Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective

dc.contributor.authorGülataş, İbrahim
dc.contributor.authorKılınç, H. Hakan
dc.contributor.authorZaim, A. Halim
dc.contributor.authorAydın, M. Ali
dc.date.accessioned2023-06-19T11:50:16Z
dc.date.available2023-06-19T11:50:16Z
dc.date.issued2023en_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.description.abstractDeveloping a secure information processing environment highly depends on securing all the layers and devices in the environment. Edge/Fog computing environments are no exception in this case, and the security of these environments highly depends on securing Internet of Things (IoT) devices which are the most vulnerable devices throughout the environment. The adoption of Edge/Fog computing paradigms by new emerging technologies has stimulated malware development for IoT platforms. Recent attacks initiated by IoT malware show that these attacks have a tremendous impact on compromised systems in terms o the Quality of Service because of the number of infected IoT devices. In the light of these developments, there is an enormous need for efficient solutions. However, defense capabilities against these new malware types are highly constrained by the limited understanding of these new emerging paradigms and the lack of access to malware samples. This study mainly focuses on IoT malware to understand the behaviors of malware in the most vulnerable layer of the Edge/Fog computing environments. Mainly, 64 IoT malware families are identified from 2008 when the first known IoT malware emerged to October 2022. These malware families are systematically characterized by various aspects, including target architecture, target device, delivery methods, attack vectors, persistence techniques, and their evolution from existing malware. During this characterization process, two different investigation frameworks, 'Cyber Kill Chain' and 'Mitre ATT&CK for ICS,' have been adopted in the different investigation layers. This paper aims to bring light to future researches with the presented features of the IoT malware.en_US
dc.identifier.doi10.1109/ACCESS.2023.3262614en_US
dc.identifier.endpage33606en_US
dc.identifier.scopus2-s2.0-85151548707en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage33584en_US
dc.identifier.urihttps://hdl.handle.net/11467/6635
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2023.3262614
dc.identifier.volume11en_US
dc.identifier.wosWOS:000970811600001en_US
dc.identifier.wosqualityQ2en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofIEEE Accessen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectEdge/fog computing; Internet of Things (IoT); malware; malware analysis; malware phylogeny; securityen_US
dc.titleMalware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspectiveen_US
dc.typeArticleen_US

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
Malware_Threat_on_Edge_Fog_Computing_Environments_From_Internet_of_Things_Devices_Perspective.pdf
Boyut:
6.47 MB
Biçim:
Adobe Portable Document Format
Açıklama:
Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
İsim:
license.txt
Boyut:
1.56 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: