Io t security_review_blockchain_solutions
Addressing IoT Security Challenges through AI Solutions
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
Strengthening IoT Security Against Cyber Threats.pdf
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
Security aspect of IOT.pptx
The Evolution of Cybersecurity in the Age of IoT.pdf
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
Security and Privacy Issues in IoT Environment
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
sample assignment
iot ppt.pptx
assignment help experts
Internet & iot security
A reliable next generation cyber security architecture for industrial interne...
Malware threat analysis techniques and approaches for IoT applications: a review
sensors requirement and understanding and deployment
76 s201918
Security Challenges in IoT Software Development and Possible Solutions.pdf
Ad

Recently uploaded (20)

PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
project resource management chapter-09.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Mushroom cultivation and it's methods.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
1 - Historical Antecedents, Social Consideration.pdf
A Presentation on Touch Screen Technology
Encapsulation_ Review paper, used for researhc scholars
gpt5_lecture_notes_comprehensive_20250812015547.pdf
DP Operators-handbook-extract for the Mautical Institute
Unlocking AI with Model Context Protocol (MCP)
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
Programs and apps: productivity, graphics, security and other tools
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
cloud_computing_Infrastucture_as_cloud_p
A comparative analysis of optical character recognition models for extracting...
project resource management chapter-09.pdf
Hindi spoken digit analysis for native and non-native speakers
Mushroom cultivation and it's methods.pdf
Enhancing emotion recognition model for a student engagement use case through...
Building Integrated photovoltaic BIPV_UPV.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Securing Wireless IoT Networks from Backdoor Stealthy Attacks

  • 1. 1/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq Department of Electrical & Computer Engineering, Tandon School of Engineering, New York University, Brooklyn, NY 11201, USA. {mjf514,qz494}@nyu.edu Jul. 28, 2019 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 2. 2/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Outline 1 Introduction Towards the IoT IoT Architecture Security Risks in IoT 2 Motivation The Security Focus Examples of Past Attacks 3 Threat Landscape Knowns and Unknowns Known Unknowns in IoT 4 Theoretical Modeling 5 Analysis 6 Results 7 Conclusion Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 3. 3/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction From IoC to IoT We are moving from an “Internet of Computers” to an “Internet of Things (IoT)” Security of computers has become mature but security of things is still in its infancy IoT is much more vulnerable to attacks and malicious activity than computers Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 4. 3/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction From IoC to IoT We are moving from an “Internet of Computers” to an “Internet of Things (IoT)” Security of computers has become mature but security of things is still in its infancy IoT is much more vulnerable to attacks and malicious activity than computers Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 5. 3/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction From IoC to IoT We are moving from an “Internet of Computers” to an “Internet of Things (IoT)” Security of computers has become mature but security of things is still in its infancy IoT is much more vulnerable to attacks and malicious activity than computers Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 6. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 7. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 8. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 9. 4/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Emerging paradigms The IoT is revolutionizing the operation of electronic systems. New paradigms are emerging such as smart homes, factories, buildings, and cities. It brings tremendous amount of convenience Automated functionalities are not without risks Figure 1: Smart home, smart factory, smart buildings, smart city Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 10. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 11. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 12. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 13. 5/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction IoT System Architecture The IoT ecosystem consists of the following components: Endpoint Devices (Sensors/ Actuators) Wireless Access Points (Hubs/ Routers/ Gateways) Cloud Computing Systems User Devices (Smart Phones/ Smart Watches/ Voice Assistants) Figure 2: IoT technology stack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 14. 6/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Cyber-Physical Footprint of IoT Digital voice assistants are becoming increasingly powerful and capable Interaction with critical infrastructure systems Figure 3: Digital voice assistants for IoT. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 15. 6/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Cyber-Physical Footprint of IoT Digital voice assistants are becoming increasingly powerful and capable Interaction with critical infrastructure systems Figure 3: Digital voice assistants for IoT. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 16. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 17. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 18. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 19. 7/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Introduction Security Risks in IoT Main factors leading to vulnerabilities are as follows: low cost devices and little emphasis on security Rapid product development cycle ignoring security aspects Device inter-operability opens doors for malicious activity Less regulated ecosystem - off the shelf hardware can be programmed to interact with critical systems such as HVACs, Fire safety systems, electronic door locks, etc. