2007
Karyotis, V.; Grammatikou, M.; Papavassiliou, S.
On the asymptotic behavior of malware-propagative mobile ad hoc networks Conference
Pisa, 2007, ISBN: 1424414555; 9781424414550, (cited By 3; Conference of 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS ; Conference Date: 8 October 2007 Through 11 October 2007; Conference Code:73246).
Abstract | Links | BibTeX | Tags: Ad hoc networks, Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems
@conference{Karyotis2007,
title = {On the asymptotic behavior of malware-propagative mobile ad hoc networks},
author = {V. Karyotis and M. Grammatikou and S. Papavassiliou},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-50249169440&doi=10.1109%2fMOBHOC.2007.4428662&partnerID=40&md5=b4dae755dc5ed6d0015834da1dd02d25},
doi = {10.1109/MOBHOC.2007.4428662},
isbn = {1424414555; 9781424414550},
year = {2007},
date = {2007-01-01},
journal = {2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS},
address = {Pisa},
abstract = {In this paper we study the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from an attacker or their already infected neighbors. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, based on the theory of closed queueing networks, that aims at describing the aggregated behavior of the system when attacked by a malicious node. Due to its nature the model is able to deal more effectively with the stochastic behavior of the attacker and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative ad hoc networking environments, where the number of nodes is large. Using the Norton equivalent of the closed queueing network, we obtain analytical results for its steady state behavior, which in turn can be used to identify the critical parameters affecting the operation of the network. ©2007 IEEE.},
note = {cited By 3; Conference of 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS ; Conference Date: 8 October 2007 Through 11 October 2007; Conference Code:73246},
keywords = {Ad hoc networks, Asymptotic analysis; Computer crime; Probability; Queueing networks; Queueing theory; Sensors; Stochastic models; Switching circuits; Telecommunication networks; Wireless networks; Wireless telecommunication systems},
pubstate = {published},
tppubtype = {conference}
}
In this paper we study the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from an attacker or their already infected neighbors. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, based on the theory of closed queueing networks, that aims at describing the aggregated behavior of the system when attacked by a malicious node. Due to its nature the model is able to deal more effectively with the stochastic behavior of the attacker and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative ad hoc networking environments, where the number of nodes is large. Using the Norton equivalent of the closed queueing network, we obtain analytical results for its steady state behavior, which in turn can be used to identify the critical parameters affecting the operation of the network. ©2007 IEEE.