Analyzing Malware Remediation in the Expanding Home Network

30 Pages Posted: 31 Mar 2016 Last revised: 13 Aug 2016

See all articles by James Loving

James Loving

Massachusetts Institute of Technology (MIT)

Date Written: March 30, 2016

Abstract

As the Internet of Things (IoT) grows, malicious software, malware, will increasingly threaten Internet security and stability. Malware can compromise users’ privacy, destroy their data, or suborn their computers into a “botnet” for malicious activity. Many actors, from individuals installing antivirus suites on their personal computers to law enforcement officers conducting botnet takedown campaigns, have some capability to prevent or remediate malware, but these strategies face technical and economic challenges. These challenges worsen as the IoT expands, due to the high number of IoT devices and other characteristics of the IoT. To address individual actors’ difficulties in confronting IoT malware, I propose a system of coordination between Internet Service Providers (ISPs) and their customers. ISPs are positioned to efficiently detect malicious traffic and face positive incentives for doing so, but they are unable to determine the exact infected device for reasons of privacy; customers, through home routers, can identify an individual device without compromising their own privacy, given notice of compromise from their ISP.

Suggested Citation

Loving, James, Analyzing Malware Remediation in the Expanding Home Network (March 30, 2016). TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy 2016. Available at SSRN: https://ssrn.com/abstract=2756799 or http://dx.doi.org/10.2139/ssrn.2756799

James Loving (Contact Author)

Massachusetts Institute of Technology (MIT) ( email )

77 Massachusetts Avenue
50 Memorial Drive
Cambridge, MA 02139-4307
United States

Register to save articles to
your library

Register

Paper statistics

Downloads
100
Abstract Views
666
rank
261,636
PlumX Metrics