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 20. 8/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: Objective Knowing the tremendous vulnerabilities in the IoT, the key objective is to: Protect IoT systems and networks from malicious attacks Embed security features into the design and operation of networks Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 21. 9/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: What Can Go Wrong? What is the underlying threat model? What is the security strategy? Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 22. 9/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: What Can Go Wrong? What is the underlying threat model? What is the security strategy? Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 23. 10/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: Potential Consequences Unlike luggage, IoT systems are not passive.They are mission oriented systems interacting with other devices to achieve certain functionalities. Example consequences are as follows: A simultaneous change in temperature control by large number of thermostats may lead to a massive surge in power requirements leading to grid breakdown A coordinated false alarm from smoke detectors may trigger simultaneous firetruck requests sabotaging emergency response systems. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 24. 10/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Security Focus: Potential Consequences Unlike luggage, IoT systems are not passive.They are mission oriented systems interacting with other devices to achieve certain functionalities. Example consequences are as follows: A simultaneous change in temperature control by large number of thermostats may lead to a massive surge in power requirements leading to grid breakdown A coordinated false alarm from smoke detectors may trigger simultaneous firetruck requests sabotaging emergency response systems. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 25. 11/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Mirai The Mirai is an example of a botnet that caused a disruption in the Internet in 2016 - largest of its kind in history Several websites such as Twitter, Netflix, CNN, and Guardian were affected It exploited default login and password information of IoT devices such as home appliances, DVRs, CC cameras to generate superfluous traffic resulting in a large scale DDoS attack Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 26. 11/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Mirai The Mirai is an example of a botnet that caused a disruption in the Internet in 2016 - largest of its kind in history Several websites such as Twitter, Netflix, CNN, and Guardian were affected It exploited default login and password information of IoT devices such as home appliances, DVRs, CC cameras to generate superfluous traffic resulting in a large scale DDoS attack Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 27. 11/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Mirai The Mirai is an example of a botnet that caused a disruption in the Internet in 2016 - largest of its kind in history Several websites such as Twitter, Netflix, CNN, and Guardian were affected It exploited default login and password information of IoT devices such as home appliances, DVRs, CC cameras to generate superfluous traffic resulting in a large scale DDoS attack Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 28. 12/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Ransomware In 2017, a hotel in Austria was attacked by malware that locked the electronic door locks on its rooms Attacker demanded ransom to open doors to customers Physical denial of service due to IoT Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 29. 12/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Ransomware In 2017, a hotel in Austria was attacked by malware that locked the electronic door locks on its rooms Attacker demanded ransom to open doors to customers Physical denial of service due to IoT Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 30. 12/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Examples of Past Attacks - Ransomware In 2017, a hotel in Austria was attacked by malware that locked the electronic door locks on its rooms Attacker demanded ransom to open doors to customers Physical denial of service due to IoT Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 31. 13/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Cyber-Physical Attacks in IoT: Knowns and Unknowns Figure 4: Source: Cyber Attacks: The Knowns & Unknowns SE Edition. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 32. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 33. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 34. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 35. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 36. 14/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation The Known Unknowns in IoT? New forms of attacks are emerging such as Advanced Persistent Threats (APTs) - stealthy, prolonged, and targeted cyberattacks Backdoor channels may allow supply chain actors to attack the system There are reports that IoTroop and Reaper are two Mirai-variant botnets1 that are stealthily propagating using IoT device vulnerabilities. How do we tackle the known unknowns? Do not leave the devices/network unattended 1 P. Moriuchi and S. Chohan, “Mirai-variant IoT botnet used to target financial sector in January 2018,” Insikt Group, Apr. 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 37. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 38. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 39. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 40. 15/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Motivation Mitigation Approach How can we mitigate the risk of stealthy botnet attacks? We can use the “do not leave unattended” philosophy to check on the devices One way is to patch devices periodically to ensure that it is not in a compromised state How often the devices should be patched? Even though the attacker may be able to compromise a portion of the network, it will not be able to intrude and cause a large scale coordinated attack. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 41. 