Skip to main content
Kent Academic Repository

Micro-Auditing for Ransomware Detection in Resource-Constrained Industrial IoT Networks

Huang, Yuxiang, Brierley, Calvin, Pope, James, Ma, Jiteng, Di Buono, Antonio, Arief, Budi, Oikonomou, George (2025) Micro-Auditing for Ransomware Detection in Resource-Constrained Industrial IoT Networks. In: 4th Workshop on Security and Privacy in Connected Embedded Systems (SPICES 2025), 22 September 2025. (KAR id:113337)

Abstract

The threat of ransomware on severely constrained industrial Internet of Things (IoT) deployments is real and difficult to defend against, especially because resource-constrained devices can be compromised and used to propagate malicious payloads with minimal observability. To support the development of ransomware detection and prevention countermeasures, this paper proposes a lightweight micro-auditing mechanism that captures diagnostic metrics derived from process scheduling, as well as from resource and network utilization patterns. The proposed mechanism minimizes computational, memory, and energy overhead through adaptive metric sampling, ensuring resource-efficient operation. We have developed this micro-auditing mechanism using the Contiki-NG operating system for IoT devices, and we use our implementation to derive memory and code footprint statistics as evidence of its lightweight nature. Using the Cooja simulator and an existing ransomware prototype, we examine the feasibility of our micro-auditing mechanism through a host of experiments on topologies of different densities, to quantify the speed and subtle nature of ransomware propagation. Our results highlight the fact that, due to its subtlety, this threat can elude traditional traffic- and power-based anomaly detectors. The micro-auditing mechanism not only enables device-level security auditing but also underpins our ongoing work on the development of countermeasures using a scalable framework for integrating machine learning classifiers, which could further refine threat discrimination and reduce false positives.

Item Type: Conference or workshop item (Paper)
Uncontrolled keywords: Industrial IoT, ransomware, auditing, constrained devices
Subjects: Q Science > QA Mathematics (inc Computing science)
Institutional Unit: Institutes > Institute of Cyber Security for Society
Former Institutional Unit:
There are no former institutional units.
Funders: Engineering and Physical Sciences Research Council (https://ror.org/0439y7842)
Depositing User: Budi Arief
Date Deposited: 06 Mar 2026 15:31 UTC
Last Modified: 06 Mar 2026 15:32 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/113337 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views of this page since July 2020. For more details click on the image.