2014
Karyotis, V.; Papavassiliou, S.
Evaluation of malware spreading in wireless multihop networks with churn Journal Article
In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, vol. 140, pp. 63-74, 2014, ISSN: 18678211, (cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559).
Abstract | Links | BibTeX | Tags: Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware
@article{Karyotis201463,
title = {Evaluation of malware spreading in wireless multihop networks with churn},
author = {V. Karyotis and S. Papavassiliou},
editor = {Papavassiliou S. Gallais A. Mitton N.},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84915750171&doi=10.1007%2f978-3-319-13329-4_6&partnerID=40&md5=a87d7ee86d6d9c71332184f75a466edb},
doi = {10.1007/978-3-319-13329-4_6},
issn = {18678211},
year = {2014},
date = {2014-01-01},
journal = {Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST},
volume = {140},
pages = {63-74},
publisher = {Springer Verlag},
abstract = {Modeling malware spreading in wireless networks has attracted significant interest lately, since this will increase the robustness of such networks that constitute the lion’s share of Internet access nowadays. However, all of previous works have considered networks with fixed number of devices. In this work, we focus on users that can dynamically join and leave the network (node churn) as a result of the effects of malware, or their own operation, i.e. energy depletion. We adopt and adapt a queuing-based model for malware spreading for the case of wireless distributed networks with churn. The corresponding methodology captures the dynamics of SIS-type malware, where nodes are always prone to receive new or already spreading infections over a long period. The employed framework can be exploited for quantifying network reliability and study network behavior, which can be further used for increasing the robustness of the system against the most severe attacks. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014.},
note = {cited By 3; Conference of 6th International ICST Conference on Ad Hoc Networks, ADHOCNETS 2014 ; Conference Date: 18 August 2014 Through 19 August 2014; Conference Code:111559},
keywords = {Computer crime; Wireless ad hoc networks, Distributed networks; Energy depletion; Internet access; Network behaviors; Network reliability; Network robustness; Queuing network; Wireless multi-hop network, Malware},
pubstate = {published},
tppubtype = {article}
}
Modeling malware spreading in wireless networks has attracted significant interest lately, since this will increase the robustness of such networks that constitute the lion’s share of Internet access nowadays. However, all of previous works have considered networks with fixed number of devices. In this work, we focus on users that can dynamically join and leave the network (node churn) as a result of the effects of malware, or their own operation, i.e. energy depletion. We adopt and adapt a queuing-based model for malware spreading for the case of wireless distributed networks with churn. The corresponding methodology captures the dynamics of SIS-type malware, where nodes are always prone to receive new or already spreading infections over a long period. The employed framework can be exploited for quantifying network reliability and study network behavior, which can be further used for increasing the robustness of the system against the most severe attacks. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014.