16/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device i IoT Device Malware Process Regular Process IoT Device IoT Devicer Consider wireless IoT devices uniformly distributed in R2 according to a homogeneous Poisson Point Process (PPP) with intensity λ ∈ N Each device has computing capabilities and a wireless interface for communication Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 42. 16/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device IoT Device i IoT Device Malware Process Regular Process IoT Device IoT Devicer Consider wireless IoT devices uniformly distributed in R2 according to a homogeneous Poisson Point Process (PPP) with intensity λ ∈ N Each device has computing capabilities and a wireless interface for communication Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 43. 17/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction (Cont’d) The devices are assumed to have omni-directional transmissions with a communication range of r m. A typical device located at xi is connected wirelessly with K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i} and |.| denotes the cardinality operator. Since the devices in the network are distributed according to a PPP, the degree K is a random variable with P[K = k] = πk = e−λπr2 (λπr2)k k! . Furthermore, the average degree of a typical device is E[K] = λπr2 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 44. 17/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction (Cont’d) The devices are assumed to have omni-directional transmissions with a communication range of r m. A typical device located at xi is connected wirelessly with K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i} and |.| denotes the cardinality operator. Since the devices in the network are distributed according to a PPP, the degree K is a random variable with P[K = k] = πk = e−λπr2 (λπr2)k k! . Furthermore, the average degree of a typical device is E[K] = λπr2 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 45. 17/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Network Abstraction (Cont’d) The devices are assumed to have omni-directional transmissions with a communication range of r m. A typical device located at xi is connected wirelessly with K = |Ni | other devices, where Ni = {j : xi − xj ≤ r, ∀j = i} and |.| denotes the cardinality operator. Since the devices in the network are distributed according to a PPP, the degree K is a random variable with P[K = k] = πk = e−λπr2 (λπr2)k k! . Furthermore, the average degree of a typical device is E[K] = λπr2 Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 46. 18/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Model Validation 0 2 4 6 8 10 12 14 16 18 Device degree, k 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 ProbabilityDensity Communication Range = 140 m Link NYC Data Poisson degree Figure 5: Analyzing potential connectivity of WiFi hotspots in NYC. We use location data of WiFi access points in New York City, referred to as LinkNYC 652 hotspots located in Midtown Manhattan and surrounding neighborhoods are used in analysis A communication range of 140 m for each hotspot is used Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 47. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 48. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 49. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 50. 19/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion System Model Threat Model We assume that a botmaster possesses powerful capabilities to exploit loopholes in vulnerable wireless IoT devices to infiltrate them and install malicious software process on them. We assume that a proportion p ∈ [0, 1] of the network is vulnerable to being compromised or infiltrated by the malware if the malware has been successfully transmitted over the wireless interface. The bots use a fraction of the communication resources of the host device to infiltrate nearby devices and to share control commands. γb ≥ 0 - malware spreading rate γc ≥ 0 - control command propagation rate Patching removes malware as well as control commands on the device Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 51. 20/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution State-Space Representation An epidemic-inspired model is used to study malware propagation. B BI BI ~ ~ µk µk  kσ1 kσ2 k kk Figure 6: State evolution diagram for a typical device. The possible system states of the population of degree k devices are: ˜Bk - the proportion of degree k devices in the network that are un-compromised. B˜Ik - the proportion of degree k devices in the network that are bots but uninformed about control commands. BIk - the proportion of degree k devices in the network that are bots and are also informed with control commands. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 52. 21/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution State-Space Dynamics The state evolution can be described by the following dynamical system of equations: d ˜Bk (t) dt = µk (B˜Ik (t) + BIk (t)) − kσ1 ˜Bk (t), = µk (1 − ˜Bk (t)) − kσ1 ˜Bk (t), (1) dB˜Ik (t) dt = −(µk + kσ2)B˜Ik (t)+ kσ1 ˜Bk (t) + βBIk (t), (2) dBIk (t) dt = −(µk + β)BIk (t) + kσ2B˜Ik (t). (3) Since ˜Bk (t) + B˜Ik (t) + BIk (t) = 1, ∀t ≥ 0, it results in: d ˜Bk (t) dt = µk − (µk + kσ1) ˜Bk (t), (4) dBIk (t) dt = kσ2 − (µk + β + kσ2)BIk (t) − kσ2 ˜Bk (t). (5) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 53. 22/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution Analysis of Equilibrium States Therefore, the equilibrium population of degree k un-compromised devices, ˜B∗ k and of informed bot devices, BI∗ k can be expressed as follows: ˜B∗ k (µk) = µk µk + kσ1(θ∗ ˜B ) , (6) BI∗ k (µk) = k2σ1(θ∗ ˜B )σ2(θ∗ BI ) (µk + kσ1(θ∗ ˜B ))(β + µk + kσ2(θ∗ BI )) , (7) θ ˜B = k k P(k ) E[K] ˜Bk (t), (8) θBI = k k P(k ) E[K] BIk (t). (9) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 54. 23/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution Analysis of Equilibrium States Lemma In a PPP distributed wireless network with D2D communication, the probability of a particular link of a degree k device pointing to an un-compromised and to an informed bot device respectively at equilibrium can be approximately expressed as follows: θ∗ ˜B ≈ min µk ργbpE[K] , 1 , (10) θ∗ BI ≈ max 1 − µkγc + ργb(β + µk) E[K]ρpγbγc , 0 . (11) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 55. 