IoTContact: A Strategy for Predicting Contagious IoT Nodes in Mitigating Ransomware Attacks

Main Article Content

MohammedIbrahim et.al

Abstract

Although the emergence of the Internet of Things (IoT) can facilitate various aspects of people’s lives, most IoT devices are vulnerable to ransomware attacks. Ransomware attacks in IoT networks can be more devastating due to its capability of affecting billions of interconnected devices. Ransomware can take control of compromised devices or an overall system and allow limited access to user interaction with IoT devices. Hence, there is a need for a strategy that can mitigate and predicts affected IoT devices to conduct in-depth forensic analysis in the event of a ransomware attack. This paper critically analyzes ransomware in IoT platforms and proposes IoTContact.IoTContact can formulate the mathematical model based on the interaction of multihop IoT devices and its relationship with ransomware. Consequently, it is expected that IoTContact can predict and classify affected IoT nodes into susceptible, compromise and resistible from the huge number of connected devices in the event of ransomware attacks. Therefore, the scope and the size of the object of forensic interest can be foreseen in preparation of an investigation.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
et.al, M. (2021). IoTContact: A Strategy for Predicting Contagious IoT Nodes in Mitigating Ransomware Attacks. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(3), 1957–1962. Retrieved from https://turcomat.org/index.php/turkbilmat/article/view/1030 (Original work published April 11, 2021)
Section
Articles