24/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Key Results Fundamental Limits Corollary For a PPP deployed wireless IoT network being infiltrated by a botnet with malware spreading at a rate γb and control commands propagating at a rate γc, the upper bound on the required patching rate for a device to have an impact on the equilibrium populations is given by µk ≤ ργbpE[K], ∀k ≥ 1, (12) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 56. 25/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Malware & Information Evolution Analysis of Equilibrium States Theorem At equilibrium, the proportion of degree k devices in the network that are un-compromised, i.e., ˜B∗ k and those that are bots and informed by control commands, i.e., BI∗ k can be approximately expressed as ˜B ∗ k (µk ) ≈ µk µk + kργbp  1 + 1 η ln  e−η + e −η µk ργbpE[K]     , (13) BI ∗ k (µk ) ≈ k2 ρ2 γbγc p  1 + 1 η ln  e−η + e −η µk ργbpE[K]      µk + kργbp  1 + 1 η ln  e−η + e −η µk ργbpE[K]       × 1 η ln  1 + e η 1− µk γc +ργb(β+µk ) E[K]ρpγbγc    β + µk + kργc + 1 η ln  1 + e η 1− µk γc +ργb(β+µk ) E[K]ρpγbγc     . (14) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 57. 26/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Network Defense Problem The cost incurred on the operation of a network device due to patching activity is assumed to be a smooth, convex, and increasing function of the patching rate µk, represented by φk : R+ → R+, ∀k ≥ 1. The network defender’s problem can then be formulated as follows: minimize µk ,k≥1 ∞ k=1 φk(µk)πk, (15) subject to ∞ k=1 ˜B∗ k (µk)πk ≥ τ ˜B, (16) ∞ k=1 BI∗ k (µk)πk ≤ τBI . (17) Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 58. 27/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing Optimal Patching Policies 0 5 10 15 20 25 0 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 0.01 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 BI = 0.2, b = 0.001, c = 0.01 0 5 10 15 20 25 0 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 0.01 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 BI = 0.01, 0.05, 0.1, 0.2 Figure 7: Impact of varying un-compromised bot proportion threshold τ˜B and informed bot proportion threshold τBI . The dotted line shows the theoretical upper bound. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 59. 28/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing Patching Cost 1 2 3 4 5 6 7 8 9 10 10-3 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 c = 0.01 1 2 3 4 5 6 7 8 9 10 10-3 0.9 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 10 -4 b = 0.001 Figure 8: Expected total cost of patching against varying system parameters. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 60. 29/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 τ ˜B = 0.7 State ˜B State B ˜I State BI -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 τ ˜B = 0.8 State ˜B State B ˜I State BI -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 τ ˜B = 0.9 State ˜B State B ˜I State BI Figure 9: Proportion of un-compromised devices in a PPP network. 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 time, t ×104 0 10 20 30 40 50 60 70 80 90 100 Proportionofun-compromiseddevices,˜B(t) τBI = 0.2, γb = 0.001, γc = 0.01 τ ˜B = 0.9 τ ˜B = 0.8 τ ˜B = 0.9 Figure 10: Time evolution of the proportion of un-compromised devices in Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 61. 30/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing equilibrium malware propagation for LinkNYC Figure 11: Snapshot of network states at equilibrium in the LinkNYC network. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 62. 31/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Results Analyzing time evolution of malware propagation for LinkNYC 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 time, t ×104 0 10 20 30 40 50 60 70 80 90 100 Proportionofun-compromiseddevices,˜B(t) τBI = 0.2, γb = 0.001, γc = 0.01 τ ˜B = 0.9 τ ˜B = 0.8 τ ˜B = 0.7 Figure 12: Time evolution of the proportion of un-compromised devices in the LinkNYC network. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 63. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 64. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 65. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 66. 32/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Summary An overview of security challenges in IoT was provided Past attacks and emerging threats were discussed A theoretical standpoint on countering stealthy botnet propagation is presented Optimal patching policies are developed to minimize the threat of botnet formation Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 67. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 68. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 69. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 70. 33/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Conclusion Key Takeaways Security concerns are going to be further amplified as the IoT ecosystem grows Novel security mechanisms are required to tackle the known unknowns A holistic approach is needed to understand risks (By having a global view instead of local security of individual devices) Next Step: Cyber-Physical Resilience - Countering Unknown Unknowns Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq
  • 71. 34/34 Introduction Motivation Threat Landscape Theoretical Modeling Analysis Results Conclusion Thank You! Questions? Contact: Junaid Farooq (junaid.farooq@nyu.edu) 370 Jay Street, Brooklyn, NY 11201. NYU Center for Cyber Security. M. J. Farooq and Q. Zhu, ”Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks,” in IEEE Transactions on Information Forensics and Security, vol. 14, no. 9, pp. 2412-2426, Sept. 2019. M. J. Farooq and Q. Zhu, ”Secure and reconfigurable network design for critical information dissemination in the Internet of battlefield things (IoBT),” 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Paris, 2017, pp. 1-8. M. J. Farooq and Q. Zhu, ”On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT),” in IEEE Transactions on Wireless Communications, vol. 17, no. 4, pp. 2618-2632, April 2018. Securing Wireless IoT Networks from Backdoor Stealthy Attacks Junaid Farooq